49] loop4: detected capacity change from 0 to 1 [ 1597.478498][T32551] loop3: detected capacity change from 0 to 1 [ 1597.488203][T32561] loop0: detected capacity change from 0 to 4 [ 1597.500240][T32551] loop3: p1 < > p2 < > p4 [ 1597.504645][T32551] loop3: partition table partially beyond EOD, truncated [ 1597.511809][T32551] loop3: p1 start 335762607 is beyond EOD, truncated [ 1597.518477][T32551] loop3: p2 size 2 extends beyond EOD, truncated [ 1597.525221][T32551] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:00 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000400004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000001400000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000100000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000081ffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000f000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:00 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680fff00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000001500000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1597.600829][T32566] loop2: detected capacity change from 0 to 4 [ 1597.609744][T32566] EXT4-fs (loop2): Invalid log cluster size: 4096 [ 1597.610237][T32570] loop0: detected capacity change from 0 to 4 [ 1597.639991][T32572] loop4: detected capacity change from 0 to 1 09:12:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000200002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000300002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000082ffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1597.650897][T32566] loop2: detected capacity change from 0 to 4 [ 1597.658273][T32576] loop3: detected capacity change from 0 to 1 [ 1597.662085][T32566] EXT4-fs (loop2): Invalid log cluster size: 4096 [ 1597.683187][T32570] loop0: detected capacity change from 0 to 4 [ 1597.690408][T32576] loop3: p1 < > p2 < > p4 09:12:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000004100000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000400002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1597.694851][T32576] loop3: partition table partially beyond EOD, truncated [ 1597.701971][T32576] loop3: p1 start 335762607 is beyond EOD, truncated [ 1597.708657][T32576] loop3: p2 size 2 extends beyond EOD, truncated [ 1597.720275][T32576] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1597.736001][T32585] loop2: detected capacity change from 0 to 4 [ 1597.764618][T32576] loop3: detected capacity change from 0 to 1 [ 1597.770335][T32585] EXT4-fs (loop2): Invalid log cluster size: 4100 [ 1597.810218][T32576] loop3: p1 < > p2 < > p4 [ 1597.814634][T32576] loop3: partition table partially beyond EOD, truncated [ 1597.821817][T32576] loop3: p1 start 335762607 is beyond EOD, truncated [ 1597.828479][T32576] loop3: p2 size 2 extends beyond EOD, truncated [ 1597.835295][T32576] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1597.841482][T32585] loop2: detected capacity change from 0 to 4 [ 1597.848610][T32585] EXT4-fs (loop2): Invalid log cluster size: 4100 09:12:00 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000500004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:00 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068feff00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010010000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000500002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000085ffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000110000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1597.908671][T32590] loop0: detected capacity change from 0 to 4 [ 1597.917557][ T381] loop3: p1 < > p2 < > p4 [ 1597.921992][ T381] loop3: partition table partially beyond EOD, truncated [ 1597.922445][T32596] loop4: detected capacity change from 0 to 1 [ 1597.929035][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1597.941785][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000600002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200008cffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000700002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1597.958661][T32598] loop2: detected capacity change from 0 to 4 [ 1597.961100][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1597.976721][T32598] EXT4-fs (loop2): Invalid log cluster size: 4352 [ 1597.990972][T32590] loop0: detected capacity change from 0 to 4 09:12:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000800002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1598.010940][T32602] loop3: detected capacity change from 0 to 1 [ 1598.033930][T32596] loop4: detected capacity change from 0 to 1 [ 1598.040689][T32598] loop2: detected capacity change from 0 to 4 [ 1598.046969][T32602] loop3: p1 < > p2 < > p4 [ 1598.051445][T32602] loop3: partition table partially beyond EOD, truncated 09:12:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000a00002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010011000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1598.058675][T32602] loop3: p1 start 335762607 is beyond EOD, truncated [ 1598.065363][T32602] loop3: p2 size 2 extends beyond EOD, truncated [ 1598.075314][T32598] EXT4-fs (loop2): Invalid log cluster size: 4352 [ 1598.082225][T32602] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1598.098973][T32612] loop0: detected capacity change from 0 to 4 [ 1598.142217][T32602] loop3: detected capacity change from 0 to 1 [ 1598.149788][T32612] loop0: detected capacity change from 0 to 4 [ 1598.200219][T32602] loop3: p1 < > p2 < > p4 [ 1598.204645][T32602] loop3: partition table partially beyond EOD, truncated [ 1598.211795][T32602] loop3: p1 start 335762607 is beyond EOD, truncated [ 1598.218468][T32602] loop3: p2 size 2 extends beyond EOD, truncated [ 1598.225218][T32602] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:01 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000600004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:01 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000008000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000a1ffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000b00002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000120000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010012000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1598.270772][ T381] loop3: p1 < > p2 < > p4 [ 1598.275180][ T381] loop3: partition table partially beyond EOD, truncated [ 1598.282282][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1598.288944][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1598.297512][T32619] loop2: detected capacity change from 0 to 4 [ 1598.307815][T32622] loop4: detected capacity change from 0 to 1 09:12:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000001800002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000002600002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1598.316759][T32619] EXT4-fs (loop2): Invalid log cluster size: 4608 [ 1598.317100][T32624] loop0: detected capacity change from 0 to 4 [ 1598.323444][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1598.353890][T32619] loop2: detected capacity change from 0 to 4 [ 1598.360306][T32619] EXT4-fs (loop2): Invalid log cluster size: 4608 09:12:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000a5ffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000007700002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000002120000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010014000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1598.370975][T32624] loop0: detected capacity change from 0 to 4 [ 1598.393820][T32622] loop4: detected capacity change from 0 to 1 [ 1598.396488][T32626] loop3: detected capacity change from 0 to 1 [ 1598.439009][T32637] loop2: detected capacity change from 0 to 4 [ 1598.448625][T32637] EXT4-fs (loop2): Invalid log cluster size: 4610 [ 1598.455251][T32640] loop0: detected capacity change from 0 to 4 [ 1598.470539][T32626] loop3: p1 < > p2 < > p4 [ 1598.474979][T32626] loop3: partition table partially beyond EOD, truncated [ 1598.482134][T32626] loop3: p1 start 335762607 is beyond EOD, truncated [ 1598.488799][T32626] loop3: p2 size 2 extends beyond EOD, truncated [ 1598.495561][T32626] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1598.496513][T32640] loop0: detected capacity change from 0 to 4 [ 1598.506534][T32637] loop2: detected capacity change from 0 to 4 [ 1598.514883][T32637] EXT4-fs (loop2): Invalid log cluster size: 4610 [ 1598.545080][T32626] loop3: detected capacity change from 0 to 1 [ 1598.600111][ T381] loop3: p1 < > p2 < > p4 [ 1598.604512][ T381] loop3: partition table partially beyond EOD, truncated [ 1598.611642][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1598.618289][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1598.625073][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1598.633128][T32626] loop3: p1 < > p2 < > p4 [ 1598.637532][T32626] loop3: partition table partially beyond EOD, truncated 09:12:01 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000700004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000007e00002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000a6ffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:01 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068400008000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010022000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000140000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1598.644708][T32626] loop3: p1 start 335762607 is beyond EOD, truncated [ 1598.651395][T32626] loop3: p2 size 2 extends beyond EOD, truncated [ 1598.657959][T32626] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1598.684545][T32644] loop2: detected capacity change from 0 to 4 [ 1598.692899][T32650] loop0: detected capacity change from 0 to 4 09:12:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000fe00002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000402002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1598.694771][T32648] loop4: detected capacity change from 0 to 1 [ 1598.706548][T32644] EXT4-fs (loop2): Invalid log cluster size: 5120 09:12:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000003002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000a9ffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000204002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1598.751253][T32644] loop2: detected capacity change from 0 to 4 [ 1598.762240][T32650] loop0: detected capacity change from 0 to 4 [ 1598.771026][T32644] EXT4-fs (loop2): Invalid log cluster size: 5120 [ 1598.783377][T32648] loop4: detected capacity change from 0 to 1 [ 1598.795148][T32657] loop3: detected capacity change from 0 to 1 09:12:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000200000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1598.843228][ T381] loop3: p1 < > p2 < > p4 [ 1598.847661][ T381] loop3: partition table partially beyond EOD, truncated [ 1598.854813][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1598.861561][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1598.865872][T32666] loop2: detected capacity change from 0 to 4 [ 1598.877393][T32666] EXT4-fs (loop2): Invalid log cluster size: 8192 [ 1598.878199][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1598.892131][ T381] loop3: p1 < > p2 < > p4 [ 1598.896558][ T381] loop3: partition table partially beyond EOD, truncated [ 1598.903700][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1598.910374][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1598.917392][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1598.925647][T32666] loop2: detected capacity change from 0 to 4 [ 1598.925831][T32657] loop3: p1 < > p2 < > p4 [ 1598.932082][T32666] EXT4-fs (loop2): Invalid log cluster size: 8192 [ 1598.936200][T32657] loop3: partition table partially beyond EOD, truncated [ 1598.936254][T32657] loop3: p1 start 335762607 is beyond EOD, truncated [ 1598.956299][T32657] loop3: p2 size 2 extends beyond EOD, truncated [ 1598.962944][T32657] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1599.016665][T32657] loop3: detected capacity change from 0 to 1 [ 1599.040164][ T381] loop3: p1 < > p2 < > p4 [ 1599.044588][ T381] loop3: partition table partially beyond EOD, truncated [ 1599.051666][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1599.058323][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1599.065109][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1599.073202][T32657] loop3: p1 < > p2 < > p4 [ 1599.077636][T32657] loop3: partition table partially beyond EOD, truncated [ 1599.084766][T32657] loop3: p1 start 335762607 is beyond EOD, truncated [ 1599.091446][T32657] loop3: p2 size 2 extends beyond EOD, truncated [ 1599.098170][T32657] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:01 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000800004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000bfffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000604002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001002e000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:01 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000090000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000010200000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1599.150912][ T381] loop3: p1 < > p2 < > p4 [ 1599.155334][ T381] loop3: partition table partially beyond EOD, truncated [ 1599.162485][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1599.169149][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1599.175980][T32671] loop0: detected capacity change from 0 to 4 [ 1599.186779][T32675] loop4: detected capacity change from 0 to 1 [ 1599.193303][T32670] loop2: detected capacity change from 0 to 4 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000005002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000006002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000c9ffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1599.197752][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1599.200657][T32670] EXT4-fs (loop2): Invalid log cluster size: 8208 [ 1599.240875][T32671] loop0: detected capacity change from 0 to 4 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000406002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010048000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000007002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1599.263680][T32670] loop2: detected capacity change from 0 to 4 [ 1599.275805][T32670] EXT4-fs (loop2): Invalid log cluster size: 8208 [ 1599.282401][T32675] loop4: detected capacity change from 0 to 1 [ 1599.288646][T32678] loop3: detected capacity change from 0 to 1 [ 1599.322901][T32690] loop0: detected capacity change from 0 to 4 [ 1599.360170][ T381] loop3: p1 < > p2 < > p4 [ 1599.364602][ T381] loop3: partition table partially beyond EOD, truncated [ 1599.371753][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1599.378474][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1599.385153][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1599.385856][T32690] loop0: detected capacity change from 0 to 4 [ 1599.398858][ T381] loop3: p1 < > p2 < > p4 [ 1599.403353][ T381] loop3: partition table partially beyond EOD, truncated [ 1599.410437][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1599.417083][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1599.423831][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1599.431811][T32678] loop3: p1 < > p2 < > p4 [ 1599.436230][T32678] loop3: partition table partially beyond EOD, truncated [ 1599.443292][T32678] loop3: p1 start 335762607 is beyond EOD, truncated [ 1599.450006][T32678] loop3: p2 size 2 extends beyond EOD, truncated [ 1599.456782][T32678] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1599.515122][T32678] loop3: detected capacity change from 0 to 1 [ 1599.570119][ T381] loop3: p1 < > p2 < > p4 [ 1599.574602][ T381] loop3: partition table partially beyond EOD, truncated [ 1599.581670][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1599.588333][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1599.595077][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1599.603241][T32678] loop3: p1 < > p2 < > p4 [ 1599.607671][T32678] loop3: partition table partially beyond EOD, truncated [ 1599.614817][T32678] loop3: p1 start 335762607 is beyond EOD, truncated [ 1599.621507][T32678] loop3: p2 size 2 extends beyond EOD, truncated [ 1599.628406][T32678] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:02 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000900004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000220000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000e4ffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000a002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:02 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000010080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001004c000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1599.690735][ T381] loop3: p1 < > p2 < > p4 [ 1599.695248][ T381] loop3: partition table partially beyond EOD, truncated [ 1599.702412][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1599.709076][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1599.717753][T32697] loop2: detected capacity change from 0 to 4 [ 1599.723007][T32700] loop0: detected capacity change from 0 to 4 [ 1599.733187][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000b002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000018002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1599.734312][T32701] loop4: detected capacity change from 0 to 1 [ 1599.746966][T32697] EXT4-fs (loop2): Invalid log cluster size: 8704 [ 1599.770677][T32700] loop0: detected capacity change from 0 to 4 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000020002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000eeffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010060000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000026002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1599.791328][T32697] loop2: detected capacity change from 0 to 4 [ 1599.798035][T32697] EXT4-fs (loop2): Invalid log cluster size: 8704 [ 1599.800139][T32704] loop3: detected capacity change from 0 to 1 [ 1599.841149][ T381] loop3: p1 < > p2 < > p4 [ 1599.844170][T32701] loop4: detected capacity change from 0 to 1 [ 1599.845584][ T381] loop3: partition table partially beyond EOD, truncated [ 1599.845646][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1599.865484][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1599.875996][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1599.879231][T32717] loop0: detected capacity change from 0 to 4 [ 1599.893990][T32704] loop3: p1 < > p2 < > p4 [ 1599.898401][T32704] loop3: partition table partially beyond EOD, truncated [ 1599.905490][T32704] loop3: p1 start 335762607 is beyond EOD, truncated [ 1599.912174][T32704] loop3: p2 size 2 extends beyond EOD, truncated [ 1599.918961][T32704] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1599.934580][T32717] loop0: detected capacity change from 0 to 4 [ 1599.976889][T32704] loop3: detected capacity change from 0 to 1 [ 1600.030224][ T381] loop3: p1 < > p2 < > p4 [ 1600.034641][ T381] loop3: partition table partially beyond EOD, truncated [ 1600.041724][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1600.048398][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1600.055276][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1600.063570][T32704] loop3: p1 < > p2 < > p4 [ 1600.067964][T32704] loop3: partition table partially beyond EOD, truncated 09:12:02 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000a00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000002e0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000003f002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000f6ffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:02 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000020080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010068000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1600.075120][T32704] loop3: p1 start 335762607 is beyond EOD, truncated [ 1600.081805][T32704] loop3: p2 size 2 extends beyond EOD, truncated [ 1600.088551][T32704] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1600.117907][T32726] loop0: detected capacity change from 0 to 4 [ 1600.121550][T32728] loop2: detected capacity change from 0 to 4 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000040002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000077002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1600.126459][T32723] loop4: detected capacity change from 0 to 1 [ 1600.142734][T32728] EXT4-fs (loop2): Invalid log cluster size: 11776 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000007e002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000fbffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000fffe002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1600.178731][T32733] loop3: detected capacity change from 0 to 1 [ 1600.188474][T32728] loop2: detected capacity change from 0 to 4 [ 1600.200379][T32728] EXT4-fs (loop2): Invalid log cluster size: 11776 [ 1600.207484][T32726] loop0: detected capacity change from 0 to 4 [ 1600.220216][ T381] loop3: p1 < > p2 < > p4 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000feff002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1600.224726][ T381] loop3: partition table partially beyond EOD, truncated [ 1600.231884][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1600.238565][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1600.245648][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1600.255216][T32723] loop4: detected capacity change from 0 to 1 [ 1600.282113][ T381] loop3: p1 < > p2 < > p4 [ 1600.286536][ T381] loop3: partition table partially beyond EOD, truncated [ 1600.293675][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1600.300347][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1600.307146][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1600.315422][T32733] loop3: p1 < > p2 < > p4 [ 1600.319878][T32733] loop3: partition table partially beyond EOD, truncated [ 1600.327030][T32733] loop3: p1 start 335762607 is beyond EOD, truncated [ 1600.333708][T32733] loop3: p2 size 2 extends beyond EOD, truncated [ 1600.340555][T32733] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1600.383830][T32733] loop3: detected capacity change from 0 to 1 [ 1600.420109][ T381] loop3: p1 < > p2 < > p4 [ 1600.424513][ T381] loop3: partition table partially beyond EOD, truncated [ 1600.431711][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1600.438382][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1600.445104][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1600.453164][T32733] loop3: p1 < > p2 < > p4 [ 1600.457563][T32733] loop3: partition table partially beyond EOD, truncated [ 1600.464612][T32733] loop3: p1 start 335762607 is beyond EOD, truncated [ 1600.471303][T32733] loop3: p2 size 2 extends beyond EOD, truncated 09:12:03 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000b00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000003f0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001006c000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000003000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000fdffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:03 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000004020080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1600.477991][T32733] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000004000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000fffffffe00000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000feffffff00000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1600.511888][T32749] loop4: detected capacity change from 0 to 1 [ 1600.512773][T32754] loop0: detected capacity change from 0 to 4 [ 1600.518314][T32753] loop2: detected capacity change from 0 to 4 [ 1600.534990][T32753] EXT4-fs (loop2): Invalid log cluster size: 16128 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000002002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1600.581393][T32761] loop3: detected capacity change from 0 to 1 [ 1600.588707][T32753] loop2: detected capacity change from 0 to 4 [ 1600.595629][T32754] loop0: detected capacity change from 0 to 4 [ 1600.602453][T32753] EXT4-fs (loop2): Invalid log cluster size: 16128 [ 1600.620392][T32761] loop3: p1 < > p2 < > p4 [ 1600.624814][T32761] loop3: partition table partially beyond EOD, truncated 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000003002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000400000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1600.631939][T32761] loop3: p1 start 335762607 is beyond EOD, truncated [ 1600.638608][T32761] loop3: p2 size 2 extends beyond EOD, truncated [ 1600.651294][T32749] loop4: detected capacity change from 0 to 1 [ 1600.657067][T32761] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1600.694688][ T302] loop2: detected capacity change from 0 to 4 [ 1600.701491][ T302] EXT4-fs (loop2): Invalid log cluster size: 16384 [ 1600.729620][ T302] loop2: detected capacity change from 0 to 4 [ 1600.735970][ T302] EXT4-fs (loop2): Invalid log cluster size: 16384 [ 1600.738703][T32761] loop3: detected capacity change from 0 to 1 [ 1600.790458][T32761] loop3: p1 < > p2 < > p4 [ 1600.794885][T32761] loop3: partition table partially beyond EOD, truncated [ 1600.802057][T32761] loop3: p1 start 335762607 is beyond EOD, truncated [ 1600.808720][T32761] loop3: p2 size 2 extends beyond EOD, truncated [ 1600.815487][T32761] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:03 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000c00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000010000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010074000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000004002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000800400000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:03 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000030080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1600.890831][ T381] loop3: p1 < > p2 < > p4 [ 1600.895263][ T381] loop3: partition table partially beyond EOD, truncated [ 1600.902384][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1600.909126][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1600.924463][ T311] loop0: detected capacity change from 0 to 4 [ 1600.924681][ T312] loop2: detected capacity change from 0 to 4 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000005002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000006002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1600.932289][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1600.945199][ T306] loop4: detected capacity change from 0 to 1 [ 1600.945267][ T312] EXT4-fs (loop2): Invalid log block size: 134217728 [ 1600.977270][ T311] loop0: detected capacity change from 0 to 4 09:12:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000080000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000007002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000480000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000008002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1600.999250][ T312] loop2: detected capacity change from 0 to 4 [ 1601.006696][ T312] EXT4-fs (loop2): Invalid log block size: 134217728 [ 1601.026370][ T321] loop3: detected capacity change from 0 to 1 [ 1601.037390][ T306] loop4: detected capacity change from 0 to 1 [ 1601.074050][ T326] loop2: detected capacity change from 0 to 4 [ 1601.082375][ T326] EXT4-fs (loop2): Invalid log cluster size: 18432 [ 1601.090410][ T381] loop3: p1 < > p2 < > p4 [ 1601.094824][ T381] loop3: partition table partially beyond EOD, truncated [ 1601.101909][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1601.108572][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1601.115523][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1601.116239][ T326] loop2: detected capacity change from 0 to 4 [ 1601.128856][ T326] EXT4-fs (loop2): Invalid log cluster size: 18432 [ 1601.136343][ T321] loop3: p1 < > p2 < > p4 [ 1601.140810][ T321] loop3: partition table partially beyond EOD, truncated [ 1601.147862][ T321] loop3: p1 start 335762607 is beyond EOD, truncated [ 1601.154528][ T321] loop3: p2 size 2 extends beyond EOD, truncated [ 1601.161289][ T321] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1601.206599][ T321] loop3: detected capacity change from 0 to 1 [ 1601.240101][ T381] loop3: p1 < > p2 < > p4 [ 1601.244534][ T381] loop3: partition table partially beyond EOD, truncated [ 1601.251668][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1601.258316][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1601.264932][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1601.272866][ T321] loop3: p1 < > p2 < > p4 [ 1601.277318][ T321] loop3: partition table partially beyond EOD, truncated [ 1601.284442][ T321] loop3: p1 start 335762607 is beyond EOD, truncated [ 1601.291178][ T321] loop3: p2 size 2 extends beyond EOD, truncated [ 1601.297782][ T321] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:04 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000d00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001007a000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000100000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000a002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:04 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000040080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000004c0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1601.340686][ T381] loop3: p1 < > p2 < > p4 [ 1601.345099][ T381] loop3: partition table partially beyond EOD, truncated [ 1601.352257][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1601.358985][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1601.373640][ T330] loop0: detected capacity change from 0 to 4 [ 1601.375960][ T337] loop4: detected capacity change from 0 to 1 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000b002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000018002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1601.386223][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1601.393585][ T338] loop2: detected capacity change from 0 to 4 [ 1601.411723][ T338] EXT4-fs (loop2): Invalid log cluster size: 19456 [ 1601.430972][ T330] loop0: detected capacity change from 0 to 4 09:12:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000100000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000026002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100fe000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1601.444830][ T338] loop2: detected capacity change from 0 to 4 [ 1601.451825][ T340] loop3: detected capacity change from 0 to 1 [ 1601.467714][ T337] loop4: detected capacity change from 0 to 1 [ 1601.467812][ T338] EXT4-fs (loop2): Invalid log cluster size: 19456 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000077002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1601.501260][ T340] loop3: p1 < > p2 < > p4 [ 1601.505258][ T353] loop0: detected capacity change from 0 to 4 [ 1601.505689][ T340] loop3: partition table partially beyond EOD, truncated [ 1601.505786][ T340] loop3: p1 start 335762607 is beyond EOD, truncated [ 1601.525526][ T340] loop3: p2 size 2 extends beyond EOD, truncated [ 1601.532477][ T340] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:04 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000e00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000600000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000007e002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000400000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:04 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000050080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1601.560961][ T353] loop0: detected capacity change from 0 to 4 [ 1601.599099][ T358] loop2: detected capacity change from 0 to 4 09:12:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001006f010000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000fe002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000004022000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1601.619961][ T358] EXT4-fs (loop2): Invalid log cluster size: 24576 [ 1601.641719][ T371] loop0: detected capacity change from 0 to 4 [ 1601.661016][ T358] loop2: detected capacity change from 0 to 4 09:12:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000002000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000032000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1601.669588][ T374] loop4: detected capacity change from 0 to 1 [ 1601.672230][ T358] EXT4-fs (loop2): Invalid log cluster size: 24576 [ 1601.689603][ T378] loop3: detected capacity change from 0 to 1 [ 1601.706831][ T371] loop0: detected capacity change from 0 to 4 09:12:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000680000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000002042000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1601.720527][ T378] loop3: p1 < > p2 < > p4 [ 1601.724948][ T378] loop3: partition table partially beyond EOD, truncated [ 1601.732093][ T378] loop3: p1 start 335762607 is beyond EOD, truncated [ 1601.738800][ T378] loop3: p2 size 2 extends beyond EOD, truncated [ 1601.745909][ T378] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1601.758470][ T381] loop3: p1 < > p2 < > p4 [ 1601.762928][ T381] loop3: partition table partially beyond EOD, truncated [ 1601.770073][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1601.776824][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1601.783346][ T388] loop2: detected capacity change from 0 to 4 [ 1601.786498][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1601.799482][ T374] loop4: detected capacity change from 0 to 1 [ 1601.806200][ T388] EXT4-fs (loop2): Invalid log cluster size: 26624 [ 1601.830974][ T378] loop3: detected capacity change from 0 to 1 [ 1601.851012][ T388] loop2: detected capacity change from 0 to 4 [ 1601.857306][ T388] EXT4-fs (loop2): Invalid log cluster size: 26624 [ 1601.870167][ T378] loop3: p1 < > p2 < > p4 [ 1601.874584][ T378] loop3: partition table partially beyond EOD, truncated [ 1601.881698][ T378] loop3: p1 start 335762607 is beyond EOD, truncated [ 1601.888361][ T378] loop3: p2 size 2 extends beyond EOD, truncated [ 1601.895119][ T378] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:04 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000f00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000006042000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000009000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010070010000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:04 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000060080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000006c0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1601.970681][ T381] loop3: p1 < > p2 < > p4 [ 1601.975107][ T381] loop3: partition table partially beyond EOD, truncated [ 1601.982261][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1601.988922][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1602.002965][ T395] loop4: detected capacity change from 0 to 1 [ 1602.006192][ T393] loop0: detected capacity change from 0 to 4 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000052000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000062000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1602.016019][ T398] loop2: detected capacity change from 0 to 4 [ 1602.024822][ T398] EXT4-fs (loop2): Invalid log cluster size: 27648 [ 1602.028530][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1602.060719][ T398] loop2: detected capacity change from 0 to 4 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000004062000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000c000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1602.065026][ T393] loop0: detected capacity change from 0 to 4 [ 1602.067760][ T398] EXT4-fs (loop2): Invalid log cluster size: 27648 [ 1602.090191][ T402] loop3: detected capacity change from 0 to 1 [ 1602.103022][ T395] loop4: detected capacity change from 0 to 1 09:12:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000072000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000002700000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1602.120318][ T402] loop3: p1 < > p2 < > p4 [ 1602.124756][ T402] loop3: partition table partially beyond EOD, truncated [ 1602.131920][ T402] loop3: p1 start 335762607 is beyond EOD, truncated [ 1602.138586][ T402] loop3: p2 size 2 extends beyond EOD, truncated [ 1602.157142][ T411] loop2: detected capacity change from 0 to 4 [ 1602.164154][ T411] EXT4-fs (loop2): Invalid log cluster size: 28674 [ 1602.189527][ T402] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1602.220873][ T411] loop2: detected capacity change from 0 to 4 [ 1602.227196][ T411] EXT4-fs (loop2): Invalid log cluster size: 28674 [ 1602.228437][ T402] loop3: detected capacity change from 0 to 1 [ 1602.290268][ T402] loop3: p1 < > p2 < > p4 [ 1602.294742][ T402] loop3: partition table partially beyond EOD, truncated [ 1602.301814][ T402] loop3: p1 start 335762607 is beyond EOD, truncated [ 1602.308547][ T402] loop3: p2 size 2 extends beyond EOD, truncated [ 1602.315445][ T402] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:05 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500001000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010071010000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000a2000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:05 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000004060080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000001000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000740000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1602.430790][ T381] loop3: p1 < > p2 < > p4 [ 1602.435216][ T381] loop3: partition table partially beyond EOD, truncated [ 1602.442434][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1602.449141][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1602.451270][ T421] loop0: detected capacity change from 0 to 4 [ 1602.464778][ T425] loop2: detected capacity change from 0 to 4 09:12:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000b2000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1602.478257][ T425] EXT4-fs (loop2): Invalid log cluster size: 29696 [ 1602.480033][ T428] loop4: detected capacity change from 0 to 1 [ 1602.485097][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000182000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000202000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000002000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000007a0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000262000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1602.521348][ T425] loop2: detected capacity change from 0 to 4 [ 1602.527964][ T425] EXT4-fs (loop2): Invalid log cluster size: 29696 [ 1602.535342][ T421] loop0: detected capacity change from 0 to 4 [ 1602.553686][ T430] loop3: detected capacity change from 0 to 1 [ 1602.599272][ T445] loop2: detected capacity change from 0 to 4 [ 1602.605717][ T430] loop3: p1 < > p2 < > p4 [ 1602.606917][ T445] EXT4-fs (loop2): Invalid log cluster size: 31232 [ 1602.610154][ T430] loop3: partition table partially beyond EOD, truncated [ 1602.610206][ T430] loop3: p1 start 335762607 is beyond EOD, truncated [ 1602.630392][ T430] loop3: p2 size 2 extends beyond EOD, truncated [ 1602.634537][ T428] loop4: detected capacity change from 0 to 1 [ 1602.637500][ T430] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1602.655077][ T445] loop2: detected capacity change from 0 to 4 [ 1602.661492][ T445] EXT4-fs (loop2): Invalid log cluster size: 31232 [ 1602.727928][ T430] loop3: detected capacity change from 0 to 1 [ 1602.800141][ T381] loop3: p1 < > p2 < > p4 [ 1602.804605][ T381] loop3: partition table partially beyond EOD, truncated [ 1602.811707][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1602.818532][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1602.825345][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1602.833349][ T430] loop3: p1 < > p2 < > p4 [ 1602.837751][ T430] loop3: partition table partially beyond EOD, truncated 09:12:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000003f2000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001007c010000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:05 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500001100004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:05 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000070080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000402000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000017c0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1602.844942][ T430] loop3: p1 start 335762607 is beyond EOD, truncated [ 1602.851757][ T430] loop3: p2 size 2 extends beyond EOD, truncated [ 1602.858363][ T430] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1602.886435][ T451] loop2: detected capacity change from 0 to 4 09:12:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000402000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000772000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1602.895036][ T456] loop4: detected capacity change from 0 to 1 [ 1602.895446][ T457] loop0: detected capacity change from 0 to 4 [ 1602.912458][ T451] EXT4-fs (loop2): Invalid log cluster size: 31745 [ 1602.912519][ T381] loop3: p1 < > p2 < > p4 [ 1602.923367][ T381] loop3: partition table partially beyond EOD, truncated [ 1602.930462][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1602.937127][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1602.943927][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000003000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000007e2000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100a2010000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000fffe2000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1602.961184][ T457] loop0: detected capacity change from 0 to 4 [ 1602.964143][ T451] loop2: detected capacity change from 0 to 4 [ 1602.974128][ T451] EXT4-fs (loop2): Invalid log cluster size: 31745 [ 1602.980999][ T464] loop3: detected capacity change from 0 to 1 [ 1602.993304][ T456] loop4: detected capacity change from 0 to 1 09:12:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100ffffffffffffff7f0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1603.028625][ T464] loop3: p1 < > p2 < > p4 [ 1603.033177][ T464] loop3: partition table partially beyond EOD, truncated [ 1603.040301][ T464] loop3: p1 start 335762607 is beyond EOD, truncated [ 1603.046987][ T464] loop3: p2 size 2 extends beyond EOD, truncated [ 1603.056290][ T472] loop0: detected capacity change from 0 to 4 [ 1603.066171][ T464] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000feff2000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1603.077472][ T474] loop2: detected capacity change from 0 to 4 [ 1603.084961][ T474] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1603.121248][ T472] loop0: detected capacity change from 0 to 4 [ 1603.130604][ T464] loop3: detected capacity change from 0 to 1 [ 1603.131140][ T474] loop2: detected capacity change from 0 to 4 [ 1603.143887][ T474] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1603.170097][ T464] loop3: p1 < > p2 < > p4 [ 1603.174533][ T464] loop3: partition table partially beyond EOD, truncated [ 1603.181659][ T464] loop3: p1 start 335762607 is beyond EOD, truncated [ 1603.188322][ T464] loop3: p2 size 2 extends beyond EOD, truncated [ 1603.195063][ T464] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:06 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500001200004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:06 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000080080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000004000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000006000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010004020000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000ffffff850000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1603.240670][ T381] loop3: p1 < > p2 < > p4 [ 1603.245083][ T381] loop3: partition table partially beyond EOD, truncated [ 1603.252167][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1603.258937][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1603.269229][ T491] loop4: detected capacity change from 0 to 1 [ 1603.277556][ T495] loop2: detected capacity change from 0 to 4 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000000b00000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000000c00000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1603.286370][ T496] loop0: detected capacity change from 0 to 4 [ 1603.286733][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1603.299687][ T495] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1603.320976][ T496] loop0: detected capacity change from 0 to 4 09:12:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001008e020000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000001400000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000005000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1603.340848][ T495] loop2: detected capacity change from 0 to 4 [ 1603.353986][ T491] loop4: detected capacity change from 0 to 1 [ 1603.360234][ T495] EXT4-fs (loop2): Invalid log block size: 4294901760 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000001500000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1603.389694][ T515] loop3: detected capacity change from 0 to 1 [ 1603.406568][ T518] loop0: detected capacity change from 0 to 4 [ 1603.438439][ T518] loop0: detected capacity change from 0 to 4 [ 1603.444771][ T515] loop3: p1 < > p2 < > p4 [ 1603.449176][ T515] loop3: partition table partially beyond EOD, truncated [ 1603.456280][ T515] loop3: p1 start 335762607 is beyond EOD, truncated [ 1603.462952][ T515] loop3: p2 size 2 extends beyond EOD, truncated [ 1603.469670][ T515] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1603.573188][ T515] loop3: detected capacity change from 0 to 1 [ 1603.610261][ T515] loop3: p1 < > p2 < > p4 [ 1603.614697][ T515] loop3: partition table partially beyond EOD, truncated 09:12:06 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500001400004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000ffffff8c0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:06 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000090080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000022000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000006000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001008f020000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1603.621746][ T515] loop3: p1 start 335762607 is beyond EOD, truncated [ 1603.628449][ T515] loop3: p2 size 2 extends beyond EOD, truncated [ 1603.635113][ T515] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1603.643171][ T381] loop3: p1 < > p2 < > p4 [ 1603.647630][ T381] loop3: partition table partially beyond EOD, truncated [ 1603.654723][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1603.661469][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000032000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000042000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000406000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1603.677550][ T533] loop2: detected capacity change from 0 to 4 [ 1603.684491][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1603.685670][ T530] loop4: detected capacity change from 0 to 1 [ 1603.691878][ T534] loop0: detected capacity change from 0 to 4 [ 1603.699289][ T533] EXT4-fs (loop2): Invalid log block size: 4294901760 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000052000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000062000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000072000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1603.764307][ T534] loop0: detected capacity change from 0 to 4 [ 1603.770665][ T536] loop3: detected capacity change from 0 to 1 [ 1603.776874][ T530] loop4: detected capacity change from 0 to 1 [ 1603.779635][ T533] loop2: detected capacity change from 0 to 4 [ 1603.790083][ T533] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1603.830280][ T536] loop3: p1 < > p2 < > p4 [ 1603.834735][ T536] loop3: partition table partially beyond EOD, truncated [ 1603.841826][ T536] loop3: p1 start 335762607 is beyond EOD, truncated [ 1603.848490][ T536] loop3: p2 size 2 extends beyond EOD, truncated [ 1603.855586][ T536] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1603.903126][ T536] loop3: detected capacity change from 0 to 1 [ 1603.926999][ T536] loop3: p1 < > p2 < > p4 [ 1603.931501][ T536] loop3: partition table partially beyond EOD, truncated [ 1603.938521][ T536] loop3: p1 start 335762607 is beyond EOD, truncated [ 1603.945247][ T536] loop3: p2 size 2 extends beyond EOD, truncated [ 1603.952524][ T536] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:06 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500001c00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000007000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000082000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010090020000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000018f0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:06 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000a0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1604.010864][ T381] loop3: p1 < > p2 < > p4 [ 1604.015341][ T381] loop3: partition table partially beyond EOD, truncated [ 1604.022445][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1604.029116][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1604.040002][ T556] loop2: detected capacity change from 0 to 4 [ 1604.048471][ T558] loop4: detected capacity change from 0 to 1 [ 1604.050902][ T560] loop0: detected capacity change from 0 to 4 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000a2000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000b2000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1604.055862][ T556] EXT4-fs (loop2): Invalid log cluster size: 36609 [ 1604.067997][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:06 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000008000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000182000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000262000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1604.110717][ T560] loop0: detected capacity change from 0 to 4 [ 1604.113952][ T556] loop2: detected capacity change from 0 to 4 [ 1604.129299][ T564] loop3: detected capacity change from 0 to 1 [ 1604.139070][ T556] EXT4-fs (loop2): Invalid log cluster size: 36609 [ 1604.140012][ T558] loop4: detected capacity change from 0 to 1 09:12:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000030000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1604.180081][ T564] loop3: p1 < > p2 < > p4 [ 1604.184526][ T564] loop3: partition table partially beyond EOD, truncated [ 1604.188682][ T574] loop0: detected capacity change from 0 to 4 [ 1604.191716][ T564] loop3: p1 start 335762607 is beyond EOD, truncated [ 1604.204380][ T564] loop3: p2 size 2 extends beyond EOD, truncated [ 1604.214372][ T564] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1604.291465][ T574] loop0: detected capacity change from 0 to 4 [ 1604.304553][ T564] loop3: detected capacity change from 0 to 1 [ 1604.350183][ T381] loop3: p1 < > p2 < > p4 [ 1604.354597][ T381] loop3: partition table partially beyond EOD, truncated [ 1604.361637][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1604.368291][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1604.374969][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1604.383056][ T564] loop3: p1 < > p2 < > p4 [ 1604.387460][ T564] loop3: partition table partially beyond EOD, truncated [ 1604.394620][ T564] loop3: p1 start 335762607 is beyond EOD, truncated [ 1604.401275][ T564] loop3: p2 size 2 extends beyond EOD, truncated [ 1604.407874][ T564] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:07 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500002200004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000001a20000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000772000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:07 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000b0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000009000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010002040000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1604.470843][ T381] loop3: p1 < > p2 < > p4 [ 1604.475261][ T381] loop3: partition table partially beyond EOD, truncated [ 1604.482364][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1604.489028][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1604.501831][ T584] loop0: detected capacity change from 0 to 4 [ 1604.501984][ T585] loop2: detected capacity change from 0 to 4 [ 1604.510741][ T582] loop4: detected capacity change from 0 to 1 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000007e2000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000fe2000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1604.527189][ T585] EXT4-fs (loop2): Invalid log cluster size: 41473 [ 1604.527207][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1604.550822][ T584] loop0: detected capacity change from 0 to 4 [ 1604.555479][ T588] loop3: detected capacity change from 0 to 1 09:12:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000000a000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000003000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010006040000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1604.583823][ T585] loop2: detected capacity change from 0 to 4 [ 1604.592809][ T585] EXT4-fs (loop2): Invalid log cluster size: 41473 [ 1604.604033][ T582] loop4: detected capacity change from 0 to 1 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000004000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1604.630471][ T588] loop3: p1 < > p2 < > p4 [ 1604.634881][ T588] loop3: partition table partially beyond EOD, truncated [ 1604.641977][ T588] loop3: p1 start 335762607 is beyond EOD, truncated [ 1604.648641][ T588] loop3: p2 size 2 extends beyond EOD, truncated [ 1604.660422][ T601] loop0: detected capacity change from 0 to 4 [ 1604.671511][ T588] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1604.682795][ T381] loop3: p1 < > p2 < > p4 [ 1604.687213][ T381] loop3: partition table partially beyond EOD, truncated [ 1604.694407][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1604.701130][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1604.707845][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1604.721370][ T601] loop0: detected capacity change from 0 to 4 09:12:07 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500002500004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000006000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000000b000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000ffffffda0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:07 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000c0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010010040000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000fffe00000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1604.801927][ T606] loop2: detected capacity change from 0 to 4 [ 1604.823396][ T608] loop4: detected capacity change from 0 to 1 [ 1604.825749][ T612] loop3: detected capacity change from 0 to 1 [ 1604.838740][ T606] EXT4-fs (loop2): Invalid log block size: 4294901760 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000000b00000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000000c000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000000c00000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1604.847638][ T614] loop0: detected capacity change from 0 to 4 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000001400000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1604.900466][ T381] loop3: p1 < > p2 < > p4 [ 1604.904884][ T381] loop3: partition table partially beyond EOD, truncated [ 1604.911987][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1604.918662][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1604.921244][ T606] loop2: detected capacity change from 0 to 4 [ 1604.926244][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1604.932608][ T606] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1604.938850][ T614] loop0: detected capacity change from 0 to 4 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000001500000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1604.955601][ T612] loop3: p1 < > p2 < > p4 [ 1604.960050][ T612] loop3: partition table partially beyond EOD, truncated [ 1604.967152][ T612] loop3: p1 start 335762607 is beyond EOD, truncated [ 1604.973861][ T612] loop3: p2 size 2 extends beyond EOD, truncated [ 1604.983735][ T608] loop4: detected capacity change from 0 to 1 [ 1604.990036][ T612] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1605.012384][ T381] loop3: p1 < > p2 < > p4 [ 1605.016808][ T381] loop3: partition table partially beyond EOD, truncated [ 1605.023934][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1605.030646][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1605.037590][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:07 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500002600004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000003000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000000d000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000001ed0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000050000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:07 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000d0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000fe00000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000feff000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1605.135470][ T635] loop2: detected capacity change from 0 to 4 [ 1605.138574][ T632] loop0: detected capacity change from 0 to 4 [ 1605.148522][ T635] EXT4-fs (loop2): Invalid log cluster size: 60673 [ 1605.159789][ T637] loop4: detected capacity change from 0 to 1 [ 1605.167494][ T640] loop3: detected capacity change from 0 to 1 09:12:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000000e000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1605.200712][ T635] loop2: detected capacity change from 0 to 4 [ 1605.208724][ T632] loop0: detected capacity change from 0 to 4 [ 1605.215071][ T640] loop3: p1 < > p2 < > p4 [ 1605.218823][ T635] EXT4-fs (loop2): Invalid log cluster size: 60673 [ 1605.219568][ T640] loop3: partition table partially beyond EOD, truncated [ 1605.233130][ T640] loop3: p1 start 335762607 is beyond EOD, truncated [ 1605.239799][ T640] loop3: p2 size 2 extends beyond EOD, truncated 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000feffffff20000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000000b000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1605.252466][ T640] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1605.261101][ T381] loop3: p1 < > p2 < > p4 [ 1605.265526][ T381] loop3: partition table partially beyond EOD, truncated [ 1605.272608][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1605.279274][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1605.286423][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000060000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1605.299964][ T637] loop4: detected capacity change from 0 to 1 [ 1605.325864][ T654] loop0: detected capacity change from 0 to 4 [ 1605.356219][ T640] loop3: detected capacity change from 0 to 1 [ 1605.363642][ T654] loop0: detected capacity change from 0 to 4 [ 1605.400231][ T640] loop3: p1 < > p2 < > p4 [ 1605.404729][ T640] loop3: partition table partially beyond EOD, truncated [ 1605.411803][ T640] loop3: p1 start 335762607 is beyond EOD, truncated [ 1605.418545][ T640] loop3: p2 size 2 extends beyond EOD, truncated [ 1605.425144][ T640] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1605.433300][ T381] loop3: p1 < > p2 < > p4 [ 1605.437704][ T381] loop3: partition table partially beyond EOD, truncated 09:12:08 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500002e00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000fffffff60000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000000f000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000000c000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:08 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000e0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010004060000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000014000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1605.444967][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1605.451649][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1605.456228][ T657] loop4: detected capacity change from 0 to 1 [ 1605.466099][ T660] loop2: detected capacity change from 0 to 4 [ 1605.472721][ T662] loop0: detected capacity change from 0 to 4 [ 1605.481711][ T660] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1605.489447][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000015000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000010000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000fffffdf90000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1605.521191][ T660] loop2: detected capacity change from 0 to 4 [ 1605.521460][ T662] loop0: detected capacity change from 0 to 4 [ 1605.534158][ T660] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1605.540981][ T666] loop3: detected capacity change from 0 to 1 [ 1605.554235][ T657] loop4: detected capacity change from 0 to 1 09:12:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000070000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002002000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1605.583585][ T666] loop3: p1 < > p2 < > p4 [ 1605.588016][ T666] loop3: partition table partially beyond EOD, truncated [ 1605.595128][ T666] loop3: p1 start 335762607 is beyond EOD, truncated [ 1605.601880][ T666] loop3: p2 size 2 extends beyond EOD, truncated [ 1605.606082][ T676] loop0: detected capacity change from 0 to 4 [ 1605.608763][ T679] loop2: detected capacity change from 0 to 4 [ 1605.620506][ T666] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1605.632846][ T679] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1605.681738][ T676] loop0: detected capacity change from 0 to 4 [ 1605.684528][ T679] loop2: detected capacity change from 0 to 4 [ 1605.691973][ T666] loop3: detected capacity change from 0 to 1 [ 1605.696817][ T679] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1605.730203][ T666] loop3: p1 < > p2 < > p4 [ 1605.734641][ T666] loop3: partition table partially beyond EOD, truncated [ 1605.741818][ T666] loop3: p1 start 335762607 is beyond EOD, truncated [ 1605.748564][ T666] loop3: p2 size 2 extends beyond EOD, truncated [ 1605.755310][ T666] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:08 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500004800004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002003000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:08 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000f0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000011000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000090000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000fffffdfd0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1605.840860][ T381] loop3: p1 < > p2 < > p4 [ 1605.845306][ T381] loop3: partition table partially beyond EOD, truncated [ 1605.852401][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1605.859204][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1605.875024][ T689] loop2: detected capacity change from 0 to 4 [ 1605.876059][ T682] loop4: detected capacity change from 0 to 1 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002004000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002005000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000012000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1605.883298][ T690] loop0: detected capacity change from 0 to 4 [ 1605.887822][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1605.894263][ T689] EXT4-fs (loop2): Invalid log block size: 4294901760 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002006000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1605.953989][ T693] loop3: detected capacity change from 0 to 1 [ 1605.962208][ T690] loop0: detected capacity change from 0 to 4 [ 1605.965132][ T689] loop2: detected capacity change from 0 to 4 [ 1605.976471][ T689] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1605.985391][ T682] loop4: detected capacity change from 0 to 1 09:12:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000a0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002007000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1606.016435][ T693] loop3: p1 < > p2 < > p4 [ 1606.020901][ T693] loop3: partition table partially beyond EOD, truncated [ 1606.027963][ T693] loop3: p1 start 335762607 is beyond EOD, truncated [ 1606.030606][ T704] loop0: detected capacity change from 0 to 4 [ 1606.034719][ T693] loop3: p2 size 2 extends beyond EOD, truncated [ 1606.049248][ T693] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1606.121912][ T704] loop0: detected capacity change from 0 to 4 [ 1606.133387][ T693] loop3: detected capacity change from 0 to 1 [ 1606.180194][ T381] loop3: p1 < > p2 < > p4 [ 1606.184633][ T381] loop3: partition table partially beyond EOD, truncated [ 1606.191709][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1606.198415][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1606.205124][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1606.213204][ T693] loop3: p1 < > p2 < > p4 [ 1606.217602][ T693] loop3: partition table partially beyond EOD, truncated [ 1606.224670][ T693] loop3: p1 start 335762607 is beyond EOD, truncated [ 1606.231344][ T693] loop3: p2 size 2 extends beyond EOD, truncated [ 1606.238038][ T693] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:09 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500004c00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000001c000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002008000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000fffffffe0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:09 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000100080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000b0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1606.290868][ T381] loop3: p1 < > p2 < > p4 [ 1606.295290][ T381] loop3: partition table partially beyond EOD, truncated [ 1606.302388][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1606.309055][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1606.323342][ T711] loop0: detected capacity change from 0 to 4 [ 1606.325484][ T716] loop4: detected capacity change from 0 to 1 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200a000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200b000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1606.331204][ T713] loop2: detected capacity change from 0 to 4 [ 1606.341951][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1606.351178][ T713] EXT4-fs (loop2): Invalid log block size: 4294901760 09:12:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000020000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002018000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002026000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1606.391524][ T711] loop0: detected capacity change from 0 to 4 [ 1606.391925][ T713] loop2: detected capacity change from 0 to 4 [ 1606.406381][ T713] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1606.428448][ T727] loop3: detected capacity change from 0 to 1 09:12:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000c0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1606.455748][ T716] loop4: detected capacity change from 0 to 1 [ 1606.480281][ T727] loop3: p1 < > p2 < > p4 [ 1606.484705][ T727] loop3: partition table partially beyond EOD, truncated [ 1606.491867][ T727] loop3: p1 start 335762607 is beyond EOD, truncated [ 1606.498535][ T727] loop3: p2 size 2 extends beyond EOD, truncated [ 1606.505604][ T727] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1606.513207][ T732] loop0: detected capacity change from 0 to 4 [ 1606.563749][ T727] loop3: detected capacity change from 0 to 1 [ 1606.571471][ T732] loop0: detected capacity change from 0 to 4 [ 1606.611146][ T727] loop3: p1 < > p2 < > p4 [ 1606.615651][ T727] loop3: partition table partially beyond EOD, truncated [ 1606.622734][ T727] loop3: p1 start 335762607 is beyond EOD, truncated [ 1606.629441][ T727] loop3: p2 size 2 extends beyond EOD, truncated [ 1606.636177][ T727] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1606.644203][ T381] loop3: p1 < > p2 < > p4 [ 1606.648617][ T381] loop3: partition table partially beyond EOD, truncated 09:12:09 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500005400004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100fffffffffffffffe0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000022000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002077000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:09 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000110080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000d0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000207e000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1606.655805][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1606.662490][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1606.676249][ T735] loop0: detected capacity change from 0 to 4 [ 1606.681936][ T739] loop4: detected capacity change from 0 to 1 [ 1606.682972][ T740] loop2: detected capacity change from 0 to 4 [ 1606.694781][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1606.700379][ T740] EXT4-fs (loop2): Invalid log block size: 4294967295 09:12:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000025000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020fe000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002004020020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1606.731712][ T740] loop2: detected capacity change from 0 to 4 [ 1606.739361][ T735] loop0: detected capacity change from 0 to 4 [ 1606.745641][ T740] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1606.748763][ T744] loop3: detected capacity change from 0 to 1 [ 1606.768213][ T739] loop4: detected capacity change from 0 to 1 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000030020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000026000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1606.790139][ T744] loop3: p1 < > p2 < > p4 [ 1606.794563][ T744] loop3: partition table partially beyond EOD, truncated [ 1606.801716][ T744] loop3: p1 start 335762607 is beyond EOD, truncated [ 1606.808378][ T744] loop3: p2 size 2 extends beyond EOD, truncated [ 1606.815658][ T744] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1606.920155][ T744] loop3: detected capacity change from 0 to 1 [ 1606.940094][ T381] loop3: p1 < > p2 < > p4 [ 1606.944490][ T381] loop3: partition table partially beyond EOD, truncated [ 1606.951545][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1606.958241][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:09 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500005500004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000fff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000e0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002002040020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:09 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000120080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000002e000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1606.964837][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1606.972820][ T744] loop3: p1 < > p2 < > p4 [ 1606.977226][ T744] loop3: partition table partially beyond EOD, truncated [ 1606.984263][ T744] loop3: p1 start 335762607 is beyond EOD, truncated [ 1606.990933][ T744] loop3: p2 size 2 extends beyond EOD, truncated [ 1606.997731][ T744] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002006040020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000050020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1607.024223][ T762] loop4: detected capacity change from 0 to 1 [ 1607.031236][ T766] loop0: detected capacity change from 0 to 4 [ 1607.039394][ T769] loop2: detected capacity change from 0 to 4 [ 1607.046252][ T769] EXT4-fs (loop2): Invalid log cluster size: 65295 09:12:09 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000003f000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1607.081022][ T766] loop0: detected capacity change from 0 to 4 [ 1607.095261][ T774] loop3: detected capacity change from 0 to 1 [ 1607.102605][ T769] loop2: detected capacity change from 0 to 4 [ 1607.109129][ T769] EXT4-fs (loop2): Invalid log cluster size: 65295 09:12:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000060020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000f0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002004060020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1607.130133][ T762] loop4: detected capacity change from 0 to 1 [ 1607.140457][ T774] loop3: p1 < > p2 < > p4 [ 1607.144876][ T774] loop3: partition table partially beyond EOD, truncated [ 1607.151984][ T774] loop3: p1 start 335762607 is beyond EOD, truncated [ 1607.154768][ T780] loop0: detected capacity change from 0 to 4 [ 1607.158660][ T774] loop3: p2 size 2 extends beyond EOD, truncated [ 1607.160913][ T774] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1607.195905][ T780] loop0: detected capacity change from 0 to 4 [ 1607.219187][ T774] loop3: detected capacity change from 0 to 1 [ 1607.250142][ T381] loop3: p1 < > p2 < > p4 [ 1607.254552][ T381] loop3: partition table partially beyond EOD, truncated [ 1607.261750][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1607.268400][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1607.275112][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1607.283096][ T774] loop3: p1 < > p2 < > p4 [ 1607.287486][ T774] loop3: partition table partially beyond EOD, truncated [ 1607.294575][ T774] loop3: p1 start 335762607 is beyond EOD, truncated [ 1607.301259][ T774] loop3: p2 size 2 extends beyond EOD, truncated [ 1607.307971][ T774] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:10 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500006000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000fffffbff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:10 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000200080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000040000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000070020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010004100000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1607.371742][ T381] loop3: p1 < > p2 < > p4 [ 1607.376249][ T381] loop3: partition table partially beyond EOD, truncated [ 1607.383340][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1607.390077][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1607.409216][ T793] loop0: detected capacity change from 0 to 4 [ 1607.411534][ T794] loop4: detected capacity change from 0 to 1 09:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000a0020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000b0020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1607.422048][ T795] loop2: detected capacity change from 0 to 4 [ 1607.429474][ T795] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1607.430152][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000180020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000080040000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000200020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1607.470975][ T793] loop0: detected capacity change from 0 to 4 [ 1607.485092][ T795] loop2: detected capacity change from 0 to 4 [ 1607.492028][ T795] EXT4-fs (loop2): Invalid log block size: 4294901760 09:12:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010020100000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1607.522720][ T806] loop3: detected capacity change from 0 to 1 [ 1607.528039][ T794] loop4: detected capacity change from 0 to 1 [ 1607.556266][ T811] loop0: detected capacity change from 0 to 4 [ 1607.581151][ T811] loop0: detected capacity change from 0 to 4 [ 1607.587276][ T806] loop3: p1 < > p2 < > p4 [ 1607.591697][ T806] loop3: partition table partially beyond EOD, truncated [ 1607.598726][ T806] loop3: p1 start 335762607 is beyond EOD, truncated [ 1607.605399][ T806] loop3: p2 size 2 extends beyond EOD, truncated [ 1607.612121][ T806] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1607.653865][ T806] loop3: detected capacity change from 0 to 1 [ 1607.700153][ T381] loop3: p1 < > p2 < > p4 [ 1607.704570][ T381] loop3: partition table partially beyond EOD, truncated [ 1607.711733][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1607.718383][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1607.725040][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1607.732761][ T806] loop3: p1 < > p2 < > p4 [ 1607.737156][ T806] loop3: partition table partially beyond EOD, truncated [ 1607.744205][ T806] loop3: p1 start 335762607 is beyond EOD, truncated [ 1607.750918][ T806] loop3: p2 size 2 extends beyond EOD, truncated [ 1607.757596][ T806] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:10 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500006300004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000007fffffff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000260020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000048000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:10 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000220080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000110000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1607.800793][ T381] loop3: p1 < > p2 < > p4 [ 1607.805215][ T381] loop3: partition table partially beyond EOD, truncated [ 1607.812300][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1607.818964][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1607.829723][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1607.832905][ T819] loop0: detected capacity change from 0 to 4 [ 1607.839981][ T818] loop4: detected capacity change from 0 to 1 09:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020003f0020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000400020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1607.851093][ T821] loop2: detected capacity change from 0 to 4 [ 1607.864811][ T821] EXT4-fs (loop2): Invalid log block size: 4286513152 [ 1607.883801][ T823] loop3: detected capacity change from 0 to 1 09:12:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000004c000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000770020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1607.895743][ T819] loop0: detected capacity change from 0 to 4 [ 1607.903142][ T821] loop2: detected capacity change from 0 to 4 [ 1607.909660][ T821] EXT4-fs (loop2): Invalid log block size: 4286513152 [ 1607.920212][ T823] loop3: p1 < > p2 < > p4 [ 1607.923946][ T818] loop4: detected capacity change from 0 to 1 [ 1607.924636][ T823] loop3: partition table partially beyond EOD, truncated [ 1607.924717][ T823] loop3: p1 start 335762607 is beyond EOD, truncated [ 1607.944460][ T823] loop3: p2 size 2 extends beyond EOD, truncated 09:12:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000120000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000ffffffff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1607.956479][ T823] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1607.994209][ T834] loop2: detected capacity change from 0 to 4 [ 1608.000172][ T836] loop0: detected capacity change from 0 to 4 [ 1608.003045][ T834] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1608.041127][ T836] loop0: detected capacity change from 0 to 4 [ 1608.042054][ T823] loop3: detected capacity change from 0 to 1 [ 1608.055884][ T834] loop2: detected capacity change from 0 to 4 [ 1608.062424][ T834] EXT4-fs (loop2): Invalid log block size: 4294901760 [ 1608.090274][ T823] loop3: p1 < > p2 < > p4 [ 1608.094716][ T823] loop3: partition table partially beyond EOD, truncated [ 1608.101837][ T823] loop3: p1 start 335762607 is beyond EOD, truncated [ 1608.108501][ T823] loop3: p2 size 2 extends beyond EOD, truncated [ 1608.115221][ T823] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:11 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500006800004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020007e0020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:11 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000250080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000054000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000140000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000007ffffffffffff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1608.160884][ T381] loop3: p1 < > p2 < > p4 [ 1608.165302][ T381] loop3: partition table partially beyond EOD, truncated [ 1608.172651][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1608.179381][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1608.191213][ T844] loop0: detected capacity change from 0 to 4 [ 1608.192018][ T843] loop4: detected capacity change from 0 to 1 [ 1608.199796][ T845] loop2: detected capacity change from 0 to 4 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020fffe0020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020feff0020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1608.208098][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1608.221824][ T845] EXT4-fs (loop2): Invalid log block size: 4294967295 09:12:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000055000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000030000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000040000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1608.260966][ T844] loop0: detected capacity change from 0 to 4 [ 1608.261050][ T845] loop2: detected capacity change from 0 to 4 [ 1608.274172][ T845] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1608.284050][ T843] loop4: detected capacity change from 0 to 1 [ 1608.300065][ T849] loop3: detected capacity change from 0 to 1 09:12:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000200000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1608.330242][ T849] loop3: p1 < > p2 < > p4 [ 1608.334665][ T849] loop3: partition table partially beyond EOD, truncated [ 1608.341791][ T849] loop3: p1 start 335762607 is beyond EOD, truncated [ 1608.348509][ T849] loop3: p2 size 2 extends beyond EOD, truncated [ 1608.354064][ T863] loop0: detected capacity change from 0 to 4 [ 1608.362593][ T849] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1608.400795][ T863] loop0: detected capacity change from 0 to 4 [ 1608.415309][ T849] loop3: detected capacity change from 0 to 1 [ 1608.460148][ T849] loop3: p1 < > p2 < > p4 [ 1608.464579][ T849] loop3: partition table partially beyond EOD, truncated [ 1608.471691][ T849] loop3: p1 start 335762607 is beyond EOD, truncated [ 1608.478410][ T849] loop3: p2 size 2 extends beyond EOD, truncated [ 1608.485110][ T849] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:11 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500006c00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000fffffffffffffff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000060000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:11 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000003f0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020fffffffe000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010010200000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1608.550724][ T381] loop3: p1 < > p2 < > p4 [ 1608.555137][ T381] loop3: partition table partially beyond EOD, truncated [ 1608.562252][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1608.568981][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1608.583360][ T872] loop2: detected capacity change from 0 to 4 [ 1608.588670][ T871] loop0: detected capacity change from 0 to 4 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000020020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000030020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1608.591847][ T873] loop4: detected capacity change from 0 to 1 [ 1608.602590][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1608.602681][ T872] EXT4-fs (loop2): Invalid log block size: 4294967295 09:12:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000063000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000040020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1608.649334][ T872] loop2: detected capacity change from 0 to 4 [ 1608.665459][ T872] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1608.671433][ T871] loop0: detected capacity change from 0 to 4 [ 1608.692315][ T873] loop4: detected capacity change from 0 to 1 09:12:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000220000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001007fffffffffffffff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1608.702353][ T882] loop3: detected capacity change from 0 to 1 [ 1608.742278][ T888] loop0: detected capacity change from 0 to 4 [ 1608.742284][ T889] loop2: detected capacity change from 0 to 4 [ 1608.750553][ T882] loop3: p1 < > p2 < > p4 [ 1608.755213][ T889] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1608.758807][ T882] loop3: partition table partially beyond EOD, truncated [ 1608.758867][ T882] loop3: p1 start 335762607 is beyond EOD, truncated [ 1608.779324][ T882] loop3: p2 size 2 extends beyond EOD, truncated [ 1608.786120][ T882] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1608.797551][ T888] loop0: detected capacity change from 0 to 4 [ 1608.807862][ T889] loop2: detected capacity change from 0 to 4 [ 1608.814229][ T889] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1608.840598][ T882] loop3: detected capacity change from 0 to 1 [ 1608.900145][ T381] loop3: p1 < > p2 < > p4 [ 1608.904611][ T381] loop3: partition table partially beyond EOD, truncated [ 1608.911744][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1608.918390][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1608.925111][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1608.933051][ T882] loop3: p1 < > p2 < > p4 [ 1608.937448][ T882] loop3: partition table partially beyond EOD, truncated [ 1608.944514][ T882] loop3: p1 start 335762607 is beyond EOD, truncated [ 1608.951187][ T882] loop3: p2 size 2 extends beyond EOD, truncated [ 1608.957853][ T882] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:11 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500007400004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000050020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000068000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:11 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000400080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100002e0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100feffffffffffffff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000060020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1609.020842][ T381] loop3: p1 < > p2 < > p4 [ 1609.025283][ T381] loop3: partition table partially beyond EOD, truncated [ 1609.032430][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1609.039093][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1609.044944][ T893] loop4: detected capacity change from 0 to 1 [ 1609.056282][ T892] loop2: detected capacity change from 0 to 4 [ 1609.062935][ T898] loop0: detected capacity change from 0 to 4 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000070020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1609.072894][ T892] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1609.080458][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1609.110879][ T898] loop0: detected capacity change from 0 to 4 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000080020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:11 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000006c000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000a0020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100ffffffffffffffff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1609.123922][ T892] loop2: detected capacity change from 0 to 4 [ 1609.132417][ T892] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1609.148073][ T893] loop4: detected capacity change from 0 to 1 [ 1609.203414][ T913] loop3: detected capacity change from 0 to 1 [ 1609.210127][ T915] loop2: detected capacity change from 0 to 4 [ 1609.217729][ T915] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1609.230258][ T913] loop3: p1 < > p2 < > p4 [ 1609.234692][ T913] loop3: partition table partially beyond EOD, truncated [ 1609.241782][ T913] loop3: p1 start 335762607 is beyond EOD, truncated [ 1609.248502][ T913] loop3: p2 size 2 extends beyond EOD, truncated [ 1609.255369][ T913] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1609.262918][ T915] loop2: detected capacity change from 0 to 4 [ 1609.269273][ T915] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1609.304214][ T913] loop3: detected capacity change from 0 to 1 [ 1609.340073][ T381] loop3: p1 < > p2 < > p4 [ 1609.344470][ T381] loop3: partition table partially beyond EOD, truncated [ 1609.351665][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1609.358330][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1609.364969][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1609.372852][ T913] loop3: p1 < > p2 < > p4 [ 1609.377317][ T913] loop3: partition table partially beyond EOD, truncated [ 1609.384373][ T913] loop3: p1 start 335762607 is beyond EOD, truncated [ 1609.391050][ T913] loop3: p2 size 2 extends beyond EOD, truncated 09:12:12 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500007a00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000b0020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100003f0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000074000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:12 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000800400080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000020000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1609.398274][ T913] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000180020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000260020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1609.426555][ T922] loop0: detected capacity change from 0 to 4 [ 1609.432963][ T923] loop2: detected capacity change from 0 to 4 [ 1609.433667][ T925] loop4: detected capacity change from 0 to 1 09:12:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000770020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000400000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1609.482645][ T922] loop0: detected capacity change from 0 to 4 [ 1609.483560][ T923] loop2: detected capacity change from 0 to 4 [ 1609.515064][ T932] loop3: detected capacity change from 0 to 1 09:12:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000007a000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000030000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1609.527409][ T925] loop4: detected capacity change from 0 to 1 [ 1609.548529][ T938] loop0: detected capacity change from 0 to 4 [ 1609.570989][ T940] loop2: detected capacity change from 0 to 4 [ 1609.580257][ T932] loop3: p1 < > p2 < > p4 [ 1609.581039][ T938] loop0: detected capacity change from 0 to 4 [ 1609.584671][ T932] loop3: partition table partially beyond EOD, truncated [ 1609.598163][ T932] loop3: p1 start 335762607 is beyond EOD, truncated [ 1609.604846][ T932] loop3: p2 size 2 extends beyond EOD, truncated [ 1609.611396][ T932] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1609.619964][ T940] loop2: detected capacity change from 0 to 4 [ 1609.673632][ T932] loop3: detected capacity change from 0 to 1 [ 1609.710083][ T381] loop3: p1 < > p2 < > p4 [ 1609.714472][ T381] loop3: partition table partially beyond EOD, truncated [ 1609.721605][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1609.728276][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1609.734985][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1609.743138][ T932] loop3: p1 < > p2 < > p4 [ 1609.747595][ T932] loop3: partition table partially beyond EOD, truncated [ 1609.754783][ T932] loop3: p1 start 335762607 is beyond EOD, truncated [ 1609.761558][ T932] loop3: p2 size 2 extends beyond EOD, truncated [ 1609.768244][ T932] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:12 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500008900004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020007e0020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000000017c000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000480000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:12 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000480080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000040000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1609.820701][ T381] loop3: p1 < > p2 < > p4 [ 1609.825150][ T381] loop3: partition table partially beyond EOD, truncated [ 1609.832354][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1609.839033][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1609.848100][ T945] loop4: detected capacity change from 0 to 1 [ 1609.855378][ T948] loop0: detected capacity change from 0 to 4 [ 1609.857920][ T950] loop2: detected capacity change from 0 to 4 09:12:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000fe0020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000040220000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1609.864566][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000320000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:12 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffff80000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000020420000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1609.910945][ T948] loop0: detected capacity change from 0 to 4 [ 1609.921199][ T950] loop2: detected capacity change from 0 to 4 [ 1609.923867][ T953] loop3: detected capacity change from 0 to 1 09:12:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100004c0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1609.985849][ T953] loop3: p1 < > p2 < > p4 [ 1609.990306][ T953] loop3: partition table partially beyond EOD, truncated [ 1609.992506][ T966] loop0: detected capacity change from 0 to 4 [ 1609.997411][ T953] loop3: p1 start 335762607 is beyond EOD, truncated [ 1610.010071][ T953] loop3: p2 size 2 extends beyond EOD, truncated [ 1610.019318][ T945] loop4: detected capacity change from 0 to 1 [ 1610.025887][ T953] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1610.040826][ T966] loop0: detected capacity change from 0 to 4 [ 1610.066151][ T953] loop3: detected capacity change from 0 to 1 [ 1610.110279][ T953] loop3: p1 < > p2 < > p4 [ 1610.114731][ T953] loop3: partition table partially beyond EOD, truncated [ 1610.121907][ T953] loop3: p1 start 335762607 is beyond EOD, truncated [ 1610.128570][ T953] loop3: p2 size 2 extends beyond EOD, truncated [ 1610.135272][ T953] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:13 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500009000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000060420000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000050000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffff81000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:13 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000004c0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000600000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1610.260664][ T381] loop3: p1 < > p2 < > p4 [ 1610.265091][ T381] loop3: partition table partially beyond EOD, truncated [ 1610.272163][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1610.278826][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1610.284021][ T971] loop2: detected capacity change from 0 to 4 [ 1610.298911][ T977] loop0: detected capacity change from 0 to 4 09:12:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000520000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000620000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000040620000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1610.307848][ T975] loop4: detected capacity change from 0 to 1 [ 1610.315172][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1610.350645][ T977] loop0: detected capacity change from 0 to 4 09:12:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffff82000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000720000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1610.350864][ T971] loop2: detected capacity change from 0 to 4 09:12:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000680000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1610.396079][ T975] loop4: detected capacity change from 0 to 1 [ 1610.419687][ T991] loop3: detected capacity change from 0 to 1 [ 1610.420147][ T993] loop0: detected capacity change from 0 to 4 [ 1610.470198][ T991] loop3: p1 < > p2 < > p4 [ 1610.470941][ T993] loop0: detected capacity change from 0 to 4 [ 1610.474603][ T991] loop3: partition table partially beyond EOD, truncated [ 1610.487765][ T991] loop3: p1 start 335762607 is beyond EOD, truncated [ 1610.494438][ T991] loop3: p2 size 2 extends beyond EOD, truncated [ 1610.501181][ T991] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1610.509102][ T381] loop3: p1 < > p2 < > p4 [ 1610.513534][ T381] loop3: partition table partially beyond EOD, truncated [ 1610.520598][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1610.527258][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1610.534017][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1610.596103][ T991] loop3: detected capacity change from 0 to 1 [ 1610.660067][ T381] loop3: p1 < > p2 < > p4 [ 1610.664463][ T381] loop3: partition table partially beyond EOD, truncated [ 1610.671603][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1610.678267][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1610.684967][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1610.693078][ T991] loop3: p1 < > p2 < > p4 [ 1610.697478][ T991] loop3: partition table partially beyond EOD, truncated 09:12:13 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000c000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffff85000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000a20000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000060000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:13 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000680080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100006c0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1610.704542][ T991] loop3: p1 start 335762607 is beyond EOD, truncated [ 1610.711214][ T991] loop3: p2 size 2 extends beyond EOD, truncated [ 1610.717806][ T991] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1610.745958][ T998] loop2: detected capacity change from 0 to 4 [ 1610.752408][ T1000] loop0: detected capacity change from 0 to 4 09:12:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000b20000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000001820000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1610.757920][ T1002] loop4: detected capacity change from 0 to 1 [ 1610.799150][ T1008] loop3: detected capacity change from 0 to 1 [ 1610.811216][ T998] loop2: detected capacity change from 0 to 4 [ 1610.821422][ T1008] loop3: p1 < > p2 < > p4 [ 1610.821655][ T1000] loop0: detected capacity change from 0 to 4 [ 1610.825857][ T1008] loop3: partition table partially beyond EOD, truncated [ 1610.838938][ T1008] loop3: p1 start 335762607 is beyond EOD, truncated 09:12:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000002020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000089000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000002620000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1610.845631][ T1008] loop3: p2 size 2 extends beyond EOD, truncated [ 1610.852703][ T1008] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1610.862099][ T381] loop3: p1 < > p2 < > p4 [ 1610.866605][ T381] loop3: partition table partially beyond EOD, truncated [ 1610.873718][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1610.880395][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000070000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1610.899835][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1610.902743][ T1002] loop4: detected capacity change from 0 to 1 [ 1610.919748][ T1018] loop2: detected capacity change from 0 to 4 [ 1610.964648][ T1008] loop3: detected capacity change from 0 to 1 [ 1610.971792][ T1018] loop2: detected capacity change from 0 to 4 [ 1611.020107][ T1008] loop3: p1 < > p2 < > p4 [ 1611.024514][ T1008] loop3: partition table partially beyond EOD, truncated [ 1611.031663][ T1008] loop3: p1 start 335762607 is beyond EOD, truncated [ 1611.038329][ T1008] loop3: p2 size 2 extends beyond EOD, truncated [ 1611.044994][ T1008] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:13 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000ec00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100016f0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000003f20000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffff8c000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:13 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000006c0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000080000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1611.110702][ T381] loop3: p1 < > p2 < > p4 [ 1611.115110][ T381] loop3: partition table partially beyond EOD, truncated [ 1611.122238][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1611.128925][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1611.137429][ T1024] loop0: detected capacity change from 0 to 4 [ 1611.145769][ T1028] loop2: detected capacity change from 0 to 4 [ 1611.154255][ T1023] loop4: detected capacity change from 0 to 1 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000004020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000007720000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1611.154373][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000007e20000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000000000a0000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000fffe20000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1611.211150][ T1028] loop2: detected capacity change from 0 to 4 [ 1611.220314][ T1031] loop3: detected capacity change from 0 to 1 [ 1611.220683][ T1024] loop0: detected capacity change from 0 to 4 09:12:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010001700000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1611.260289][ T1023] loop4: detected capacity change from 0 to 1 [ 1611.280106][ T1045] loop0: detected capacity change from 0 to 4 [ 1611.286589][ T1031] loop3: p1 < > p2 < > p4 [ 1611.291062][ T1031] loop3: partition table partially beyond EOD, truncated [ 1611.298115][ T1031] loop3: p1 start 335762607 is beyond EOD, truncated [ 1611.304902][ T1031] loop3: p2 size 2 extends beyond EOD, truncated [ 1611.311762][ T1031] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1611.320198][ T381] loop3: p1 < > p2 < > p4 [ 1611.324615][ T381] loop3: partition table partially beyond EOD, truncated [ 1611.331712][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1611.338374][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1611.345157][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1611.354063][ T1045] loop0: detected capacity change from 0 to 4 [ 1611.394620][ T1031] loop3: detected capacity change from 0 to 1 [ 1611.450129][ T381] loop3: p1 < > p2 < > p4 [ 1611.454556][ T381] loop3: partition table partially beyond EOD, truncated [ 1611.461666][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1611.468311][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1611.475048][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1611.482805][ T1031] loop3: p1 < > p2 < > p4 [ 1611.487204][ T1031] loop3: partition table partially beyond EOD, truncated [ 1611.494387][ T1031] loop3: p1 start 335762607 is beyond EOD, truncated [ 1611.501136][ T1031] loop3: p2 size 2 extends beyond EOD, truncated [ 1611.507901][ T1031] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:14 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000fe00004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffffa1000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000feff20000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000090000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:14 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000740080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010001710000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1611.540662][ T381] loop3: p1 < > p2 < > p4 [ 1611.545067][ T381] loop3: partition table partially beyond EOD, truncated [ 1611.552198][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1611.558864][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1611.570411][ T1052] loop2: detected capacity change from 0 to 4 [ 1611.572562][ T1053] loop0: detected capacity change from 0 to 4 [ 1611.577438][ T1050] loop4: detected capacity change from 0 to 1 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000060000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1611.585379][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000000b000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000000001a2000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000000c000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1611.620994][ T1053] loop0: detected capacity change from 0 to 4 [ 1611.637627][ T1052] loop2: detected capacity change from 0 to 4 09:12:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000740000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000a0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1611.671707][ T1066] loop3: detected capacity change from 0 to 1 [ 1611.684302][ T1050] loop4: detected capacity change from 0 to 1 [ 1611.698691][ T1069] loop0: detected capacity change from 0 to 4 [ 1611.710150][ T381] loop3: p1 < > p2 < > p4 [ 1611.714563][ T381] loop3: partition table partially beyond EOD, truncated [ 1611.721643][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1611.726478][ T1071] loop2: detected capacity change from 0 to 4 [ 1611.728365][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1611.728790][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1611.748821][ T1066] loop3: p1 < > p2 < > p4 [ 1611.753271][ T1066] loop3: partition table partially beyond EOD, truncated [ 1611.760440][ T1066] loop3: p1 start 335762607 is beyond EOD, truncated [ 1611.767095][ T1066] loop3: p2 size 2 extends beyond EOD, truncated [ 1611.773754][ T1066] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1611.774682][ T1069] loop0: detected capacity change from 0 to 4 [ 1611.787572][ T1071] loop2: detected capacity change from 0 to 4 [ 1611.824492][ T1066] loop3: detected capacity change from 0 to 1 [ 1611.880067][ T1066] loop3: p1 < > p2 < > p4 [ 1611.884472][ T1066] loop3: partition table partially beyond EOD, truncated [ 1611.891536][ T1066] loop3: p1 start 335762607 is beyond EOD, truncated [ 1611.898194][ T1066] loop3: p2 size 2 extends beyond EOD, truncated [ 1611.904861][ T1066] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:14 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500001001004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffffa5000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000014000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:14 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000007a0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000b0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100007a0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1611.960785][ T381] loop3: p1 < > p2 < > p4 [ 1611.965209][ T381] loop3: partition table partially beyond EOD, truncated [ 1611.972398][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1611.979064][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1611.992383][ T1077] loop4: detected capacity change from 0 to 1 [ 1611.996717][ T1080] loop0: detected capacity change from 0 to 4 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000015000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000220000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1612.006977][ T1081] loop2: detected capacity change from 0 to 4 [ 1612.016422][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000320000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffffa6000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100017c0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000420000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1612.051078][ T1081] loop2: detected capacity change from 0 to 4 [ 1612.051087][ T1080] loop0: detected capacity change from 0 to 4 [ 1612.102129][ T1077] loop4: detected capacity change from 0 to 1 [ 1612.110728][ T1091] loop0: detected capacity change from 0 to 4 [ 1612.128928][ T1096] loop3: detected capacity change from 0 to 1 [ 1612.145316][ T1091] loop0: detected capacity change from 0 to 4 [ 1612.170250][ T381] loop3: p1 < > p2 < > p4 [ 1612.174691][ T381] loop3: partition table partially beyond EOD, truncated [ 1612.181885][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1612.188577][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1612.195369][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1612.203683][ T1096] loop3: p1 < > p2 < > p4 [ 1612.208160][ T1096] loop3: partition table partially beyond EOD, truncated [ 1612.215375][ T1096] loop3: p1 start 335762607 is beyond EOD, truncated [ 1612.222054][ T1096] loop3: p2 size 2 extends beyond EOD, truncated [ 1612.228640][ T1096] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1612.294478][ T1096] loop3: detected capacity change from 0 to 1 [ 1612.330082][ T381] loop3: p1 < > p2 < > p4 [ 1612.334494][ T381] loop3: partition table partially beyond EOD, truncated 09:12:15 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500007c01004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000520000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffffa9000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000c0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1612.341552][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1612.348275][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1612.355023][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1612.362824][ T1096] loop3: p1 < > p2 < > p4 [ 1612.367226][ T1096] loop3: partition table partially beyond EOD, truncated [ 1612.374332][ T1096] loop3: p1 start 335762607 is beyond EOD, truncated [ 1612.381084][ T1096] loop3: p2 size 2 extends beyond EOD, truncated [ 1612.387635][ T1096] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:15 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000017c0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100028e0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000620000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000720000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1612.416989][ T1101] loop0: detected capacity change from 0 to 4 [ 1612.417422][ T1104] loop2: detected capacity change from 0 to 4 [ 1612.433554][ T1106] loop4: detected capacity change from 0 to 1 09:12:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000820000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000000001aa000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1612.478815][ T1112] loop3: detected capacity change from 0 to 1 [ 1612.498300][ T1104] loop2: detected capacity change from 0 to 4 [ 1612.499789][ T1101] loop0: detected capacity change from 0 to 4 [ 1612.520211][ T1112] loop3: p1 < > p2 < > p4 09:12:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000a20000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000b20000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1612.524640][ T1112] loop3: partition table partially beyond EOD, truncated [ 1612.531763][ T1112] loop3: p1 start 335762607 is beyond EOD, truncated [ 1612.538427][ T1112] loop3: p2 size 2 extends beyond EOD, truncated [ 1612.545420][ T1112] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1612.582502][ T1106] loop4: detected capacity change from 0 to 1 [ 1612.593911][ T1112] loop3: detected capacity change from 0 to 1 [ 1612.630323][ T381] loop3: p1 < > p2 < > p4 [ 1612.634721][ T381] loop3: partition table partially beyond EOD, truncated [ 1612.641924][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1612.648583][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1612.655436][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1612.663441][ T1112] loop3: p1 < > p2 < > p4 [ 1612.667849][ T1112] loop3: partition table partially beyond EOD, truncated [ 1612.675012][ T1112] loop3: p1 start 335762607 is beyond EOD, truncated [ 1612.681784][ T1112] loop3: p2 size 2 extends beyond EOD, truncated [ 1612.688398][ T1112] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:15 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000a201004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100028f0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffffbf000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000d0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000001820000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:15 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068ffffff800080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1612.750642][ T381] loop3: p1 < > p2 < > p4 [ 1612.755064][ T381] loop3: partition table partially beyond EOD, truncated [ 1612.762188][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1612.768875][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1612.781641][ T1131] loop0: detected capacity change from 0 to 4 [ 1612.783356][ T1132] loop2: detected capacity change from 0 to 4 [ 1612.791529][ T1127] loop4: detected capacity change from 0 to 1 09:12:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000002620000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000007720000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1612.800811][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:15 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffffc9000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000007e20000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010002900000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1612.842586][ T1131] loop0: detected capacity change from 0 to 4 [ 1612.848977][ T1132] loop2: detected capacity change from 0 to 4 [ 1612.864465][ T1127] loop4: detected capacity change from 0 to 1 [ 1612.879867][ T1141] loop3: detected capacity change from 0 to 1 09:12:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000e0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1612.902910][ T1145] loop0: detected capacity change from 0 to 4 [ 1612.919089][ T1148] loop2: detected capacity change from 0 to 4 [ 1612.930163][ T1141] loop3: p1 < > p2 < > p4 [ 1612.934591][ T1141] loop3: partition table partially beyond EOD, truncated [ 1612.941703][ T1141] loop3: p1 start 335762607 is beyond EOD, truncated [ 1612.948351][ T1141] loop3: p2 size 2 extends beyond EOD, truncated [ 1612.955011][ T1141] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1612.955968][ T1145] loop0: detected capacity change from 0 to 4 [ 1612.974014][ T1148] loop2: detected capacity change from 0 to 4 [ 1613.020301][ T1141] loop3: detected capacity change from 0 to 1 [ 1613.070179][ T381] loop3: p1 < > p2 < > p4 [ 1613.074582][ T381] loop3: partition table partially beyond EOD, truncated [ 1613.081695][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1613.088339][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1613.095089][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1613.103021][ T1141] loop3: p1 < > p2 < > p4 [ 1613.107418][ T1141] loop3: partition table partially beyond EOD, truncated [ 1613.114603][ T1141] loop3: p1 start 335762607 is beyond EOD, truncated [ 1613.121300][ T1141] loop3: p2 size 2 extends beyond EOD, truncated [ 1613.127870][ T1141] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:16 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000b001004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000fe20000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:16 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000001a20080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffffe4000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010001a20000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000f0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1613.170897][ T381] loop3: p1 < > p2 < > p4 [ 1613.175312][ T381] loop3: partition table partially beyond EOD, truncated [ 1613.182384][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1613.189123][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1613.204474][ T1152] loop0: detected capacity change from 0 to 4 [ 1613.211019][ T1157] loop2: detected capacity change from 0 to 4 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000030000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000040000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000000001e6000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000060000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1613.218974][ T1158] loop4: detected capacity change from 0 to 1 [ 1613.219361][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000fffe000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1613.271374][ T1152] loop0: detected capacity change from 0 to 4 [ 1613.278958][ T1157] loop2: detected capacity change from 0 to 4 [ 1613.285885][ T1163] loop3: detected capacity change from 0 to 1 09:12:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100c0ed0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1613.321262][ T1163] loop3: p1 < > p2 < > p4 [ 1613.325776][ T1163] loop3: partition table partially beyond EOD, truncated [ 1613.332898][ T1163] loop3: p1 start 335762607 is beyond EOD, truncated [ 1613.339565][ T1163] loop3: p2 size 2 extends beyond EOD, truncated [ 1613.348994][ T1158] loop4: detected capacity change from 0 to 1 [ 1613.366829][ T1163] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1613.377075][ T381] loop3: p1 < > p2 < > p4 [ 1613.379413][ T1174] loop0: detected capacity change from 0 to 4 [ 1613.381522][ T381] loop3: partition table partially beyond EOD, truncated [ 1613.381621][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1613.401241][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1613.407846][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1613.416060][ T1174] loop0: detected capacity change from 0 to 4 [ 1613.473529][ T1163] loop3: detected capacity change from 0 to 1 [ 1613.520173][ T381] loop3: p1 < > p2 < > p4 [ 1613.524584][ T381] loop3: partition table partially beyond EOD, truncated [ 1613.531659][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1613.538318][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1613.544994][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1613.552908][ T1163] loop3: p1 < > p2 < > p4 [ 1613.557329][ T1163] loop3: partition table partially beyond EOD, truncated 09:12:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000000011ea000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000000b000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000100000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:16 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068ffffffc90080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:16 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000402004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100fffe0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1613.564445][ T1163] loop3: p1 start 335762607 is beyond EOD, truncated [ 1613.571104][ T1163] loop3: p2 size 2 extends beyond EOD, truncated [ 1613.577749][ T1163] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1613.606523][ T1181] loop2: detected capacity change from 0 to 4 [ 1613.609892][ T1179] loop0: detected capacity change from 0 to 4 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000000c000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000014000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1613.615222][ T1183] loop4: detected capacity change from 0 to 1 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000015000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000000000ec000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000030000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1613.670817][ T1181] loop2: detected capacity change from 0 to 4 [ 1613.688199][ T1191] loop3: detected capacity change from 0 to 1 [ 1613.696681][ T1179] loop0: detected capacity change from 0 to 4 09:12:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000fff0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000110000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000fe000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1613.723241][ T1183] loop4: detected capacity change from 0 to 1 [ 1613.740458][ T1191] loop3: p1 < > p2 < > p4 [ 1613.744868][ T1191] loop3: partition table partially beyond EOD, truncated [ 1613.751956][ T1191] loop3: p1 start 335762607 is beyond EOD, truncated [ 1613.758619][ T1191] loop3: p2 size 2 extends beyond EOD, truncated 09:12:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffffee000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:16 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068ffffffee0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1613.767839][ T1200] loop0: detected capacity change from 0 to 4 [ 1613.775537][ T1191] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1613.786049][ T1202] loop2: detected capacity change from 0 to 4 [ 1613.813258][ T1200] loop0: detected capacity change from 0 to 4 [ 1613.822387][ T1191] loop3: detected capacity change from 0 to 1 [ 1613.829343][ T1202] loop2: detected capacity change from 0 to 4 [ 1613.860169][ T1191] loop3: p1 < > p2 < > p4 [ 1613.864632][ T1191] loop3: partition table partially beyond EOD, truncated [ 1613.871800][ T1191] loop3: p1 start 335762607 is beyond EOD, truncated [ 1613.878467][ T1191] loop3: p2 size 2 extends beyond EOD, truncated [ 1613.880346][ T1209] loop4: detected capacity change from 0 to 1 [ 1613.899978][ T1191] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1613.907874][ T381] loop3: p1 < > p2 < > p4 [ 1613.912311][ T381] loop3: partition table partially beyond EOD, truncated [ 1613.919405][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1613.926120][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1613.932811][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:16 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000c02004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000feff0020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000fffffff6000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100feff0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000120000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020020020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1614.001552][ T1216] loop0: detected capacity change from 0 to 4 [ 1614.001526][ T1217] loop2: detected capacity change from 0 to 4 [ 1614.023934][ T1209] loop4: detected capacity change from 0 to 1 [ 1614.035394][ T1216] loop0: detected capacity change from 0 to 4 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020030020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:16 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000fffffffb000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000800000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020040020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1614.047073][ T1222] loop3: detected capacity change from 0 to 1 [ 1614.057580][ T1217] loop2: detected capacity change from 0 to 4 09:12:16 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068fffffff60080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1614.100244][ T381] loop3: p1 < > p2 < > p4 [ 1614.104677][ T381] loop3: partition table partially beyond EOD, truncated [ 1614.111781][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1614.118446][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1614.125319][ T1230] loop0: detected capacity change from 0 to 4 09:12:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020050020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1614.150753][ T1230] EXT4-fs (loop0): Invalid log block size: 8 [ 1614.153969][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1614.165637][ T381] loop3: p1 < > p2 < > p4 [ 1614.170107][ T381] loop3: partition table partially beyond EOD, truncated [ 1614.177206][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1614.183904][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1614.190585][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1614.198840][ T1222] loop3: p1 < > p2 < > p4 [ 1614.198938][ T1235] loop4: detected capacity change from 0 to 1 [ 1614.203267][ T1222] loop3: partition table partially beyond EOD, truncated [ 1614.216480][ T1222] loop3: p1 start 335762607 is beyond EOD, truncated [ 1614.223154][ T1222] loop3: p2 size 2 extends beyond EOD, truncated [ 1614.230055][ T1222] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1614.230654][ T1230] loop0: detected capacity change from 0 to 4 [ 1614.243495][ T1230] EXT4-fs (loop0): Invalid log block size: 8 09:12:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000fffffdfd000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000140000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020060020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:17 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000003004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010040000800000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020070020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020080020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1614.297039][ T1237] loop0: detected capacity change from 0 to 4 [ 1614.305506][ T1241] loop2: detected capacity change from 0 to 4 [ 1614.317297][ T1235] loop4: detected capacity change from 0 to 1 [ 1614.323420][ T1237] EXT4-fs (loop0): Invalid log block size: 8 [ 1614.335671][ T1245] loop3: detected capacity change from 0 to 1 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000200a0020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000200b0020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000fffffffd000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1614.370920][ T1241] loop2: detected capacity change from 0 to 4 [ 1614.377603][ T1245] loop3: p1 < > p2 < > p4 [ 1614.382063][ T1245] loop3: partition table partially beyond EOD, truncated [ 1614.389138][ T1245] loop3: p1 start 335762607 is beyond EOD, truncated [ 1614.395892][ T1245] loop3: p2 size 2 extends beyond EOD, truncated [ 1614.405824][ T1245] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1614.406890][ T1237] loop0: detected capacity change from 0 to 4 09:12:17 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068fffffdfd0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020180020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1614.432785][ T1237] EXT4-fs (loop0): Invalid log block size: 8 09:12:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000220000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000001000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020260020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1614.475737][ T1245] loop3: detected capacity change from 0 to 1 [ 1614.493256][ T1263] loop0: detected capacity change from 0 to 4 [ 1614.493489][ T1262] loop2: detected capacity change from 0 to 4 [ 1614.500240][ T1263] EXT4-fs (loop0): Invalid log block size: 256 [ 1614.520098][ T381] loop3: p1 < > p2 < > p4 [ 1614.524553][ T381] loop3: partition table partially beyond EOD, truncated [ 1614.531714][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1614.538375][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1614.545385][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1614.553320][ T1267] loop4: detected capacity change from 0 to 1 [ 1614.555920][ T1263] loop0: detected capacity change from 0 to 4 [ 1614.566370][ T1262] loop2: detected capacity change from 0 to 4 [ 1614.566585][ T1263] EXT4-fs (loop0): Invalid log block size: 256 [ 1614.572852][ T381] loop3: p1 < > p2 < > p4 [ 1614.583031][ T381] loop3: partition table partially beyond EOD, truncated [ 1614.590200][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1614.596925][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1614.603540][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1614.611837][ T1245] loop3: p1 < > p2 < > p4 [ 1614.616231][ T1245] loop3: partition table partially beyond EOD, truncated [ 1614.623300][ T1245] loop3: p1 start 335762607 is beyond EOD, truncated [ 1614.629991][ T1245] loop3: p2 size 2 extends beyond EOD, truncated [ 1614.637099][ T1245] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1614.657121][ T1267] loop4: detected capacity change from 0 to 1 09:12:17 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000204004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000fffffffe000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020770020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000002000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100002e0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1614.680749][ T381] loop3: p1 < > p2 < > p4 [ 1614.685171][ T381] loop3: partition table partially beyond EOD, truncated [ 1614.692371][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1614.699033][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1614.710816][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1614.714521][ T1275] loop0: detected capacity change from 0 to 4 [ 1614.718246][ T1273] loop2: detected capacity change from 0 to 4 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000207e0020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1614.725285][ T1275] EXT4-fs (loop0): Invalid log block size: 512 09:12:17 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068fffffffe0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020fe0020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000fffffffffffffffe000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1614.763614][ T1273] loop2: detected capacity change from 0 to 4 [ 1614.773501][ T1275] loop0: detected capacity change from 0 to 4 [ 1614.781765][ T1275] EXT4-fs (loop0): Invalid log block size: 512 [ 1614.798859][ T1282] loop4: detected capacity change from 0 to 1 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020040220000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1614.808194][ T1284] loop3: detected capacity change from 0 to 1 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000320000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000402000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1614.840149][ T1284] loop3: p1 < > p2 < > p4 [ 1614.844623][ T1284] loop3: partition table partially beyond EOD, truncated [ 1614.851718][ T1284] loop3: p1 start 335762607 is beyond EOD, truncated [ 1614.858479][ T1284] loop3: p2 size 2 extends beyond EOD, truncated [ 1614.865389][ T1284] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1614.892789][ T1282] loop4: detected capacity change from 0 to 1 [ 1614.906717][ T1293] loop0: detected capacity change from 0 to 4 [ 1614.914084][ T1293] EXT4-fs (loop0): Invalid log block size: 516 [ 1614.943639][ T1284] loop3: detected capacity change from 0 to 1 [ 1614.951024][ T1293] loop0: detected capacity change from 0 to 4 [ 1614.960104][ T1293] EXT4-fs (loop0): Invalid log block size: 516 [ 1614.980123][ T381] loop3: p1 < > p2 < > p4 [ 1614.984538][ T381] loop3: partition table partially beyond EOD, truncated [ 1614.991714][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1614.998376][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1615.005139][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1615.013402][ T1284] loop3: p1 < > p2 < > p4 [ 1615.017825][ T1284] loop3: partition table partially beyond EOD, truncated [ 1615.024879][ T1284] loop3: p1 start 335762607 is beyond EOD, truncated [ 1615.031568][ T1284] loop3: p2 size 2 extends beyond EOD, truncated 09:12:17 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000604004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000480000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000fff000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020020420000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:17 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000fff0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000003000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1615.038229][ T1284] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020060420000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1615.068962][ T1301] loop2: detected capacity change from 0 to 4 [ 1615.071942][ T1297] loop4: detected capacity change from 0 to 1 [ 1615.088021][ T1303] loop0: detected capacity change from 0 to 4 [ 1615.094869][ T381] loop3: p1 < > p2 < > p4 [ 1615.095299][ T1303] EXT4-fs (loop0): Invalid log block size: 768 [ 1615.099290][ T381] loop3: partition table partially beyond EOD, truncated [ 1615.112554][ T381] loop3: p1 start 335762607 is beyond EOD, truncated 09:12:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000520000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffefff000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000620000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1615.119226][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1615.129423][ T1301] loop2: detected capacity change from 0 to 4 [ 1615.137227][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1615.146136][ T1303] loop0: detected capacity change from 0 to 4 [ 1615.155537][ T1303] EXT4-fs (loop0): Invalid log block size: 768 09:12:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100004c0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020040620000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1615.184214][ T1297] loop4: detected capacity change from 0 to 1 [ 1615.197678][ T1311] loop3: detected capacity change from 0 to 1 [ 1615.224443][ T1317] loop2: detected capacity change from 0 to 4 [ 1615.240368][ T1311] loop3: p1 < > p2 < > p4 [ 1615.244809][ T1311] loop3: partition table partially beyond EOD, truncated [ 1615.251888][ T1311] loop3: p1 start 335762607 is beyond EOD, truncated [ 1615.258595][ T1311] loop3: p2 size 2 extends beyond EOD, truncated [ 1615.265218][ T1311] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1615.266005][ T1317] loop2: detected capacity change from 0 to 4 [ 1615.329492][ T1311] loop3: detected capacity change from 0 to 1 [ 1615.360156][ T1311] loop3: p1 < > p2 < > p4 [ 1615.364560][ T1311] loop3: partition table partially beyond EOD, truncated [ 1615.371619][ T1311] loop3: p1 start 335762607 is beyond EOD, truncated [ 1615.378351][ T1311] loop3: p2 size 2 extends beyond EOD, truncated [ 1615.384986][ T1311] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:18 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000005004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000007fffffff000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000004000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000720000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:18 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068ffffefff0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000600000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1615.440760][ T381] loop3: p1 < > p2 < > p4 [ 1615.445170][ T381] loop3: partition table partially beyond EOD, truncated [ 1615.452313][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1615.457094][ T1321] loop2: detected capacity change from 0 to 4 [ 1615.459090][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1615.482533][ T1327] loop0: detected capacity change from 0 to 4 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000a20000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000b20000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1615.482988][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1615.497228][ T1329] loop4: detected capacity change from 0 to 1 [ 1615.504093][ T1327] EXT4-fs (loop0): Invalid log block size: 1024 [ 1615.514134][ T1321] loop2: detected capacity change from 0 to 4 09:12:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ffffffff000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020001820000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1615.541160][ T1331] loop3: detected capacity change from 0 to 1 [ 1615.560737][ T1327] loop0: detected capacity change from 0 to 4 [ 1615.568255][ T1327] EXT4-fs (loop0): Invalid log block size: 1024 [ 1615.580210][ T381] loop3: p1 < > p2 < > p4 [ 1615.584639][ T381] loop3: partition table partially beyond EOD, truncated 09:12:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000680000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020002020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1615.591797][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1615.598457][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1615.605463][ T1342] loop2: detected capacity change from 0 to 4 [ 1615.613972][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1615.624128][ T1329] loop4: detected capacity change from 0 to 1 [ 1615.630365][ T381] loop3: p1 < > p2 < > p4 [ 1615.634786][ T381] loop3: partition table partially beyond EOD, truncated [ 1615.641855][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1615.648516][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1615.655268][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1615.664766][ T1331] loop3: p1 < > p2 < > p4 [ 1615.669158][ T1331] loop3: partition table partially beyond EOD, truncated [ 1615.676257][ T1331] loop3: p1 start 335762607 is beyond EOD, truncated [ 1615.682951][ T1331] loop3: p2 size 2 extends beyond EOD, truncated [ 1615.689676][ T1331] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1615.690653][ T1342] loop2: detected capacity change from 0 to 4 [ 1615.744663][ T1331] loop3: detected capacity change from 0 to 1 [ 1615.800248][ T381] loop3: p1 < > p2 < > p4 [ 1615.804650][ T381] loop3: partition table partially beyond EOD, truncated [ 1615.811696][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1615.818353][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1615.825164][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1615.833188][ T1331] loop3: p1 < > p2 < > p4 [ 1615.837581][ T1331] loop3: partition table partially beyond EOD, truncated [ 1615.844702][ T1331] loop3: p1 start 335762607 is beyond EOD, truncated [ 1615.851374][ T1331] loop3: p2 size 2 extends beyond EOD, truncated [ 1615.857962][ T1331] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:18 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000006004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000005000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000feffffffffffffff000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020002620000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:18 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068ffefffff0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100006c0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1615.910763][ T381] loop3: p1 < > p2 < > p4 [ 1615.915195][ T381] loop3: partition table partially beyond EOD, truncated [ 1615.922364][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1615.929074][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1615.941679][ T1354] loop2: detected capacity change from 0 to 4 [ 1615.943728][ T1355] loop0: detected capacity change from 0 to 4 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020003f20000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020004020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020007720000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1615.955847][ T1353] loop4: detected capacity change from 0 to 1 [ 1615.963197][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1615.970802][ T1355] EXT4-fs (loop0): Invalid log block size: 1280 09:12:18 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000ffffffffffffffff000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020007e20000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1616.013877][ T1354] loop2: detected capacity change from 0 to 4 [ 1616.014451][ T1355] loop0: detected capacity change from 0 to 4 [ 1616.029174][ T1355] EXT4-fs (loop0): Invalid log block size: 1280 [ 1616.053440][ T1353] loop4: detected capacity change from 0 to 1 09:12:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020fffe20000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1616.064179][ T1369] loop3: detected capacity change from 0 to 1 [ 1616.110097][ T1369] loop3: p1 < > p2 < > p4 [ 1616.114574][ T1369] loop3: partition table partially beyond EOD, truncated [ 1616.121670][ T1369] loop3: p1 start 335762607 is beyond EOD, truncated [ 1616.128340][ T1369] loop3: p2 size 2 extends beyond EOD, truncated [ 1616.135104][ T1369] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1616.143137][ T381] loop3: p1 < > p2 < > p4 [ 1616.147531][ T381] loop3: partition table partially beyond EOD, truncated [ 1616.154580][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1616.161253][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1616.168017][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1616.224729][ T1369] loop3: detected capacity change from 0 to 1 [ 1616.290194][ T1369] loop3: p1 < > p2 < > p4 [ 1616.294605][ T1369] loop3: partition table partially beyond EOD, truncated [ 1616.301673][ T1369] loop3: p1 start 335762607 is beyond EOD, truncated [ 1616.308351][ T1369] loop3: p2 size 2 extends beyond EOD, truncated [ 1616.315045][ T1369] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:19 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000406004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000740000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000006000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000002000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020feff20000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:19 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068fdfdffff0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1616.400744][ T381] loop3: p1 < > p2 < > p4 [ 1616.405240][ T381] loop3: partition table partially beyond EOD, truncated [ 1616.412317][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1616.418973][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1616.427833][ T1375] loop4: detected capacity change from 0 to 1 [ 1616.434888][ T1378] loop0: detected capacity change from 0 to 4 [ 1616.437704][ T1380] loop2: detected capacity change from 0 to 4 09:12:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000060000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000000b000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1616.447894][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1616.454878][ T1378] EXT4-fs (loop0): Invalid log block size: 1536 [ 1616.470739][ T1380] loop2: detected capacity change from 0 to 4 [ 1616.481103][ T1383] loop3: detected capacity change from 0 to 1 09:12:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000000c000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000003000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100007a0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1616.501004][ T1378] loop0: detected capacity change from 0 to 4 [ 1616.507587][ T1378] EXT4-fs (loop0): Invalid log block size: 1536 [ 1616.516829][ T1375] loop4: detected capacity change from 0 to 1 [ 1616.523590][ T1383] loop3: p1 < > p2 < > p4 [ 1616.527991][ T1383] loop3: partition table partially beyond EOD, truncated [ 1616.535144][ T1383] loop3: p1 start 335762607 is beyond EOD, truncated [ 1616.541857][ T1383] loop3: p2 size 2 extends beyond EOD, truncated 09:12:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000014000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1616.585702][ T1383] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1616.594948][ T1394] loop2: detected capacity change from 0 to 4 [ 1616.641205][ T1394] loop2: detected capacity change from 0 to 4 [ 1616.649793][ T1383] loop3: detected capacity change from 0 to 1 [ 1616.700100][ T1383] loop3: p1 < > p2 < > p4 [ 1616.704509][ T1383] loop3: partition table partially beyond EOD, truncated [ 1616.711587][ T1383] loop3: p1 start 335762607 is beyond EOD, truncated [ 1616.718252][ T1383] loop3: p2 size 2 extends beyond EOD, truncated [ 1616.724923][ T1383] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:19 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000007004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000406000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:19 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006880ffffff0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000015000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000004000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000fe0000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1616.840826][ T381] loop3: p1 < > p2 < > p4 [ 1616.845277][ T381] loop3: partition table partially beyond EOD, truncated [ 1616.852353][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1616.859087][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1616.869579][ T1402] loop4: detected capacity change from 0 to 1 [ 1616.876019][ T1404] loop2: detected capacity change from 0 to 4 [ 1616.878035][ T1406] loop0: detected capacity change from 0 to 4 09:12:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000220000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000320000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1616.885295][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1616.896030][ T1406] EXT4-fs (loop0): Invalid log block size: 1540 [ 1616.913685][ T1404] loop2: detected capacity change from 0 to 4 [ 1616.921071][ T1406] loop0: detected capacity change from 0 to 4 [ 1616.923529][ T1409] loop3: detected capacity change from 0 to 1 [ 1616.930218][ T1406] EXT4-fs (loop0): Invalid log block size: 1540 09:12:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000005000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000420000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000007000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100007c0100000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1616.955464][ T1402] loop4: detected capacity change from 0 to 1 [ 1616.962545][ T1409] loop3: p1 < > p2 < > p4 [ 1616.966964][ T1409] loop3: partition table partially beyond EOD, truncated [ 1616.974072][ T1409] loop3: p1 start 335762607 is beyond EOD, truncated [ 1616.980753][ T1409] loop3: p2 size 2 extends beyond EOD, truncated [ 1616.994821][ T1409] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1617.020223][ T1421] loop0: detected capacity change from 0 to 4 [ 1617.040282][ T1421] EXT4-fs (loop0): Invalid log block size: 1792 [ 1617.041175][ T1423] loop2: detected capacity change from 0 to 4 [ 1617.055603][ T1409] loop3: detected capacity change from 0 to 1 [ 1617.090339][ T1409] loop3: p1 < > p2 < > p4 [ 1617.094074][ T1423] loop2: detected capacity change from 0 to 4 [ 1617.094746][ T1409] loop3: partition table partially beyond EOD, truncated [ 1617.094841][ T1409] loop3: p1 start 335762607 is beyond EOD, [ 1617.107679][ T1421] loop0: detected capacity change from 0 to 4 [ 1617.107828][ T1409] truncated [ 1617.114467][ T1421] EXT4-fs (loop0): Invalid log block size: 1792 [ 1617.119744][ T1409] loop3: p2 size 2 extends beyond EOD, truncated [ 1617.135743][ T1409] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:20 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000009004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000520000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000006000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:20 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068c9ffffff0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100008f0100000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000008000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1617.190841][ T381] loop3: p1 < > p2 < > p4 [ 1617.195259][ T381] loop3: partition table partially beyond EOD, truncated [ 1617.202428][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1617.209089][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1617.210901][ T1426] loop2: detected capacity change from 0 to 4 [ 1617.224187][ T1430] loop0: detected capacity change from 0 to 4 [ 1617.232764][ T1432] loop4: detected capacity change from 0 to 1 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000620000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000720000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000007000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1617.233279][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1617.246511][ T1430] EXT4-fs (loop0): Invalid log block size: 2048 [ 1617.260945][ T1426] loop2: detected capacity change from 0 to 4 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000820000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000a20100000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000a20000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1617.315055][ T1432] loop4: detected capacity change from 0 to 1 [ 1617.322329][ T1430] loop0: detected capacity change from 0 to 4 [ 1617.328722][ T1430] EXT4-fs (loop0): Invalid log block size: 2048 [ 1617.344274][ T1435] loop3: detected capacity change from 0 to 1 [ 1617.351100][ T1446] loop2: detected capacity change from 0 to 4 [ 1617.390160][ T1435] loop3: p1 < > p2 < > p4 [ 1617.394573][ T1435] loop3: partition table partially beyond EOD, truncated [ 1617.401633][ T1435] loop3: p1 start 335762607 is beyond EOD, truncated [ 1617.408285][ T1435] loop3: p2 size 2 extends beyond EOD, truncated [ 1617.415059][ T1435] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1617.420562][ T1446] loop2: detected capacity change from 0 to 4 [ 1617.483061][ T1435] loop3: detected capacity change from 0 to 1 [ 1617.520132][ T381] loop3: p1 < > p2 < > p4 [ 1617.524531][ T381] loop3: partition table partially beyond EOD, truncated [ 1617.531646][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1617.538292][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1617.545059][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1617.552993][ T1435] loop3: p1 < > p2 < > p4 [ 1617.557426][ T1435] loop3: partition table partially beyond EOD, truncated [ 1617.564462][ T1435] loop3: p1 start 335762607 is beyond EOD, truncated [ 1617.571120][ T1435] loop3: p2 size 2 extends beyond EOD, truncated [ 1617.577932][ T1435] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:20 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000a004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000009000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000b20000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000008000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:20 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068eeffffff0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000ed0100000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1617.620566][ T381] loop3: p1 < > p2 < > p4 [ 1617.624973][ T381] loop3: partition table partially beyond EOD, truncated [ 1617.632108][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1617.638845][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1617.656135][ T1452] loop4: detected capacity change from 0 to 1 [ 1617.657100][ T1457] loop0: detected capacity change from 0 to 4 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020001820000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020002620000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000009000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1617.662544][ T1459] loop2: detected capacity change from 0 to 4 [ 1617.669894][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1617.674512][ T1457] EXT4-fs (loop0): Invalid log block size: 2304 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020007720000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1617.731455][ T1459] loop2: detected capacity change from 0 to 4 [ 1617.744385][ T1457] loop0: detected capacity change from 0 to 4 [ 1617.758209][ T1468] loop3: detected capacity change from 0 to 1 [ 1617.763886][ T1457] EXT4-fs (loop0): Invalid log block size: 2304 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020007e20000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000fe20000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1617.779313][ T1452] loop4: detected capacity change from 0 to 1 [ 1617.820033][ T1468] loop3: p1 < > p2 < > p4 [ 1617.824441][ T1468] loop3: partition table partially beyond EOD, truncated [ 1617.831647][ T1468] loop3: p1 start 335762607 is beyond EOD, truncated [ 1617.838315][ T1468] loop3: p2 size 2 extends beyond EOD, truncated [ 1617.849557][ T1468] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1617.894062][ T1468] loop3: detected capacity change from 0 to 1 [ 1617.960118][ T381] loop3: p1 < > p2 < > p4 [ 1617.964550][ T381] loop3: partition table partially beyond EOD, truncated [ 1617.971599][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1617.978340][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1617.985191][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1617.993191][ T1468] loop3: p1 < > p2 < > p4 [ 1617.997590][ T1468] loop3: partition table partially beyond EOD, truncated [ 1618.004661][ T1468] loop3: p1 start 335762607 is beyond EOD, truncated [ 1618.011440][ T1468] loop3: p2 size 2 extends beyond EOD, truncated [ 1618.018138][ T1468] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:20 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000b004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000030000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000a000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000040200000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000a000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:20 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068f6ffffff0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1618.050665][ T381] loop3: p1 < > p2 < > p4 [ 1618.055074][ T381] loop3: partition table partially beyond EOD, truncated [ 1618.062236][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1618.068897][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1618.079706][ T1482] loop2: detected capacity change from 0 to 4 [ 1618.081551][ T1483] loop0: detected capacity change from 0 to 4 [ 1618.090242][ T1484] loop4: detected capacity change from 0 to 1 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000040000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000060000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1618.097147][ T1483] EXT4-fs (loop0): Invalid log block size: 2560 [ 1618.105319][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1618.140729][ T1482] loop2: detected capacity change from 0 to 4 09:12:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000fffe000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000b000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000000b000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1618.151193][ T1483] loop0: detected capacity change from 0 to 4 [ 1618.167926][ T1483] EXT4-fs (loop0): Invalid log block size: 2560 09:12:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000120200000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1618.202392][ T1484] loop4: detected capacity change from 0 to 1 [ 1618.213065][ T1499] loop3: detected capacity change from 0 to 1 [ 1618.234944][ T1501] loop2: detected capacity change from 0 to 4 [ 1618.270137][ T1499] loop3: p1 < > p2 < > p4 [ 1618.274583][ T1499] loop3: partition table partially beyond EOD, truncated [ 1618.281705][ T1499] loop3: p1 start 335762607 is beyond EOD, truncated [ 1618.288366][ T1499] loop3: p2 size 2 extends beyond EOD, truncated [ 1618.295067][ T1499] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1618.295830][ T1501] loop2: detected capacity change from 0 to 4 [ 1618.323925][ T1499] loop3: detected capacity change from 0 to 1 [ 1618.390085][ T381] loop3: p1 < > p2 < > p4 [ 1618.394539][ T381] loop3: partition table partially beyond EOD, truncated [ 1618.401618][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1618.408280][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1618.415043][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1618.422842][ T1499] loop3: p1 < > p2 < > p4 [ 1618.427359][ T1499] loop3: partition table partially beyond EOD, truncated 09:12:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000c000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000000c000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000b000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:21 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000c004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000700200000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:21 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068feffffff0080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1618.434474][ T1499] loop3: p1 start 335762607 is beyond EOD, truncated [ 1618.441141][ T1499] loop3: p2 size 2 extends beyond EOD, truncated [ 1618.447739][ T1499] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000014000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000015000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1618.481121][ T1510] loop2: detected capacity change from 0 to 4 [ 1618.484962][ T1509] loop4: detected capacity change from 0 to 1 [ 1618.488546][ T1511] loop0: detected capacity change from 0 to 4 [ 1618.500228][ T1511] EXT4-fs (loop0): Invalid log block size: 2816 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000030000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000d000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1618.540987][ T1511] loop0: detected capacity change from 0 to 4 [ 1618.541358][ T1510] loop2: detected capacity change from 0 to 4 [ 1618.550198][ T1511] EXT4-fs (loop0): Invalid log block size: 2816 [ 1618.567916][ T1518] loop3: detected capacity change from 0 to 1 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000200000fe000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000c000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000200000feff0000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000300000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1618.593426][ T1509] loop4: detected capacity change from 0 to 1 [ 1618.610060][ T1518] loop3: p1 < > p2 < > p4 [ 1618.614492][ T1518] loop3: partition table partially beyond EOD, truncated [ 1618.621640][ T1518] loop3: p1 start 335762607 is beyond EOD, truncated [ 1618.628343][ T1518] loop3: p2 size 2 extends beyond EOD, truncated 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000200000feffffffdff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1618.644379][ T1527] loop0: detected capacity change from 0 to 4 [ 1618.652941][ T1527] EXT4-fs (loop0): Invalid log block size: 3072 [ 1618.654714][ T1531] loop2: detected capacity change from 0 to 4 [ 1618.659771][ T1518] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1618.689553][ T1527] loop0: detected capacity change from 0 to 4 [ 1618.697769][ T1527] EXT4-fs (loop0): Invalid log block size: 3072 [ 1618.699933][ T1531] loop2: detected capacity change from 0 to 4 [ 1618.725991][ T1518] loop3: detected capacity change from 0 to 1 [ 1618.766089][ T1518] loop3: p1 < > p2 < > p4 [ 1618.770520][ T1518] loop3: partition table partially beyond EOD, truncated [ 1618.777546][ T1518] loop3: p1 start 335762607 is beyond EOD, truncated [ 1618.784224][ T1518] loop3: p2 size 2 extends beyond EOD, truncated [ 1618.790757][ T1518] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:21 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000020c004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000e000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:21 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000200000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020020000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000d000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000020400000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1618.830770][ T381] loop3: p1 < > p2 < > p4 [ 1618.835196][ T381] loop3: partition table partially beyond EOD, truncated [ 1618.842260][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1618.848967][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1618.864369][ T1540] loop0: detected capacity change from 0 to 4 [ 1618.868681][ T1538] loop4: detected capacity change from 0 to 1 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020030000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020040000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1618.876895][ T1543] loop2: detected capacity change from 0 to 4 [ 1618.877334][ T1540] EXT4-fs (loop0): Invalid log block size: 3328 [ 1618.884195][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1618.912710][ T1540] loop0: detected capacity change from 0 to 4 [ 1618.919012][ T1540] EXT4-fs (loop0): Invalid log block size: 3328 09:12:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000f000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020050000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1618.935658][ T1543] loop2: detected capacity change from 0 to 4 [ 1618.944614][ T1546] loop3: detected capacity change from 0 to 1 09:12:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000e000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:21 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000010000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1618.979975][ T1538] loop4: detected capacity change from 0 to 1 [ 1618.997879][ T381] loop3: p1 < > p2 < > p4 [ 1619.002323][ T381] loop3: partition table partially beyond EOD, truncated [ 1619.009504][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1619.016265][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1619.022767][ T1559] loop0: detected capacity change from 0 to 4 [ 1619.025261][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1619.037363][ T1546] loop3: p1 < > p2 < > p4 [ 1619.040357][ T1559] EXT4-fs (loop0): Invalid log block size: 3584 [ 1619.041796][ T1546] loop3: partition table partially beyond EOD, truncated [ 1619.055153][ T1546] loop3: p1 start 335762607 is beyond EOD, truncated [ 1619.061836][ T1546] loop3: p2 size 2 extends beyond EOD, truncated [ 1619.068661][ T1546] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1619.077942][ T1559] loop0: detected capacity change from 0 to 4 [ 1619.084749][ T1559] EXT4-fs (loop0): Invalid log block size: 3584 [ 1619.090239][ T381] loop3: p1 < > p2 < > p4 [ 1619.095374][ T381] loop3: partition table partially beyond EOD, truncated [ 1619.102442][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1619.109166][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1619.115884][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:22 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000d004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000060400000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020060000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:22 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000300000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000011000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000f000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020070000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1619.215416][ T1567] loop0: detected capacity change from 0 to 4 [ 1619.223984][ T1570] loop2: detected capacity change from 0 to 4 [ 1619.237669][ T1566] loop4: detected capacity change from 0 to 1 [ 1619.247298][ T1572] loop3: detected capacity change from 0 to 1 [ 1619.249257][ T1567] EXT4-fs (loop0): Invalid log block size: 3840 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020080000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000200000200a0000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1619.271059][ T1570] loop2: detected capacity change from 0 to 4 [ 1619.276428][ T1572] loop3: p1 < > p2 < > p4 [ 1619.281634][ T1572] loop3: partition table partially beyond EOD, truncated [ 1619.288718][ T1572] loop3: p1 start 335762607 is beyond EOD, truncated [ 1619.295427][ T1572] loop3: p2 size 2 extends beyond EOD, truncated [ 1619.302223][ T1572] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1619.307552][ T1567] loop0: detected capacity change from 0 to 4 09:12:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000012000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000100400000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1619.316540][ T1567] EXT4-fs (loop0): Invalid log block size: 3840 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000200000200b0000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1619.346125][ T1583] loop2: detected capacity change from 0 to 4 [ 1619.363355][ T1566] loop4: detected capacity change from 0 to 1 [ 1619.379838][ T1572] loop3: detected capacity change from 0 to 1 [ 1619.390814][ T1583] loop2: detected capacity change from 0 to 4 [ 1619.410792][ T1572] loop3: p1 < > p2 < > p4 [ 1619.415263][ T1572] loop3: partition table partially beyond EOD, truncated [ 1619.422424][ T1572] loop3: p1 start 335762607 is beyond EOD, truncated [ 1619.429198][ T1572] loop3: p2 size 2 extends beyond EOD, truncated [ 1619.435787][ T1572] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:22 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000e004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020180000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000010000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000001c000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:22 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000400000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000500000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1619.496240][ T381] loop3: p1 < > p2 < > p4 [ 1619.500693][ T381] loop3: partition table partially beyond EOD, truncated [ 1619.507789][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1619.514616][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1619.523892][ T1594] loop2: detected capacity change from 0 to 4 [ 1619.530618][ T1593] loop0: detected capacity change from 0 to 4 [ 1619.536006][ T1596] loop4: detected capacity change from 0 to 1 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020260000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020770000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1619.545786][ T1593] EXT4-fs (loop0): Invalid log block size: 4096 [ 1619.552283][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1619.580888][ T1594] loop2: detected capacity change from 0 to 4 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000200000207e0000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000022000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000600000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020fe0000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1619.601271][ T1593] loop0: detected capacity change from 0 to 4 [ 1619.607603][ T1599] loop3: detected capacity change from 0 to 1 [ 1619.614519][ T1593] EXT4-fs (loop0): Invalid log block size: 4096 [ 1619.638610][ T1596] loop4: detected capacity change from 0 to 1 [ 1619.648220][ T1609] loop2: detected capacity change from 0 to 4 [ 1619.650280][ T1599] loop3: p1 < > p2 < > p4 [ 1619.658712][ T1599] loop3: partition table partially beyond EOD, truncated [ 1619.665791][ T1599] loop3: p1 start 335762607 is beyond EOD, truncated [ 1619.672528][ T1599] loop3: p2 size 2 extends beyond EOD, truncated [ 1619.684235][ T1599] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1619.705571][ T1609] loop2: detected capacity change from 0 to 4 [ 1619.768614][ T1599] loop3: detected capacity change from 0 to 1 [ 1619.820188][ T1599] loop3: p1 < > p2 < > p4 [ 1619.824596][ T1599] loop3: partition table partially beyond EOD, truncated [ 1619.831681][ T1599] loop3: p1 start 335762607 is beyond EOD, truncated [ 1619.838423][ T1599] loop3: p2 size 2 extends beyond EOD, truncated [ 1619.845268][ T1599] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:22 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000f004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020040200dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000410000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000025000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:22 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000500000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000040600000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1619.890731][ T381] loop3: p1 < > p2 < > p4 [ 1619.895142][ T381] loop3: partition table partially beyond EOD, truncated [ 1619.902373][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1619.909100][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1619.926986][ T1620] loop4: detected capacity change from 0 to 1 [ 1619.928977][ T1618] loop0: detected capacity change from 0 to 4 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000300dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:22 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000026000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1619.933323][ T1622] loop2: detected capacity change from 0 to 4 [ 1619.940273][ T1618] EXT4-fs (loop0): Invalid log block size: 4100 [ 1619.946586][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1619.975715][ T1622] loop2: detected capacity change from 0 to 4 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020020400dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000700000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020060400dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1619.985788][ T1618] loop0: detected capacity change from 0 to 4 [ 1619.992231][ T1618] EXT4-fs (loop0): Invalid log block size: 4100 [ 1620.011318][ T1625] loop3: detected capacity change from 0 to 1 [ 1620.015719][ T1620] loop4: detected capacity change from 0 to 1 09:12:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000011000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1620.050653][ T1625] loop3: p1 < > p2 < > p4 [ 1620.055148][ T1625] loop3: partition table partially beyond EOD, truncated [ 1620.056098][ T1634] loop2: detected capacity change from 0 to 4 [ 1620.062310][ T1625] loop3: p1 start 335762607 is beyond EOD, truncated [ 1620.074950][ T1625] loop3: p2 size 2 extends beyond EOD, truncated [ 1620.082930][ T1637] loop0: detected capacity change from 0 to 4 [ 1620.086656][ T1625] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1620.089487][ T1634] EXT4-fs (loop2): Invalid log block size: 7 [ 1620.098075][ T1637] EXT4-fs (loop0): Invalid log block size: 4352 [ 1620.134606][ T1625] loop3: detected capacity change from 0 to 1 [ 1620.156975][ T1637] loop0: detected capacity change from 0 to 4 [ 1620.158197][ T1634] loop2: detected capacity change from 0 to 4 [ 1620.163332][ T1637] EXT4-fs (loop0): Invalid log block size: 4352 [ 1620.169511][ T1634] EXT4-fs (loop2): Invalid log block size: 7 [ 1620.180892][ T381] loop3: p1 < > p2 < > p4 [ 1620.185790][ T381] loop3: partition table partially beyond EOD, truncated [ 1620.192864][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1620.199520][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1620.206210][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1620.214310][ T1625] loop3: p1 < > p2 < > p4 [ 1620.218715][ T1625] loop3: partition table partially beyond EOD, truncated [ 1620.225785][ T1625] loop3: p1 start 335762607 is beyond EOD, truncated [ 1620.232443][ T1625] loop3: p2 size 2 extends beyond EOD, truncated [ 1620.239113][ T1625] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1620.247215][ T381] loop3: p1 < > p2 < > p4 09:12:23 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000110004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000002e000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:23 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000600000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000500dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000012000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000900000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1620.251637][ T381] loop3: partition table partially beyond EOD, truncated [ 1620.258650][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1620.265319][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1620.271985][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000600dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020040600dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1620.301462][ T1641] loop4: detected capacity change from 0 to 1 [ 1620.308269][ T1645] loop0: detected capacity change from 0 to 4 [ 1620.309595][ T1648] loop2: detected capacity change from 0 to 4 [ 1620.321455][ T1648] EXT4-fs (loop2): Invalid log block size: 9 [ 1620.328358][ T1645] EXT4-fs (loop0): Invalid log block size: 4608 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000700dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000048000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1620.371099][ T1648] loop2: detected capacity change from 0 to 4 [ 1620.381065][ T1648] EXT4-fs (loop2): Invalid log block size: 9 [ 1620.390984][ T1645] loop0: detected capacity change from 0 to 4 [ 1620.397964][ T1641] loop4: detected capacity change from 0 to 1 [ 1620.399611][ T1645] EXT4-fs (loop0): Invalid log block size: 4608 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000a00dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000a00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1620.424958][ T1659] loop3: detected capacity change from 0 to 1 [ 1620.450141][ T1659] loop3: p1 < > p2 < > p4 [ 1620.454569][ T1659] loop3: partition table partially beyond EOD, truncated [ 1620.459851][ T1664] loop2: detected capacity change from 0 to 4 [ 1620.461700][ T1659] loop3: p1 start 335762607 is beyond EOD, truncated [ 1620.474375][ T1659] loop3: p2 size 2 extends beyond EOD, truncated [ 1620.475012][ T1664] EXT4-fs (loop2): Invalid log block size: 10 [ 1620.499510][ T1659] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1620.533880][ T1664] loop2: detected capacity change from 0 to 4 [ 1620.540364][ T1664] EXT4-fs (loop2): Invalid log block size: 10 [ 1620.555891][ T1659] loop3: detected capacity change from 0 to 1 [ 1620.600069][ T381] loop3: p1 < > p2 < > p4 [ 1620.604504][ T381] loop3: partition table partially beyond EOD, truncated [ 1620.611667][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1620.618328][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1620.624933][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1620.632908][ T1659] loop3: p1 < > p2 < > p4 [ 1620.637311][ T1659] loop3: partition table partially beyond EOD, truncated [ 1620.644371][ T1659] loop3: p1 start 335762607 is beyond EOD, truncated [ 1620.651046][ T1659] loop3: p2 size 2 extends beyond EOD, truncated [ 1620.657578][ T1659] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:23 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000011004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000b00dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000014000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:23 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000700000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000004c000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000b00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1620.700705][ T381] loop3: p1 < > p2 < > p4 [ 1620.705143][ T381] loop3: partition table partially beyond EOD, truncated [ 1620.712218][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1620.719017][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1620.731738][ T1668] loop0: detected capacity change from 0 to 4 [ 1620.736442][ T1672] loop4: detected capacity change from 0 to 1 [ 1620.738145][ T1673] loop2: detected capacity change from 0 to 4 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020001800dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1620.744610][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1620.757193][ T1668] EXT4-fs (loop0): Invalid log block size: 5120 [ 1620.757717][ T1673] EXT4-fs (loop2): Invalid log block size: 11 09:12:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000054000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020002000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1620.802689][ T1668] loop0: detected capacity change from 0 to 4 [ 1620.805041][ T1673] loop2: detected capacity change from 0 to 4 [ 1620.816233][ T1677] loop3: detected capacity change from 0 to 1 [ 1620.816233][ T1668] EXT4-fs (loop0): Invalid log block size: 5120 [ 1620.825162][ T1673] EXT4-fs (loop2): Invalid log block size: 11 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020002600dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020003f00dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000020000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1620.854140][ T1672] loop4: detected capacity change from 0 to 1 [ 1620.870334][ T1677] loop3: p1 < > p2 < > p4 [ 1620.874802][ T1677] loop3: partition table partially beyond EOD, truncated [ 1620.881944][ T1677] loop3: p1 start 335762607 is beyond EOD, truncated [ 1620.888651][ T1677] loop3: p2 size 2 extends beyond EOD, truncated [ 1620.895675][ T1677] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1620.931474][ T1690] loop0: detected capacity change from 0 to 4 [ 1620.940433][ T1690] EXT4-fs (loop0): Invalid log block size: 8192 [ 1620.983477][ T1690] loop0: detected capacity change from 0 to 4 [ 1620.990413][ T1690] EXT4-fs (loop0): Invalid log block size: 8192 [ 1620.992380][ T1677] loop3: detected capacity change from 0 to 1 [ 1621.030108][ T381] loop3: p1 < > p2 < > p4 [ 1621.034518][ T381] loop3: partition table partially beyond EOD, truncated [ 1621.041571][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1621.048262][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1621.054884][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1621.062971][ T1677] loop3: p1 < > p2 < > p4 [ 1621.067498][ T1677] loop3: partition table partially beyond EOD, truncated 09:12:23 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000012004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020004000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:23 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000055000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:23 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000800000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000c00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000001020000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1621.074554][ T1677] loop3: p1 start 335762607 is beyond EOD, truncated [ 1621.081221][ T1677] loop3: p2 size 2 extends beyond EOD, truncated [ 1621.087737][ T1677] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1621.116851][ T1697] loop2: detected capacity change from 0 to 4 [ 1621.123328][ T1698] loop0: detected capacity change from 0 to 4 09:12:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020007700dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1621.128850][ T1700] loop4: detected capacity change from 0 to 1 [ 1621.131277][ T1697] EXT4-fs (loop2): Invalid log block size: 12 [ 1621.141749][ T1698] EXT4-fs (loop0): Invalid log block size: 8208 [ 1621.166115][ T1697] loop2: detected capacity change from 0 to 4 [ 1621.173303][ T1697] EXT4-fs (loop2): Invalid log block size: 12 09:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020007e00dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000060000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000d00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1621.178029][ T1698] loop0: detected capacity change from 0 to 4 [ 1621.185922][ T1698] EXT4-fs (loop0): Invalid log block size: 8208 [ 1621.199221][ T1707] loop3: detected capacity change from 0 to 1 [ 1621.218610][ T1700] loop4: detected capacity change from 0 to 1 09:12:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000022000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020fffe00dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1621.240083][ T381] loop3: p1 < > p2 < > p4 [ 1621.244588][ T381] loop3: partition table partially beyond EOD, truncated [ 1621.251711][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1621.252686][ T1711] loop2: detected capacity change from 0 to 4 [ 1621.258436][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1621.268203][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1621.276853][ T1715] loop0: detected capacity change from 0 to 4 [ 1621.287913][ T1715] EXT4-fs (loop0): Invalid log block size: 8704 [ 1621.294324][ T1707] loop3: p1 < > p2 < > p4 [ 1621.296741][ T1711] EXT4-fs (loop2): Invalid log block size: 13 [ 1621.298720][ T1707] loop3: partition table partially beyond EOD, truncated [ 1621.298834][ T1707] loop3: p1 start 335762607 is beyond EOD, truncated [ 1621.318493][ T1707] loop3: p2 size 2 extends beyond EOD, truncated [ 1621.325210][ T1707] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1621.333468][ T381] loop3: p1 < > p2 < > p4 [ 1621.337883][ T381] loop3: partition table partially beyond EOD, truncated [ 1621.345029][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1621.351702][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1621.358819][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1621.359389][ T1715] loop0: detected capacity change from 0 to 4 [ 1621.367466][ T1711] loop2: detected capacity change from 0 to 4 [ 1621.377946][ T1715] EXT4-fs (loop0): Invalid log block size: 8704 [ 1621.383122][ T1711] EXT4-fs (loop2): Invalid log block size: 13 [ 1621.421667][ T1707] loop3: detected capacity change from 0 to 1 [ 1621.460110][ T381] loop3: p1 < > p2 < > p4 [ 1621.464504][ T381] loop3: partition table partially beyond EOD, truncated [ 1621.471606][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1621.478262][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1621.485031][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1621.493137][ T1707] loop3: p1 < > p2 < > p4 [ 1621.497640][ T1707] loop3: partition table partially beyond EOD, truncated [ 1621.504807][ T1707] loop3: p1 start 335762607 is beyond EOD, truncated [ 1621.511463][ T1707] loop3: p2 size 2 extends beyond EOD, truncated [ 1621.518205][ T1707] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:24 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000014004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020feff00dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000063000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:24 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000900000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000002e000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000e00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1621.560818][ T381] loop3: p1 < > p2 < > p4 [ 1621.565231][ T381] loop3: partition table partially beyond EOD, truncated [ 1621.572386][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1621.579059][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1621.590815][ T1723] loop0: detected capacity change from 0 to 4 [ 1621.593098][ T1724] loop4: detected capacity change from 0 to 1 [ 1621.603854][ T1723] EXT4-fs (loop0): Invalid log block size: 11776 09:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000200dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000300dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000068000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1621.607015][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1621.610638][ T1725] loop2: detected capacity change from 0 to 4 [ 1621.627453][ T1725] EXT4-fs (loop2): Invalid log block size: 14 09:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000400dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1621.671393][ T1723] loop0: detected capacity change from 0 to 4 [ 1621.679448][ T1723] EXT4-fs (loop0): Invalid log block size: 11776 [ 1621.691065][ T1725] loop2: detected capacity change from 0 to 4 [ 1621.699806][ T1724] loop4: detected capacity change from 0 to 1 [ 1621.706400][ T1725] EXT4-fs (loop2): Invalid log block size: 14 09:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000500dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000003f000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1621.727501][ T1738] loop3: detected capacity change from 0 to 1 [ 1621.750087][ T1740] loop0: detected capacity change from 0 to 4 [ 1621.757438][ T1740] EXT4-fs (loop0): Invalid log block size: 16128 [ 1621.772732][ T1738] loop3: p1 < > p2 < > p4 [ 1621.777147][ T1738] loop3: partition table partially beyond EOD, truncated [ 1621.784287][ T1738] loop3: p1 start 335762607 is beyond EOD, truncated [ 1621.790963][ T1738] loop3: p2 size 2 extends beyond EOD, truncated [ 1621.797745][ T1738] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1621.798661][ T1740] loop0: detected capacity change from 0 to 4 [ 1621.811064][ T1740] EXT4-fs (loop0): Invalid log block size: 16128 [ 1621.841480][ T1738] loop3: detected capacity change from 0 to 1 [ 1621.880251][ T381] loop3: p1 < > p2 < > p4 [ 1621.884769][ T381] loop3: partition table partially beyond EOD, truncated [ 1621.891879][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1621.898526][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1621.905279][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1621.913132][ T1738] loop3: p1 < > p2 < > p4 [ 1621.917536][ T1738] loop3: partition table partially beyond EOD, truncated [ 1621.924571][ T1738] loop3: p1 start 335762607 is beyond EOD, truncated [ 1621.931404][ T1738] loop3: p2 size 2 extends beyond EOD, truncated [ 1621.938059][ T1738] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:24 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000001c004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000006c000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:24 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000a00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000600dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000f00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000040000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1622.020706][ T381] loop3: p1 < > p2 < > p4 [ 1622.025126][ T381] loop3: partition table partially beyond EOD, truncated [ 1622.032309][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1622.038971][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1622.053496][ T1751] loop2: detected capacity change from 0 to 4 [ 1622.054674][ T1750] loop4: detected capacity change from 0 to 1 09:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000700dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000800dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1622.062173][ T1752] loop0: detected capacity change from 0 to 4 [ 1622.072109][ T1751] EXT4-fs (loop2): Invalid log block size: 15 [ 1622.078799][ T1752] EXT4-fs (loop0): Invalid log block size: 16384 [ 1622.085529][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000074000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000a00dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000b00dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1622.120727][ T1751] loop2: detected capacity change from 0 to 4 [ 1622.127301][ T1751] EXT4-fs (loop2): Invalid log block size: 15 [ 1622.128298][ T1752] loop0: detected capacity change from 0 to 4 [ 1622.141879][ T1752] EXT4-fs (loop0): Invalid log block size: 16384 [ 1622.151333][ T1757] loop3: detected capacity change from 0 to 1 09:12:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000080040000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1622.180592][ T1757] loop3: p1 < > p2 < > p4 [ 1622.185022][ T1757] loop3: partition table partially beyond EOD, truncated [ 1622.192202][ T1757] loop3: p1 start 335762607 is beyond EOD, truncated [ 1622.198866][ T1757] loop3: p2 size 2 extends beyond EOD, truncated [ 1622.207569][ T1750] loop4: detected capacity change from 0 to 1 [ 1622.216266][ T1757] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1622.233747][ T1768] loop0: detected capacity change from 0 to 4 [ 1622.241921][ T1768] EXT4-fs (loop0): Invalid log block size: 16384 [ 1622.274868][ T1757] loop3: detected capacity change from 0 to 1 [ 1622.286798][ T1768] loop0: detected capacity change from 0 to 4 [ 1622.293590][ T1768] EXT4-fs (loop0): Invalid log block size: 16384 [ 1622.330093][ T1757] loop3: p1 < > p2 < > p4 [ 1622.334512][ T1757] loop3: partition table partially beyond EOD, truncated [ 1622.341579][ T1757] loop3: p1 start 335762607 is beyond EOD, truncated [ 1622.348251][ T1757] loop3: p2 size 2 extends beyond EOD, truncated [ 1622.354924][ T1757] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:25 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000020004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000041000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020001800dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000007a000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:25 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000b00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000048000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1622.430736][ T381] loop3: p1 < > p2 < > p4 [ 1622.435151][ T381] loop3: partition table partially beyond EOD, truncated [ 1622.442260][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1622.448986][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1622.460439][ T1774] loop0: detected capacity change from 0 to 4 [ 1622.467261][ T1778] loop2: detected capacity change from 0 to 4 [ 1622.474362][ T1775] loop4: detected capacity change from 0 to 1 09:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020002600dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020007700dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000089000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1622.474423][ T1774] EXT4-fs (loop0): Invalid log block size: 18432 [ 1622.481388][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1622.486920][ T1778] EXT4-fs (loop2): Invalid log block size: 16 09:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020007e00dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1622.546137][ T1780] loop3: detected capacity change from 0 to 1 [ 1622.557340][ T1778] loop2: detected capacity change from 0 to 4 [ 1622.561856][ T1774] loop0: detected capacity change from 0 to 4 [ 1622.565790][ T1775] loop4: detected capacity change from 0 to 1 [ 1622.579258][ T1778] EXT4-fs (loop2): Invalid log block size: 16 [ 1622.587084][ T1774] EXT4-fs (loop0): Invalid log block size: 18432 09:12:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000090000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000002000fe00dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1622.601239][ T381] loop3: p1 < > p2 < > p4 [ 1622.605659][ T381] loop3: partition table partially beyond EOD, truncated [ 1622.612785][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1622.619450][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1622.627176][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1622.635571][ T1780] loop3: p1 < > p2 < > p4 [ 1622.640001][ T1780] loop3: partition table partially beyond EOD, truncated [ 1622.647079][ T1780] loop3: p1 start 335762607 is beyond EOD, truncated [ 1622.653757][ T1780] loop3: p2 size 2 extends beyond EOD, truncated [ 1622.662628][ T1780] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1622.671848][ T381] loop3: p1 < > p2 < > p4 [ 1622.676323][ T381] loop3: partition table partially beyond EOD, truncated [ 1622.683378][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1622.690041][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1622.699668][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:25 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000022004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000201000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000402dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000004c000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:25 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000c00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000a0000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1622.787528][ T1798] loop2: detected capacity change from 0 to 4 [ 1622.801163][ T1804] loop0: detected capacity change from 0 to 4 [ 1622.813441][ T1807] loop3: detected capacity change from 0 to 1 [ 1622.822510][ T1804] EXT4-fs (loop0): Invalid log block size: 19456 [ 1622.828923][ T1798] EXT4-fs (loop2): Invalid log block size: 16 09:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000003dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000c0000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1622.835143][ T1806] loop4: detected capacity change from 0 to 1 [ 1622.841565][ T1807] loop3: p1 < > p2 < > p4 [ 1622.845967][ T1807] loop3: partition table partially beyond EOD, truncated [ 1622.853132][ T1807] loop3: p1 start 335762607 is beyond EOD, truncated [ 1622.859796][ T1807] loop3: p2 size 2 extends beyond EOD, truncated [ 1622.867052][ T1807] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1622.881736][ T1798] loop2: detected capacity change from 0 to 4 09:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000204dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1622.889830][ T1804] loop0: detected capacity change from 0 to 4 [ 1622.897677][ T1804] EXT4-fs (loop0): Invalid log block size: 19456 [ 1622.904527][ T1798] EXT4-fs (loop2): Invalid log block size: 16 [ 1622.923475][ T1806] loop4: detected capacity change from 0 to 1 09:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000604dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000060000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ec000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1622.937189][ T1807] loop3: detected capacity change from 0 to 1 [ 1622.976043][ T1821] loop0: detected capacity change from 0 to 4 [ 1622.983202][ T1821] EXT4-fs (loop0): Invalid log block size: 24576 [ 1623.000163][ T381] loop3: p1 < > p2 < > p4 [ 1623.004582][ T381] loop3: partition table partially beyond EOD, truncated [ 1623.011726][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1623.018407][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1623.025251][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1623.025921][ T1821] loop0: detected capacity change from 0 to 4 [ 1623.039021][ T1821] EXT4-fs (loop0): Invalid log block size: 24576 [ 1623.045557][ T381] loop3: p1 < > p2 < > p4 [ 1623.049981][ T381] loop3: partition table partially beyond EOD, truncated [ 1623.057044][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1623.063762][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:25 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000025004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000001100000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000005dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:25 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000d00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000fe000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000068000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1623.070421][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1623.078474][ T1807] loop3: p1 < > p2 < > p4 [ 1623.083078][ T1807] loop3: partition table partially beyond EOD, truncated [ 1623.090157][ T1807] loop3: p1 start 335762607 is beyond EOD, truncated [ 1623.096819][ T1807] loop3: p2 size 2 extends beyond EOD, truncated [ 1623.103598][ T1807] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000006dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1623.135186][ T1830] loop0: detected capacity change from 0 to 4 [ 1623.145461][ T1827] loop4: detected capacity change from 0 to 1 [ 1623.145559][ T1832] loop2: detected capacity change from 0 to 4 [ 1623.160914][ T1830] EXT4-fs (loop0): Invalid log block size: 26624 [ 1623.177597][ T1832] EXT4-fs (loop2): Invalid log block size: 17 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000406dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000007dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1623.188188][ T1836] loop3: detected capacity change from 0 to 1 [ 1623.220553][ T1836] loop3: p1 < > p2 < > p4 [ 1623.224972][ T1836] loop3: partition table partially beyond EOD, truncated [ 1623.228628][ T1830] loop0: detected capacity change from 0 to 4 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000002000000adff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000007c010000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000002000000bdff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1623.232045][ T1836] loop3: p1 start 335762607 is beyond EOD, truncated [ 1623.244783][ T1836] loop3: p2 size 2 extends beyond EOD, truncated [ 1623.250712][ T1830] EXT4-fs (loop0): Invalid log block size: 26624 [ 1623.251648][ T1836] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1623.266056][ T1832] loop2: detected capacity change from 0 to 4 [ 1623.267112][ T1827] loop4: detected capacity change from 0 to 1 [ 1623.280476][ T1832] EXT4-fs (loop2): Invalid log block size: 17 [ 1623.323971][ T1836] loop3: detected capacity change from 0 to 1 [ 1623.360218][ T1836] loop3: p1 < > p2 < > p4 [ 1623.364638][ T1836] loop3: partition table partially beyond EOD, truncated [ 1623.371772][ T1836] loop3: p1 start 335762607 is beyond EOD, truncated [ 1623.378434][ T1836] loop3: p2 size 2 extends beyond EOD, truncated [ 1623.385098][ T1836] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:26 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000026004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000006c000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000001200000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:26 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000e00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000a2010000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000018dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1623.440805][ T381] loop3: p1 < > p2 < > p4 [ 1623.445276][ T381] loop3: partition table partially beyond EOD, truncated [ 1623.452355][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1623.459059][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1623.471124][ T1854] loop2: detected capacity change from 0 to 4 [ 1623.478000][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1623.478954][ T1855] loop4: detected capacity change from 0 to 1 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000020dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000026dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1623.486832][ T1857] loop0: detected capacity change from 0 to 4 [ 1623.497750][ T1854] EXT4-fs (loop2): Invalid log block size: 18 [ 1623.507971][ T1857] EXT4-fs (loop0): Invalid log block size: 27648 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000002000003fdff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000aa010000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1623.541526][ T1854] loop2: detected capacity change from 0 to 4 [ 1623.547841][ T1860] loop3: detected capacity change from 0 to 1 [ 1623.554299][ T1854] EXT4-fs (loop2): Invalid log block size: 18 [ 1623.561252][ T1857] loop0: detected capacity change from 0 to 4 [ 1623.567775][ T1857] EXT4-fs (loop0): Invalid log block size: 27648 [ 1623.580279][ T1860] loop3: p1 < > p2 < > p4 [ 1623.584722][ T1860] loop3: partition table partially beyond EOD, truncated 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000040dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000021200000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1623.591878][ T1860] loop3: p1 start 335762607 is beyond EOD, truncated [ 1623.598548][ T1860] loop3: p2 size 2 extends beyond EOD, truncated [ 1623.607194][ T1855] loop4: detected capacity change from 0 to 1 [ 1623.614873][ T1860] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1623.652771][ T1873] loop2: detected capacity change from 0 to 4 [ 1623.659459][ T1873] EXT4-fs (loop2): Invalid log block size: 18 [ 1623.674241][ T1860] loop3: detected capacity change from 0 to 1 [ 1623.691993][ T1873] loop2: detected capacity change from 0 to 4 [ 1623.698393][ T1873] EXT4-fs (loop2): Invalid log block size: 18 [ 1623.720089][ T381] loop3: p1 < > p2 < > p4 [ 1623.724568][ T381] loop3: partition table partially beyond EOD, truncated [ 1623.731667][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1623.738345][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1623.745189][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1623.753279][ T1860] loop3: p1 < > p2 < > p4 [ 1623.757690][ T1860] loop3: partition table partially beyond EOD, truncated [ 1623.764782][ T1860] loop3: p1 start 335762607 is beyond EOD, truncated [ 1623.771454][ T1860] loop3: p2 size 2 extends beyond EOD, truncated [ 1623.777996][ T1860] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1623.785999][ T381] loop3: p1 < > p2 < > p4 [ 1623.790471][ T381] loop3: partition table partially beyond EOD, truncated 09:12:26 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000002e004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000077dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000016f000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000e6010000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:26 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000f00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000001400000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000002000007edff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1623.797519][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1623.804205][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1623.813364][ T1876] loop0: detected capacity change from 0 to 4 [ 1623.828252][ T1882] loop4: detected capacity change from 0 to 1 [ 1623.834442][ T1876] EXT4-fs (loop0): Invalid log block size: 28417 [ 1623.836051][ T1883] loop2: detected capacity change from 0 to 4 [ 1623.845804][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000002000fffedff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000004020000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1623.847708][ T1883] EXT4-fs (loop2): Invalid log block size: 20 [ 1623.891754][ T1876] loop0: detected capacity change from 0 to 4 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000002000feffdff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000170000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1623.899515][ T1876] EXT4-fs (loop0): Invalid log block size: 28417 [ 1623.918180][ T1883] loop2: detected capacity change from 0 to 4 [ 1623.925067][ T1887] loop3: detected capacity change from 0 to 1 [ 1623.935303][ T1883] EXT4-fs (loop2): Invalid log block size: 20 [ 1623.941423][ T1882] loop4: detected capacity change from 0 to 1 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000002dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1623.959750][ T1897] loop0: detected capacity change from 0 to 4 [ 1623.966888][ T1897] EXT4-fs (loop0): Invalid log block size: 28673 [ 1623.982876][ T1887] loop3: p1 < > p2 < > p4 [ 1623.987299][ T1887] loop3: partition table partially beyond EOD, truncated [ 1623.994418][ T1887] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.001140][ T1887] loop3: p2 size 2 extends beyond EOD, truncated 09:12:26 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000003f004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000030000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000003dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000002000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1624.007763][ T1887] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1624.020893][ T1897] loop0: detected capacity change from 0 to 4 [ 1624.027265][ T1897] EXT4-fs (loop0): Invalid log block size: 28673 [ 1624.042508][ T381] loop3: p1 < > p2 < > p4 [ 1624.046933][ T381] loop3: partition table partially beyond EOD, truncated 09:12:26 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068001000000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000171000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000004dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1624.054013][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.060682][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1624.071784][ T1903] loop2: detected capacity change from 0 to 4 [ 1624.081432][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1624.094588][ T1907] loop4: detected capacity change from 0 to 1 09:12:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000002040000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000005dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000006dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1624.109952][ T1903] EXT4-fs (loop2): Invalid log block size: 32 [ 1624.120344][ T1913] loop0: detected capacity change from 0 to 4 [ 1624.127312][ T1913] EXT4-fs (loop0): Invalid log block size: 28929 [ 1624.140941][ T1903] loop2: detected capacity change from 0 to 4 [ 1624.143304][ T1912] loop3: detected capacity change from 0 to 1 [ 1624.153711][ T1903] EXT4-fs (loop2): Invalid log block size: 32 09:12:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000102000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000007dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1624.185652][ T1907] loop4: detected capacity change from 0 to 1 [ 1624.187488][ T1913] loop0: detected capacity change from 0 to 4 [ 1624.202131][ T381] loop3: p1 < > p2 < > p4 [ 1624.206608][ T381] loop3: partition table partially beyond EOD, truncated [ 1624.213684][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.220358][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1624.221689][ T1913] EXT4-fs (loop0): Invalid log block size: 28929 [ 1624.228370][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1624.244835][ T1925] loop2: detected capacity change from 0 to 4 [ 1624.252032][ T1925] EXT4-fs (loop2): Invalid log block size: 32 [ 1624.255208][ T381] loop3: p1 < > p2 < > p4 [ 1624.262617][ T381] loop3: partition table partially beyond EOD, truncated [ 1624.269780][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.276454][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1624.283144][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1624.291239][ T1912] loop3: p1 < > p2 < > p4 [ 1624.295703][ T1912] loop3: partition table partially beyond EOD, truncated [ 1624.302879][ T1912] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.309542][ T1912] loop3: p2 size 2 extends beyond EOD, truncated [ 1624.316311][ T1912] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1624.319955][ T1925] loop2: detected capacity change from 0 to 4 [ 1624.330302][ T1925] EXT4-fs (loop2): Invalid log block size: 32 [ 1624.391080][ T1912] loop3: detected capacity change from 0 to 1 [ 1624.430104][ T381] loop3: p1 < > p2 < > p4 [ 1624.434513][ T381] loop3: partition table partially beyond EOD, truncated [ 1624.441661][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.448317][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1624.454952][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1624.462771][ T1912] loop3: p1 < > p2 < > p4 [ 1624.467161][ T1912] loop3: partition table partially beyond EOD, truncated [ 1624.474256][ T1912] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.480997][ T1912] loop3: p2 size 2 extends beyond EOD, truncated [ 1624.487817][ T1912] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1624.495779][ T381] loop3: p1 < > p2 < > p4 [ 1624.500193][ T381] loop3: partition table partially beyond EOD, truncated [ 1624.507316][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.514082][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1624.520708][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:27 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000040004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000006040000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000008dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:27 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068001100000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000074000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000002200000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1624.580878][ T381] loop3: p1 < > p2 < > p4 [ 1624.585282][ T381] loop3: partition table partially beyond EOD, truncated [ 1624.592521][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.599184][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1624.611746][ T1931] loop4: detected capacity change from 0 to 1 [ 1624.611820][ T1933] loop0: detected capacity change from 0 to 4 [ 1624.619682][ T1934] loop2: detected capacity change from 0 to 4 09:12:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000002000000adff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1624.631146][ T1934] EXT4-fs (loop2): Invalid log block size: 34 [ 1624.638063][ T1933] EXT4-fs (loop0): Invalid log block size: 29696 [ 1624.644771][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1624.671064][ T1934] loop2: detected capacity change from 0 to 4 09:12:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000002000000bdff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000050000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000002e00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000018dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1624.683102][ T1934] EXT4-fs (loop2): Invalid log block size: 34 [ 1624.689804][ T1931] loop4: detected capacity change from 0 to 1 [ 1624.702584][ T1933] loop0: detected capacity change from 0 to 4 [ 1624.708916][ T1933] EXT4-fs (loop0): Invalid log block size: 29696 09:12:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000026dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1624.739850][ T1947] loop2: detected capacity change from 0 to 4 [ 1624.740537][ T1945] loop3: detected capacity change from 0 to 1 [ 1624.747098][ T1947] EXT4-fs (loop2): Invalid log block size: 46 [ 1624.800200][ T1945] loop3: p1 < > p2 < > p4 [ 1624.804611][ T1945] loop3: partition table partially beyond EOD, truncated [ 1624.810111][ T1947] loop2: detected capacity change from 0 to 4 [ 1624.811777][ T1945] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.818307][ T1947] EXT4-fs (loop2): Invalid log block size: 46 [ 1624.824366][ T1945] loop3: p2 size 2 extends beyond EOD, truncated [ 1624.824804][ T1945] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1624.844808][ T381] loop3: p1 < > p2 < > p4 [ 1624.849213][ T381] loop3: partition table partially beyond EOD, truncated [ 1624.856403][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.863101][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1624.870112][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1624.924662][ T1945] loop3: detected capacity change from 0 to 1 [ 1624.960136][ T381] loop3: p1 < > p2 < > p4 [ 1624.964534][ T381] loop3: partition table partially beyond EOD, truncated 09:12:27 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000048004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000060000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:27 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068001200000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000007a000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000003f00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000077dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1624.971588][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1624.978258][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1624.984839][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1624.992603][ T1945] loop3: p1 < > p2 < > p4 [ 1624.996995][ T1945] loop3: partition table partially beyond EOD, truncated [ 1625.004078][ T1945] loop3: p1 start 335762607 is beyond EOD, truncated [ 1625.010755][ T1945] loop3: p2 size 2 extends beyond EOD, truncated [ 1625.017368][ T1945] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000000000000200000002000002000007edff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000000000020000000200000200000fedff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1625.047344][ T1958] loop2: detected capacity change from 0 to 4 [ 1625.055364][ T1961] loop0: detected capacity change from 0 to 4 [ 1625.055774][ T1958] EXT4-fs (loop2): Invalid log block size: 63 [ 1625.062750][ T1955] loop4: detected capacity change from 0 to 1 [ 1625.072959][ T1961] EXT4-fs (loop0): Invalid log block size: 31232 09:12:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000004060000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1625.112379][ T1966] loop3: detected capacity change from 0 to 1 [ 1625.113816][ T1958] loop2: detected capacity change from 0 to 4 [ 1625.131145][ T1961] loop0: detected capacity change from 0 to 4 [ 1625.140387][ T1961] EXT4-fs (loop0): Invalid log block size: 31232 [ 1625.147110][ T1958] EXT4-fs (loop2): Invalid log block size: 63 [ 1625.154143][ T381] loop3: p1 < > p2 < > p4 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4795fdff4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1625.157585][ T1955] loop4: detected capacity change from 0 to 1 [ 1625.158546][ T381] loop3: partition table partially beyond EOD, truncated [ 1625.158593][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1625.178408][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1625.185331][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1625.193261][ T1966] loop3: p1 < > p2 < > p4 [ 1625.197662][ T1966] loop3: partition table partially beyond EOD, truncated [ 1625.204747][ T1966] loop3: p1 start 335762607 is beyond EOD, truncated 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4795f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000017c000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1625.211445][ T1966] loop3: p2 size 2 extends beyond EOD, truncated [ 1625.229580][ T1966] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1625.250033][ T1976] loop0: detected capacity change from 0 to 4 [ 1625.259670][ T1976] EXT4-fs (loop0): Invalid log block size: 31745 [ 1625.281140][ T1966] loop3: detected capacity change from 0 to 1 [ 1625.301005][ T1976] loop0: detected capacity change from 0 to 4 [ 1625.307308][ T1976] EXT4-fs (loop0): Invalid log block size: 31745 [ 1625.313924][ T1966] loop3: p1 < > p2 < > p4 [ 1625.318352][ T1966] loop3: partition table partially beyond EOD, truncated [ 1625.325416][ T1966] loop3: p1 start 335762607 is beyond EOD, truncated [ 1625.332092][ T1966] loop3: p2 size 2 extends beyond EOD, truncated [ 1625.338867][ T1966] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:28 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000004c004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000004000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000070000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0200ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:28 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068002200000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100ffffff85000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1625.380797][ T381] loop3: p1 < > p2 < > p4 [ 1625.385216][ T381] loop3: partition table partially beyond EOD, truncated [ 1625.392295][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1625.399036][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1625.414162][ T1978] loop0: detected capacity change from 0 to 4 [ 1625.414461][ T1980] loop2: detected capacity change from 0 to 4 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0300ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1625.420919][ T1978] EXT4-fs (loop0): Invalid log block size: 34303 [ 1625.429758][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1625.435511][ T1985] loop4: detected capacity change from 0 to 1 [ 1625.440287][ T1980] EXT4-fs (loop2): Invalid log block size: 64 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0500ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000090000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1625.472878][ T1978] loop0: detected capacity change from 0 to 4 [ 1625.479438][ T1978] EXT4-fs (loop0): Invalid log block size: 34303 [ 1625.494481][ T1989] loop3: detected capacity change from 0 to 1 [ 1625.498826][ T1980] loop2: detected capacity change from 0 to 4 [ 1625.507222][ T1980] EXT4-fs (loop2): Invalid log block size: 64 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0600ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100ffffff8c000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1625.518624][ T1985] loop4: detected capacity change from 0 to 1 [ 1625.534257][ T1989] loop3: p1 < > p2 < > p4 [ 1625.538672][ T1989] loop3: partition table partially beyond EOD, truncated [ 1625.545832][ T1989] loop3: p1 start 335762607 is beyond EOD, truncated [ 1625.552514][ T1989] loop3: p2 size 2 extends beyond EOD, truncated 09:12:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000004800000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1625.569736][ T2000] loop0: detected capacity change from 0 to 4 [ 1625.573098][ T1989] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1625.587334][ T381] loop3: p1 < > p2 < > p4 [ 1625.590521][ T2002] loop2: detected capacity change from 0 to 4 [ 1625.591764][ T381] loop3: partition table partially beyond EOD, truncated [ 1625.604887][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1625.604947][ T2002] EXT4-fs (loop2): Invalid log block size: 72 [ 1625.611582][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1625.619993][ T2000] EXT4-fs (loop0): Invalid log block size: 36095 [ 1625.625215][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1625.643759][ T2000] loop0: detected capacity change from 0 to 4 [ 1625.651335][ T2000] EXT4-fs (loop0): Invalid log block size: 36095 [ 1625.655577][ T2002] loop2: detected capacity change from 0 to 4 [ 1625.663906][ T2002] EXT4-fs (loop2): Invalid log block size: 72 [ 1625.685310][ T1989] loop3: detected capacity change from 0 to 1 09:12:28 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000054004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0700ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:28 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068002500000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000004c00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000028e000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000a0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0e00ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0f00ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000b0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1625.764668][ T2010] loop0: detected capacity change from 0 to 4 [ 1625.765864][ T2011] loop2: detected capacity change from 0 to 4 [ 1625.777794][ T2010] EXT4-fs (loop0): Invalid log block size: 36354 [ 1625.786616][ T2012] loop4: detected capacity change from 0 to 1 [ 1625.790699][ T2011] EXT4-fs (loop2): Invalid log block size: 76 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f1000ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1625.838765][ T2011] loop2: detected capacity change from 0 to 4 [ 1625.839234][ T2010] loop0: detected capacity change from 0 to 4 [ 1625.856362][ T2020] loop3: detected capacity change from 0 to 1 [ 1625.866055][ T2011] EXT4-fs (loop2): Invalid log block size: 76 [ 1625.872650][ T2010] EXT4-fs (loop0): Invalid log block size: 36354 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655ffe00ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1625.886846][ T2012] loop4: detected capacity change from 0 to 1 09:12:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000c0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1625.910197][ T381] loop3: p1 < > p2 < > p4 [ 1625.914624][ T381] loop3: partition table partially beyond EOD, truncated [ 1625.921809][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1625.928476][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1625.943750][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1625.954803][ T381] loop3: p1 < > p2 < > p4 [ 1625.959201][ T381] loop3: partition table partially beyond EOD, truncated [ 1625.966265][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1625.972937][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1625.979496][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1625.987886][ T2020] loop3: p1 < > p2 < > p4 [ 1625.992309][ T2020] loop3: partition table partially beyond EOD, truncated [ 1625.999325][ T2020] loop3: p1 start 335762607 is beyond EOD, truncated [ 1626.006051][ T2020] loop3: p2 size 2 extends beyond EOD, truncated [ 1626.012921][ T2020] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1626.064453][ T2020] loop3: detected capacity change from 0 to 1 [ 1626.090158][ T381] loop3: p1 < > p2 < > p4 [ 1626.094588][ T381] loop3: partition table partially beyond EOD, truncated [ 1626.101705][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1626.108352][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:28 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000055004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000006000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000028f000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0003ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:28 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068004800000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000d0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1626.114948][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1626.122997][ T2020] loop3: p1 < > p2 < > p4 [ 1626.127401][ T2020] loop3: partition table partially beyond EOD, truncated [ 1626.134510][ T2020] loop3: p1 start 335762607 is beyond EOD, truncated [ 1626.141197][ T2020] loop3: p2 size 2 extends beyond EOD, truncated [ 1626.147790][ T2020] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655ffeffffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1626.176933][ T2034] loop4: detected capacity change from 0 to 1 [ 1626.183845][ T2035] loop0: detected capacity change from 0 to 4 [ 1626.195087][ T2039] loop2: detected capacity change from 0 to 4 [ 1626.202153][ T2039] EXT4-fs (loop2): Invalid log block size: 96 [ 1626.209585][ T2035] EXT4-fs (loop0): Invalid log block size: 36610 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0102ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000e0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0103ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1626.230403][ T2044] loop3: detected capacity change from 0 to 1 [ 1626.261055][ T2039] loop2: detected capacity change from 0 to 4 [ 1626.268208][ T2035] loop0: detected capacity change from 0 to 4 [ 1626.274662][ T2039] EXT4-fs (loop2): Invalid log block size: 96 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0104ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1626.275087][ T2035] EXT4-fs (loop0): Invalid log block size: 36610 [ 1626.290096][ T2034] loop4: detected capacity change from 0 to 1 [ 1626.290133][ T2044] loop3: p1 < > p2 < > p4 [ 1626.300597][ T2044] loop3: partition table partially beyond EOD, truncated [ 1626.307652][ T2044] loop3: p1 start 335762607 is beyond EOD, truncated [ 1626.314332][ T2044] loop3: p2 size 2 extends beyond EOD, truncated [ 1626.321323][ T2044] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0105ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1626.329858][ T381] loop3: p1 < > p2 < > p4 [ 1626.334368][ T381] loop3: partition table partially beyond EOD, truncated [ 1626.341467][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1626.348177][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1626.375086][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:29 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000060004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000f0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000006800000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:29 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068004c00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000290000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0106ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0107ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0108ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1626.464040][ T2060] loop4: detected capacity change from 0 to 1 [ 1626.471427][ T2064] loop2: detected capacity change from 0 to 4 [ 1626.472084][ T2065] loop0: detected capacity change from 0 to 4 [ 1626.490864][ T2064] EXT4-fs (loop2): Invalid log block size: 104 [ 1626.494141][ T2065] EXT4-fs (loop0): Invalid log block size: 36866 [ 1626.502245][ T2067] loop3: detected capacity change from 0 to 1 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f010affff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000110000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1626.562181][ T2065] loop0: detected capacity change from 0 to 4 [ 1626.562839][ T2060] loop4: detected capacity change from 0 to 1 [ 1626.570408][ T2065] EXT4-fs (loop0): Invalid log block size: 36866 [ 1626.574829][ T2067] loop3: p1 < > p2 < > p4 [ 1626.585144][ T2067] loop3: partition table partially beyond EOD, truncated [ 1626.592230][ T2067] loop3: p1 start 335762607 is beyond EOD, truncated [ 1626.598900][ T2067] loop3: p2 size 2 extends beyond EOD, truncated 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f010bffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000001a2000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1626.605850][ T2067] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1626.606230][ T2064] loop2: detected capacity change from 0 to 4 [ 1626.619117][ T2064] EXT4-fs (loop2): Invalid log block size: 104 [ 1626.651765][ T2067] loop3: detected capacity change from 0 to 1 [ 1626.666527][ T2081] loop0: detected capacity change from 0 to 4 [ 1626.673422][ T2081] EXT4-fs (loop0): Invalid log block size: 41473 [ 1626.700094][ T2067] loop3: p1 < > p2 < > p4 [ 1626.704494][ T2067] loop3: partition table partially beyond EOD, truncated [ 1626.711579][ T2067] loop3: p1 start 335762607 is beyond EOD, truncated [ 1626.718292][ T2067] loop3: p2 size 2 extends beyond EOD, truncated [ 1626.725049][ T2067] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1626.730038][ T2081] loop0: detected capacity change from 0 to 4 [ 1626.738331][ T2081] EXT4-fs (loop0): Invalid log block size: 41473 09:12:29 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000063004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:29 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068006800000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ea110000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0118ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000006c00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000edc0000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1626.770556][ T381] loop3: p1 < > p2 < > p4 [ 1626.774975][ T381] loop3: partition table partially beyond EOD, truncated [ 1626.782050][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1626.788876][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1626.801385][ T2088] loop2: detected capacity change from 0 to 4 [ 1626.811674][ T2086] loop4: detected capacity change from 0 to 1 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0126ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1626.813131][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1626.825515][ T2088] EXT4-fs (loop2): Invalid log block size: 108 [ 1626.832344][ T2091] loop0: detected capacity change from 0 to 4 [ 1626.843040][ T2091] EXT4-fs (loop0): Invalid log block size: 49389 [ 1626.861171][ T2088] loop2: detected capacity change from 0 to 4 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0177ffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f017effff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000120000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1626.867562][ T2088] EXT4-fs (loop2): Invalid log block size: 108 [ 1626.875967][ T2093] loop3: detected capacity change from 0 to 1 [ 1626.891720][ T2091] loop0: detected capacity change from 0 to 4 [ 1626.899654][ T2091] EXT4-fs (loop0): Invalid log block size: 49389 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f01feffff53ef010001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000027000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1626.920229][ T2093] loop3: p1 < > p2 < > p4 [ 1626.924665][ T2093] loop3: partition table partially beyond EOD, truncated [ 1626.931753][ T2093] loop3: p1 start 335762607 is beyond EOD, truncated [ 1626.938485][ T2093] loop3: p2 size 2 extends beyond EOD, truncated [ 1626.950588][ T2093] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1626.952155][ T2086] loop4: detected capacity change from 0 to 1 [ 1626.971960][ T2106] loop2: detected capacity change from 0 to 4 [ 1626.982112][ T2093] loop3: detected capacity change from 0 to 1 [ 1626.990179][ T2106] EXT4-fs (loop2): Invalid log block size: 112 [ 1627.010105][ T2093] loop3: p1 < > p2 < > p4 [ 1627.014509][ T2093] loop3: partition table partially beyond EOD, truncated 09:12:29 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500007f64004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef020001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100ffffffda000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000001c0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:29 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068006c00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1627.021613][ T2093] loop3: p1 start 335762607 is beyond EOD, truncated [ 1627.028272][ T2093] loop3: p2 size 2 extends beyond EOD, truncated [ 1627.035138][ T2093] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1627.035838][ T2106] loop2: detected capacity change from 0 to 4 [ 1627.048364][ T2106] EXT4-fs (loop2): Invalid log block size: 112 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef030001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000007400000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1627.084188][ T2110] loop0: detected capacity change from 0 to 4 [ 1627.091080][ T2110] EXT4-fs (loop0): Invalid log block size: 56063 09:12:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef050001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000200000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1627.125610][ T2118] loop2: detected capacity change from 0 to 4 [ 1627.132564][ T2118] EXT4-fs (loop2): Invalid log block size: 116 [ 1627.145911][ T2120] loop4: detected capacity change from 0 to 1 [ 1627.148755][ T2110] loop0: detected capacity change from 0 to 4 [ 1627.159750][ T2122] loop3: detected capacity change from 0 to 1 [ 1627.166602][ T2110] EXT4-fs (loop0): Invalid log block size: 56063 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef060001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1627.180845][ T2118] loop2: detected capacity change from 0 to 4 [ 1627.192744][ T2118] EXT4-fs (loop2): Invalid log block size: 116 [ 1627.212257][ T381] loop3: p1 < > p2 < > p4 [ 1627.216682][ T381] loop3: partition table partially beyond EOD, truncated [ 1627.223768][ T381] loop3: p1 start 335762607 is beyond EOD, truncated 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef070001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000220000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1627.230447][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1627.252010][ T2120] loop4: detected capacity change from 0 to 1 [ 1627.266548][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1627.274612][ T2122] loop3: p1 < > p2 < > p4 [ 1627.279017][ T2122] loop3: partition table partially beyond EOD, truncated [ 1627.286131][ T2122] loop3: p1 start 335762607 is beyond EOD, truncated [ 1627.292900][ T2122] loop3: p2 size 2 extends beyond EOD, truncated [ 1627.299800][ T2122] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1627.307842][ T381] loop3: p1 < > p2 < > p4 [ 1627.312272][ T381] loop3: partition table partially beyond EOD, truncated [ 1627.319287][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1627.326000][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1627.332781][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:30 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000068004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef0e0001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000007a00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100fffffff6000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:30 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068007400000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000250000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1627.391856][ T2122] loop3: detected capacity change from 0 to 1 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef0f0001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1627.439135][ T2139] loop2: detected capacity change from 0 to 4 [ 1627.446145][ T2137] loop4: detected capacity change from 0 to 1 [ 1627.451173][ T2143] loop0: detected capacity change from 0 to 4 [ 1627.458405][ T2139] EXT4-fs (loop2): Invalid log block size: 122 [ 1627.464738][ T2143] EXT4-fs (loop0): Invalid log block size: 63231 09:12:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000260000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef100001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1627.499171][ T2148] loop3: detected capacity change from 0 to 1 [ 1627.511069][ T2139] loop2: detected capacity change from 0 to 4 [ 1627.518347][ T2143] loop0: detected capacity change from 0 to 4 [ 1627.527852][ T2139] EXT4-fs (loop2): Invalid log block size: 122 [ 1627.535043][ T2143] EXT4-fs (loop0): Invalid log block size: 63231 [ 1627.537028][ T2137] loop4: detected capacity change from 0 to 1 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53effe0001000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef000301000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1627.541751][ T381] loop3: p1 < > p2 < > p4 [ 1627.551877][ T381] loop3: partition table partially beyond EOD, truncated [ 1627.559005][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1627.565684][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1627.572459][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1627.583977][ T2148] loop3: p1 < > p2 < > p4 [ 1627.588385][ T2148] loop3: partition table partially beyond EOD, truncated 09:12:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100fffffdf9000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1627.595475][ T2148] loop3: p1 start 335762607 is beyond EOD, truncated [ 1627.602207][ T2148] loop3: p2 size 2 extends beyond EOD, truncated [ 1627.619935][ T2148] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1627.643508][ T2159] loop0: detected capacity change from 0 to 4 [ 1627.650421][ T2159] EXT4-fs (loop0): Invalid log block size: 63997 [ 1627.671332][ T2148] loop3: detected capacity change from 0 to 1 [ 1627.691126][ T2159] loop0: detected capacity change from 0 to 4 [ 1627.697434][ T2159] EXT4-fs (loop0): Invalid log block size: 63997 [ 1627.703965][ T381] loop3: p1 < > p2 < > p4 [ 1627.708414][ T381] loop3: partition table partially beyond EOD, truncated [ 1627.715540][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1627.722220][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1627.728857][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1627.736735][ T2148] loop3: p1 < > p2 < > p4 [ 1627.741164][ T2148] loop3: partition table partially beyond EOD, truncated [ 1627.748254][ T2148] loop3: p1 start 335762607 is beyond EOD, truncated [ 1627.754935][ T2148] loop3: p2 size 2 extends beyond EOD, truncated [ 1627.761664][ T2148] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:30 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000006c004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53effeff01000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000017c00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:30 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068007a00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000002e0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100fffffdfd000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1627.840918][ T381] loop3: p1 < > p2 < > p4 [ 1627.845444][ T381] loop3: partition table partially beyond EOD, truncated [ 1627.852528][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1627.859188][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1627.870219][ T2162] loop2: detected capacity change from 0 to 4 [ 1627.876725][ T2166] loop0: detected capacity change from 0 to 4 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010300000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010400000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010201000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1627.885635][ T2167] loop4: detected capacity change from 0 to 1 [ 1627.886684][ T2162] EXT4-fs (loop2): Invalid log block size: 124 [ 1627.899579][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1627.902625][ T2166] EXT4-fs (loop0): Invalid log block size: 65021 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010301000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000003f0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010401000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1627.966632][ T2166] loop0: detected capacity change from 0 to 4 [ 1627.976318][ T2171] loop3: detected capacity change from 0 to 1 [ 1627.982828][ T2162] loop2: detected capacity change from 0 to 4 [ 1627.985369][ T2166] EXT4-fs (loop0): Invalid log block size: 65021 [ 1627.994874][ T2162] EXT4-fs (loop2): Invalid log block size: 124 [ 1628.015573][ T2167] loop4: detected capacity change from 0 to 1 [ 1628.030310][ T2171] loop3: p1 < > p2 < > p4 [ 1628.034732][ T2171] loop3: partition table partially beyond EOD, truncated [ 1628.041864][ T2171] loop3: p1 start 335762607 is beyond EOD, truncated [ 1628.048560][ T2171] loop3: p2 size 2 extends beyond EOD, truncated [ 1628.068962][ T2171] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1628.115215][ T2171] loop3: detected capacity change from 0 to 1 [ 1628.180054][ T2171] loop3: p1 < > p2 < > p4 [ 1628.184472][ T2171] loop3: partition table partially beyond EOD, truncated [ 1628.191569][ T2171] loop3: p1 start 335762607 is beyond EOD, truncated [ 1628.198236][ T2171] loop3: p2 size 2 extends beyond EOD, truncated [ 1628.204793][ T2171] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:31 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000074004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010501000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100fffffffe000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000018f00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000400000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:31 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068009000000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1628.290668][ T381] loop3: p1 < > p2 < > p4 [ 1628.295092][ T381] loop3: partition table partially beyond EOD, truncated [ 1628.302230][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1628.308958][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1628.317644][ T2188] loop2: detected capacity change from 0 to 4 [ 1628.329775][ T2194] loop4: detected capacity change from 0 to 1 09:12:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010601000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000480000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010701000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1628.329796][ T2188] EXT4-fs (loop2): Invalid log block size: 143 [ 1628.337417][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1628.342352][ T2195] loop0: detected capacity change from 0 to 4 [ 1628.358702][ T2195] EXT4-fs (loop0): Invalid log block size: 65279 09:12:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010801000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1628.404305][ T2198] loop3: detected capacity change from 0 to 1 [ 1628.406892][ T2195] loop0: detected capacity change from 0 to 4 [ 1628.410674][ T2188] loop2: detected capacity change from 0 to 4 [ 1628.431511][ T2194] loop4: detected capacity change from 0 to 1 [ 1628.435535][ T2188] EXT4-fs (loop2): Invalid log block size: 143 09:12:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000004c0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010a01000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1628.449967][ T2195] EXT4-fs (loop0): Invalid log block size: 65279 [ 1628.460230][ T2198] loop3: p1 < > p2 < > p4 [ 1628.464657][ T2198] loop3: partition table partially beyond EOD, truncated [ 1628.471813][ T2198] loop3: p1 start 335762607 is beyond EOD, truncated [ 1628.478518][ T2198] loop3: p2 size 2 extends beyond EOD, truncated [ 1628.485867][ T2198] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1628.564644][ T2198] loop3: detected capacity change from 0 to 1 [ 1628.630104][ T381] loop3: p1 < > p2 < > p4 [ 1628.634498][ T381] loop3: partition table partially beyond EOD, truncated [ 1628.641659][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1628.648311][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1628.654906][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1628.662964][ T381] loop3: p1 < > p2 < > p4 [ 1628.667359][ T381] loop3: partition table partially beyond EOD, truncated [ 1628.674488][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1628.681156][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1628.687803][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1628.695747][ T2198] loop3: p1 < > p2 < > p4 [ 1628.700153][ T2198] loop3: partition table partially beyond EOD, truncated [ 1628.707329][ T2198] loop3: p1 start 335762607 is beyond EOD, truncated [ 1628.714006][ T2198] loop3: p2 size 2 extends beyond EOD, truncated [ 1628.720659][ T2198] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:31 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000007a004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000001a200000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000fff000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010b01000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:31 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800fe00000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000540000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1628.750836][ T381] loop3: p1 < > p2 < > p4 [ 1628.755245][ T381] loop3: partition table partially beyond EOD, truncated [ 1628.762423][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1628.769086][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1628.777878][ T2217] loop0: detected capacity change from 0 to 4 [ 1628.783831][ T2220] loop2: detected capacity change from 0 to 4 [ 1628.789590][ T2222] loop4: detected capacity change from 0 to 1 09:12:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef011801000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1628.797133][ T2217] EXT4-fs (loop0): Invalid log block size: 65295 [ 1628.799669][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1628.807750][ T2220] EXT4-fs (loop2): Invalid log block size: 162 [ 1628.831963][ T2220] loop2: detected capacity change from 0 to 4 [ 1628.832367][ T2217] loop0: detected capacity change from 0 to 4 [ 1628.844287][ T2220] EXT4-fs (loop2): Invalid log block size: 162 09:12:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef012601000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef017701000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000550000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1628.844678][ T2217] EXT4-fs (loop0): Invalid log block size: 65295 [ 1628.863615][ T2224] loop3: detected capacity change from 0 to 1 [ 1628.883486][ T2222] loop4: detected capacity change from 0 to 1 09:12:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef017e01000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000001ed00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1628.910663][ T2224] loop3: p1 < > p2 < > p4 [ 1628.915086][ T2224] loop3: partition table partially beyond EOD, truncated [ 1628.922171][ T2224] loop3: p1 start 335762607 is beyond EOD, truncated [ 1628.928871][ T2224] loop3: p2 size 2 extends beyond EOD, truncated [ 1628.944829][ T2224] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1628.947298][ T2238] loop2: detected capacity change from 0 to 4 [ 1628.959081][ T2238] EXT4-fs (loop2): Invalid log block size: 237 [ 1628.966314][ T381] loop3: p1 < > p2 < > p4 [ 1628.970746][ T381] loop3: partition table partially beyond EOD, truncated [ 1628.977844][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1628.984555][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1628.991339][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1629.010829][ T2238] loop2: detected capacity change from 0 to 4 [ 1629.017222][ T2238] EXT4-fs (loop2): Invalid log block size: 237 [ 1629.028511][ T2224] loop3: detected capacity change from 0 to 1 [ 1629.090064][ T381] loop3: p1 < > p2 < > p4 [ 1629.094534][ T381] loop3: partition table partially beyond EOD, truncated [ 1629.101712][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1629.108379][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1629.115161][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1629.123072][ T2224] loop3: p1 < > p2 < > p4 [ 1629.127471][ T2224] loop3: partition table partially beyond EOD, truncated [ 1629.134559][ T2224] loop3: p1 start 335762607 is beyond EOD, truncated [ 1629.141273][ T2224] loop3: p2 size 2 extends beyond EOD, truncated [ 1629.147880][ T2224] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:32 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000017c004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100fffffbff000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01fe01000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000600000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:32 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068007c01000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000c0ed00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1629.240889][ T381] loop3: p1 < > p2 < > p4 [ 1629.245323][ T381] loop3: partition table partially beyond EOD, truncated [ 1629.252499][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1629.259208][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1629.270938][ T2244] loop2: detected capacity change from 0 to 4 [ 1629.276250][ T2248] loop0: detected capacity change from 0 to 4 [ 1629.281733][ T2245] loop4: detected capacity change from 0 to 1 09:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010003000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010005000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1629.284793][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1629.289320][ T2248] EXT4-fs (loop0): Invalid log block size: 65531 [ 1629.304940][ T2244] EXT4-fs (loop2): Invalid log block size: 237 09:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010006000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000630000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1629.341112][ T2244] loop2: detected capacity change from 0 to 4 [ 1629.351920][ T2248] loop0: detected capacity change from 0 to 4 [ 1629.355578][ T2244] EXT4-fs (loop2): Invalid log block size: 237 [ 1629.370352][ T2248] EXT4-fs (loop0): Invalid log block size: 65531 09:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010007000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000fffe00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1629.390697][ T2245] loop4: detected capacity change from 0 to 1 [ 1629.399867][ T2259] loop3: detected capacity change from 0 to 1 [ 1629.430729][ T2263] loop2: detected capacity change from 0 to 4 [ 1629.442213][ T2263] EXT4-fs (loop2): Invalid log block size: 254 [ 1629.450472][ T381] loop3: p1 < > p2 < > p4 [ 1629.454879][ T381] loop3: partition table partially beyond EOD, truncated [ 1629.461935][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1629.468582][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1629.475211][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1629.483246][ T2259] loop3: p1 < > p2 < > p4 [ 1629.487637][ T2259] loop3: partition table partially beyond EOD, truncated [ 1629.494787][ T2259] loop3: p1 start 335762607 is beyond EOD, truncated [ 1629.501553][ T2259] loop3: p2 size 2 extends beyond EOD, truncated [ 1629.509129][ T2263] loop2: detected capacity change from 0 to 4 [ 1629.511345][ T2259] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1629.515508][ T2263] EXT4-fs (loop2): Invalid log block size: 254 [ 1629.566214][ T2259] loop3: detected capacity change from 0 to 1 [ 1629.620115][ T381] loop3: p1 < > p2 < > p4 [ 1629.624516][ T381] loop3: partition table partially beyond EOD, truncated [ 1629.631579][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1629.638239][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1629.644846][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1629.652724][ T2259] loop3: p1 < > p2 < > p4 [ 1629.657118][ T2259] loop3: partition table partially beyond EOD, truncated [ 1629.664203][ T2259] loop3: p1 start 335762607 is beyond EOD, truncated [ 1629.670878][ T2259] loop3: p2 size 2 extends beyond EOD, truncated [ 1629.677481][ T2259] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:32 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000647f004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100fffbffff000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000680000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000e000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:32 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800a201000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000fff00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1629.720764][ T381] loop3: p1 < > p2 < > p4 [ 1629.725248][ T381] loop3: partition table partially beyond EOD, truncated [ 1629.732388][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1629.739138][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1629.751765][ T2269] loop4: detected capacity change from 0 to 1 [ 1629.758265][ T2272] loop2: detected capacity change from 0 to 4 [ 1629.758423][ T2274] loop0: detected capacity change from 0 to 4 09:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000f000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010020000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1629.771457][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1629.771622][ T2272] EXT4-fs (loop2): Invalid log block size: 255 [ 1629.789015][ T2274] EXT4-fs (loop0): Invalid log block size: 65535 09:12:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000006c0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01003f000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1629.825124][ T2274] loop0: detected capacity change from 0 to 4 [ 1629.827072][ T2276] loop3: detected capacity change from 0 to 1 [ 1629.831605][ T2272] loop2: detected capacity change from 0 to 4 [ 1629.843043][ T2274] EXT4-fs (loop0): Invalid log block size: 65535 [ 1629.853151][ T2272] EXT4-fs (loop2): Invalid log block size: 255 [ 1629.862026][ T2269] loop4: detected capacity change from 0 to 1 [ 1629.870278][ T2276] loop3: p1 < > p2 < > p4 09:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010040000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000feff00000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1629.874697][ T2276] loop3: partition table partially beyond EOD, truncated [ 1629.881776][ T2276] loop3: p1 start 335762607 is beyond EOD, truncated [ 1629.888447][ T2276] loop3: p2 size 2 extends beyond EOD, truncated [ 1629.910237][ T2276] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1629.937928][ T2290] loop2: detected capacity change from 0 to 4 [ 1629.954119][ T2276] loop3: detected capacity change from 0 to 1 [ 1629.960107][ T2290] EXT4-fs (loop2): Invalid log block size: 255 [ 1630.000400][ T2276] loop3: p1 < > p2 < > p4 [ 1630.001035][ T2290] loop2: detected capacity change from 0 to 4 [ 1630.004825][ T2276] loop3: partition table partially beyond EOD, truncated [ 1630.011806][ T2290] EXT4-fs (loop2): Invalid log block size: 255 [ 1630.018031][ T2276] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.030772][ T2276] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.037524][ T2276] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1630.045450][ T381] loop3: p1 < > p2 < > p4 [ 1630.049847][ T381] loop3: partition table partially beyond EOD, truncated [ 1630.056909][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.063582][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.070278][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:32 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000089004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100f9fdffff000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000740000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01fffe000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:32 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000402000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000008000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1630.104996][ T381] loop3: p1 < > p2 < > p4 [ 1630.109405][ T381] loop3: partition table partially beyond EOD, truncated [ 1630.116573][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.123261][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.136541][ T2296] loop0: detected capacity change from 0 to 4 [ 1630.138652][ T2300] loop2: detected capacity change from 0 to 4 [ 1630.145106][ T2298] loop4: detected capacity change from 0 to 1 09:12:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010002000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1630.149748][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1630.154862][ T2300] EXT4-fs (loop2): Invalid log block size: 2048 [ 1630.169595][ T2296] EXT4-fs (loop0): Invalid log block size: 65535 [ 1630.193665][ T2302] loop3: detected capacity change from 0 to 1 09:12:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010003000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000007a0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1630.204694][ T2300] loop2: detected capacity change from 0 to 4 [ 1630.211163][ T2296] loop0: detected capacity change from 0 to 4 [ 1630.218022][ T2300] EXT4-fs (loop2): Invalid log block size: 2048 [ 1630.221850][ T2296] EXT4-fs (loop0): Invalid log block size: 65535 [ 1630.238736][ T2298] loop4: detected capacity change from 0 to 1 [ 1630.247276][ T381] loop3: p1 < > p2 < > p4 09:12:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000400008000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010005000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1630.251720][ T381] loop3: partition table partially beyond EOD, truncated [ 1630.258908][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.265589][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.278805][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1630.286163][ T2311] loop2: detected capacity change from 0 to 4 [ 1630.296306][ T381] loop3: p1 < > p2 < > p4 09:12:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010006000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1630.297038][ T2311] EXT4-fs (loop2): Invalid log block size: 2048 [ 1630.300775][ T381] loop3: partition table partially beyond EOD, truncated [ 1630.314089][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.320779][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.332558][ T2311] loop2: detected capacity change from 0 to 4 [ 1630.347429][ T2311] EXT4-fs (loop2): Invalid log block size: 2048 [ 1630.355615][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1630.364248][ T2302] loop3: p1 < > p2 < > p4 [ 1630.368649][ T2302] loop3: partition table partially beyond EOD, truncated [ 1630.375811][ T2302] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.382528][ T2302] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.389103][ T2302] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1630.434619][ T2302] loop3: detected capacity change from 0 to 1 [ 1630.480141][ T381] loop3: p1 < > p2 < > p4 [ 1630.484584][ T381] loop3: partition table partially beyond EOD, truncated [ 1630.491626][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.498276][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.504962][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1630.512948][ T381] loop3: p1 < > p2 < > p4 [ 1630.517339][ T381] loop3: partition table partially beyond EOD, truncated [ 1630.524403][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.531077][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.537694][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1630.545617][ T2302] loop3: p1 < > p2 < > p4 [ 1630.550036][ T2302] loop3: partition table partially beyond EOD, truncated [ 1630.557074][ T2302] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.563745][ T2302] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.570453][ T2302] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:33 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000090004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000017c0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:33 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000003000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100fdfdffff000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010007000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000010000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1630.630734][ T381] loop3: p1 < > p2 < > p4 [ 1630.635159][ T381] loop3: partition table partially beyond EOD, truncated [ 1630.642246][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.649103][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.664700][ T2325] loop2: detected capacity change from 0 to 4 [ 1630.664836][ T2326] loop0: detected capacity change from 0 to 4 09:12:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000e000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1630.671761][ T2323] loop4: detected capacity change from 0 to 1 [ 1630.677949][ T2326] EXT4-fs (loop0): Invalid log block size: 65535 [ 1630.689762][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1630.690851][ T2325] EXT4-fs (loop2): Invalid log block size: 65536 09:12:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000f000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000890000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010010000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1630.743815][ T2326] loop0: detected capacity change from 0 to 4 [ 1630.750810][ T2325] loop2: detected capacity change from 0 to 4 [ 1630.759369][ T2325] EXT4-fs (loop2): Invalid log block size: 65536 [ 1630.765757][ T2326] EXT4-fs (loop0): Invalid log block size: 65535 [ 1630.784230][ T2323] loop4: detected capacity change from 0 to 1 09:12:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef0100fe000000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001007fffffff000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1630.795960][ T2338] loop3: detected capacity change from 0 to 1 [ 1630.838402][ T381] loop3: p1 < > p2 < > p4 [ 1630.842841][ T381] loop3: partition table partially beyond EOD, truncated [ 1630.847800][ T2342] loop0: detected capacity change from 0 to 4 [ 1630.849880][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.862597][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.865421][ T2342] EXT4-fs (loop0): Invalid log block size: 65535 [ 1630.872003][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1630.883436][ T2338] loop3: p1 < > p2 < > p4 [ 1630.887840][ T2338] loop3: partition table partially beyond EOD, truncated [ 1630.895078][ T2338] loop3: p1 start 335762607 is beyond EOD, truncated [ 1630.901780][ T2338] loop3: p2 size 2 extends beyond EOD, truncated [ 1630.908454][ T2338] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1630.922594][ T2342] loop0: detected capacity change from 0 to 4 [ 1630.929020][ T2342] EXT4-fs (loop0): Invalid log block size: 65535 [ 1630.954631][ T2338] loop3: detected capacity change from 0 to 1 [ 1631.000061][ T381] loop3: p1 < > p2 < > p4 [ 1631.004545][ T381] loop3: partition table partially beyond EOD, truncated [ 1631.011732][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1631.018393][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1631.025303][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1631.033472][ T2338] loop3: p1 < > p2 < > p4 [ 1631.037872][ T2338] loop3: partition table partially beyond EOD, truncated [ 1631.044928][ T2338] loop3: p1 start 335762607 is beyond EOD, truncated [ 1631.051623][ T2338] loop3: p2 size 2 extends beyond EOD, truncated [ 1631.058156][ T2338] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:33 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000000800005000001a2004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000020000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010000030000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000900000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:33 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000204000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010085ffffff000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1631.110803][ T381] loop3: p1 < > p2 < > p4 [ 1631.115216][ T381] loop3: partition table partially beyond EOD, truncated [ 1631.122300][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1631.128969][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1631.137099][ T2347] loop2: detected capacity change from 0 to 4 [ 1631.144610][ T2346] loop0: detected capacity change from 0 to 4 [ 1631.148933][ T2352] loop4: detected capacity change from 0 to 1 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef0100feff0000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000d041f00def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1631.160513][ T2347] EXT4-fs (loop2): Invalid log block size: 131072 [ 1631.167156][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1631.170031][ T2346] EXT4-fs (loop0): Invalid log block size: 65535 [ 1631.190826][ T2347] loop2: detected capacity change from 0 to 4 [ 1631.197308][ T2347] EXT4-fs (loop2): Invalid log block size: 131072 09:12:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000a00000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef0100feffffffdef4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000004020000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1631.212917][ T2346] loop0: detected capacity change from 0 to 4 [ 1631.220339][ T2346] EXT4-fs (loop0): Invalid log block size: 65535 [ 1631.241124][ T2355] loop3: detected capacity change from 0 to 1 [ 1631.252489][ T2352] loop4: detected capacity change from 0 to 1 09:12:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001008cffffff000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1631.264817][ T2366] loop2: detected capacity change from 0 to 4 [ 1631.272578][ T2366] EXT4-fs (loop2): Invalid log block size: 132096 [ 1631.289667][ T2368] loop0: detected capacity change from 0 to 4 [ 1631.296320][ T381] loop3: p1 < > p2 < > p4 [ 1631.297160][ T2368] EXT4-fs (loop0): Invalid log block size: 65535 [ 1631.300747][ T381] loop3: partition table partially beyond EOD, truncated [ 1631.300799][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1631.320730][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1631.327392][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1631.335369][ T2355] loop3: p1 < > p2 < > p4 [ 1631.339761][ T2355] loop3: partition table partially beyond EOD, truncated [ 1631.346894][ T2355] loop3: p1 start 335762607 is beyond EOD, truncated [ 1631.353578][ T2355] loop3: p2 size 2 extends beyond EOD, truncated [ 1631.360311][ T2355] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1631.361057][ T2366] loop2: detected capacity change from 0 to 4 [ 1631.374146][ T2366] EXT4-fs (loop2): Invalid log block size: 132096 [ 1631.376072][ T2368] loop0: detected capacity change from 0 to 4 [ 1631.387514][ T2368] EXT4-fs (loop0): Invalid log block size: 65535 [ 1631.467526][ T2355] loop3: detected capacity change from 0 to 1 [ 1631.520178][ T381] loop3: p1 < > p2 < > p4 [ 1631.524658][ T381] loop3: partition table partially beyond EOD, truncated [ 1631.531784][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1631.538500][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1631.545097][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1631.552916][ T2355] loop3: p1 < > p2 < > p4 [ 1631.557321][ T2355] loop3: partition table partially beyond EOD, truncated 09:12:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000001a20000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001020000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:34 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000604000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000030000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:34 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000000800005000001b0004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100daffffff000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1631.564449][ T2355] loop3: p1 start 335762607 is beyond EOD, truncated [ 1631.571126][ T2355] loop3: p2 size 2 extends beyond EOD, truncated [ 1631.577688][ T2355] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1631.607285][ T2374] loop2: detected capacity change from 0 to 4 [ 1631.613793][ T2376] loop0: detected capacity change from 0 to 4 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001030000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001040000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1631.617652][ T2378] loop4: detected capacity change from 0 to 1 [ 1631.631238][ T2374] EXT4-fs (loop2): Invalid log block size: 196608 [ 1631.638388][ T2376] EXT4-fs (loop0): Invalid log block size: 65535 09:12:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000001aa0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001050000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1631.671593][ T2374] loop2: detected capacity change from 0 to 4 [ 1631.685786][ T2376] loop0: detected capacity change from 0 to 4 [ 1631.693735][ T2385] loop3: detected capacity change from 0 to 1 [ 1631.700292][ T2376] EXT4-fs (loop0): Invalid log block size: 65535 [ 1631.710149][ T2374] EXT4-fs (loop2): Invalid log block size: 196608 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001060000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100f6ffffff000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1631.723614][ T2378] loop4: detected capacity change from 0 to 1 [ 1631.742477][ T381] loop3: p1 < > p2 < > p4 [ 1631.746977][ T381] loop3: partition table partially beyond EOD, truncated [ 1631.754042][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1631.760788][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000040000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001070000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1631.768520][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1631.793325][ T2395] loop2: detected capacity change from 0 to 4 [ 1631.799117][ T381] loop3: p1 < > p2 < > p4 [ 1631.799855][ T2397] loop0: detected capacity change from 0 to 4 [ 1631.803892][ T381] loop3: partition table partially beyond EOD, truncated [ 1631.813817][ T2395] EXT4-fs (loop2): Invalid log block size: 262144 09:12:34 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000005000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000c00000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1631.817069][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1631.830046][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1631.830187][ T2397] EXT4-fs (loop0): Invalid log block size: 65535 [ 1631.847592][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1631.858012][ T2385] loop3: p1 < > p2 < > p4 [ 1631.862450][ T2385] loop3: partition table partially beyond EOD, truncated [ 1631.869597][ T2385] loop3: p1 start 335762607 is beyond EOD, truncated [ 1631.876288][ T2385] loop3: p2 size 2 extends beyond EOD, truncated [ 1631.883046][ T2385] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1631.892528][ T2395] loop2: detected capacity change from 0 to 4 [ 1631.896080][ T2397] loop0: detected capacity change from 0 to 4 [ 1631.898978][ T2395] EXT4-fs (loop2): Invalid log block size: 262144 [ 1631.915129][ T2397] EXT4-fs (loop0): Invalid log block size: 65535 [ 1631.915716][ T2403] loop4: detected capacity change from 0 to 1 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001080000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:34 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000000800005000000c0004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000001e60000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000050000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100feffffff000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef0100010a0000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1631.990956][ T2409] loop3: detected capacity change from 0 to 1 [ 1631.994776][ T2411] loop2: detected capacity change from 0 to 4 [ 1632.009865][ T2411] EXT4-fs (loop2): Invalid log block size: 327680 [ 1632.016744][ T2413] loop0: detected capacity change from 0 to 4 [ 1632.026645][ T2413] EXT4-fs (loop0): Invalid log block size: 65535 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef0100010b0000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001180000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1632.035390][ T2403] loop4: detected capacity change from 0 to 1 [ 1632.040365][ T381] loop3: p1 < > p2 < > p4 [ 1632.045885][ T381] loop3: partition table partially beyond EOD, truncated [ 1632.052972][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1632.059642][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1632.067095][ T2411] loop2: detected capacity change from 0 to 4 [ 1632.067809][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1632.082147][ T2411] EXT4-fs (loop2): Invalid log block size: 327680 09:12:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000011ea0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1632.088999][ T2409] loop3: p1 < > p2 < > p4 [ 1632.093446][ T2409] loop3: partition table partially beyond EOD, truncated [ 1632.100559][ T2409] loop3: p1 start 335762607 is beyond EOD, truncated [ 1632.107233][ T2409] loop3: p2 size 2 extends beyond EOD, truncated [ 1632.114481][ T2409] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1632.122801][ T2413] loop0: detected capacity change from 0 to 4 [ 1632.129196][ T2413] EXT4-fs (loop0): Invalid log block size: 65535 09:12:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001260000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:34 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000006000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000060000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000ec0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1632.149111][ T2409] loop3: detected capacity change from 0 to 1 [ 1632.183347][ T2427] loop2: detected capacity change from 0 to 4 09:12:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000100000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1632.197744][ T2427] EXT4-fs (loop2): Invalid log block size: 393216 [ 1632.204404][ T381] loop3: p1 < > p2 < > p4 [ 1632.208829][ T381] loop3: partition table partially beyond EOD, truncated [ 1632.215421][ T2431] loop0: detected capacity change from 0 to 4 [ 1632.216035][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1632.222813][ T2431] EXT4-fs (loop0): Invalid log block size: 1048576 [ 1632.228684][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1632.242023][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1632.250774][ T2433] loop4: detected capacity change from 0 to 1 [ 1632.257684][ T381] loop3: p1 < > p2 < > p4 [ 1632.262112][ T381] loop3: partition table partially beyond EOD, truncated [ 1632.269141][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1632.275817][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1632.286945][ T2427] loop2: detected capacity change from 0 to 4 [ 1632.293344][ T2431] loop0: detected capacity change from 0 to 4 [ 1632.294581][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1632.300013][ T2427] EXT4-fs (loop2): Invalid log block size: 393216 [ 1632.308913][ T2431] EXT4-fs (loop0): Invalid log block size: 1048576 [ 1632.320127][ T2409] loop3: p1 < > p2 < > p4 [ 1632.324567][ T2409] loop3: partition table partially beyond EOD, truncated [ 1632.331695][ T2409] loop3: p1 start 335762607 is beyond EOD, truncated [ 1632.333618][ T2433] loop4: detected capacity change from 0 to 1 [ 1632.338388][ T2409] loop3: p2 size 2 extends beyond EOD, truncated 09:12:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000fffe0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001770000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:35 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000000800005000000ec004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000004060000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000800000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1632.339271][ T2409] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1632.387117][ T2437] loop0: detected capacity change from 0 to 4 [ 1632.387128][ T2441] loop2: detected capacity change from 0 to 4 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef0100017e0000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:35 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000406000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1632.394106][ T2437] EXT4-fs (loop0): Invalid log block size: 8388608 [ 1632.406791][ T2441] EXT4-fs (loop2): Invalid log block size: 394240 [ 1632.437264][ T2446] loop4: detected capacity change from 0 to 1 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001fe0000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001040200def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000fff0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1632.448304][ T2437] loop0: detected capacity change from 0 to 4 [ 1632.454618][ T2441] loop2: detected capacity change from 0 to 4 [ 1632.468379][ T2437] EXT4-fs (loop0): Invalid log block size: 8388608 [ 1632.475259][ T2441] EXT4-fs (loop2): Invalid log block size: 394240 [ 1632.478799][ T2450] loop3: detected capacity change from 0 to 1 09:12:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000070000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000800000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000300def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1632.521085][ T381] loop3: p1 < > p2 < > p4 [ 1632.525514][ T381] loop3: partition table partially beyond EOD, truncated [ 1632.532623][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1632.539397][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1632.545534][ T2457] loop2: detected capacity change from 0 to 4 [ 1632.551443][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1632.553298][ T2457] EXT4-fs (loop2): Invalid log block size: 458752 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001020400def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1632.567241][ T2460] loop0: detected capacity change from 0 to 4 [ 1632.577134][ T2460] EXT4-fs (loop0): Invalid log block size: 134217728 [ 1632.578244][ T2446] loop4: detected capacity change from 0 to 1 [ 1632.584209][ T2450] loop3: p1 < > p2 < > p4 [ 1632.594450][ T2450] loop3: partition table partially beyond EOD, truncated [ 1632.601536][ T2450] loop3: p1 start 335762607 is beyond EOD, truncated [ 1632.608204][ T2450] loop3: p2 size 2 extends beyond EOD, truncated [ 1632.618528][ T2457] loop2: detected capacity change from 0 to 4 [ 1632.625680][ T2460] loop0: detected capacity change from 0 to 4 [ 1632.632084][ T2457] EXT4-fs (loop2): Invalid log block size: 458752 [ 1632.638768][ T2460] EXT4-fs (loop0): Invalid log block size: 134217728 [ 1632.638822][ T2450] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1632.705558][ T2450] loop3: detected capacity change from 0 to 1 [ 1632.800087][ T381] loop3: p1 < > p2 < > p4 [ 1632.804492][ T381] loop3: partition table partially beyond EOD, truncated [ 1632.811623][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1632.818293][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1632.825039][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1632.832863][ T2450] loop3: p1 < > p2 < > p4 [ 1632.837267][ T2450] loop3: partition table partially beyond EOD, truncated 09:12:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000feff0000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001060400def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:35 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000fffe004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000c0ed00000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:35 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000007000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000080000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1632.844374][ T2450] loop3: p1 start 335762607 is beyond EOD, truncated [ 1632.851053][ T2450] loop3: p2 size 2 extends beyond EOD, truncated [ 1632.857736][ T2450] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1632.888807][ T2472] loop0: detected capacity change from 0 to 4 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000500def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000600def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001040600def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1632.893312][ T2471] loop4: detected capacity change from 0 to 1 [ 1632.895333][ T2469] loop2: detected capacity change from 0 to 4 [ 1632.908013][ T2469] EXT4-fs (loop2): Invalid log block size: 524288 [ 1632.915067][ T2472] EXT4-fs (loop0): Invalid log block size: 3988783104 09:12:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000400000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000700def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000a00def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1632.971400][ T2472] loop0: detected capacity change from 0 to 4 [ 1632.983923][ T2471] loop4: detected capacity change from 0 to 1 [ 1632.990325][ T2469] loop2: detected capacity change from 0 to 4 [ 1632.990502][ T2483] loop3: detected capacity change from 0 to 1 [ 1633.003169][ T2469] EXT4-fs (loop2): Invalid log block size: 524288 [ 1633.009371][ T2472] EXT4-fs (loop0): Invalid log block size: 3988783104 09:12:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000b00def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000090000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1633.057656][ T2483] loop3: p1 < > p2 < > p4 [ 1633.062153][ T2483] loop3: partition table partially beyond EOD, truncated [ 1633.069271][ T2483] loop3: p1 start 335762607 is beyond EOD, truncated [ 1633.075966][ T2483] loop3: p2 size 2 extends beyond EOD, truncated [ 1633.085265][ T2494] loop2: detected capacity change from 0 to 4 [ 1633.100741][ T2494] EXT4-fs (loop2): Invalid log block size: 589824 [ 1633.108434][ T2483] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1633.150784][ T2494] loop2: detected capacity change from 0 to 4 [ 1633.157146][ T2494] EXT4-fs (loop2): Invalid log block size: 589824 [ 1633.158942][ T2483] loop3: detected capacity change from 0 to 1 [ 1633.210164][ T2483] loop3: p1 < > p2 < > p4 [ 1633.214583][ T2483] loop3: partition table partially beyond EOD, truncated [ 1633.221717][ T2483] loop3: p1 start 335762607 is beyond EOD, truncated [ 1633.228379][ T2483] loop3: p2 size 2 extends beyond EOD, truncated [ 1633.235144][ T2483] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:36 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000fff004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000800000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001001800def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000001000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:36 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000009000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000a0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1633.300788][ T381] loop3: p1 < > p2 < > p4 [ 1633.305234][ T381] loop3: partition table partially beyond EOD, truncated [ 1633.312328][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1633.319074][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1633.328334][ T2499] loop2: detected capacity change from 0 to 4 [ 1633.334984][ T2502] loop4: detected capacity change from 0 to 1 [ 1633.343393][ T2504] loop0: detected capacity change from 0 to 4 09:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001002000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1633.349706][ T2499] EXT4-fs (loop2): Invalid log block size: 655360 [ 1633.350826][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001002600def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000040000800000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001003f00def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1633.391550][ T2504] loop0: detected capacity change from 0 to 4 [ 1633.401055][ T2499] loop2: detected capacity change from 0 to 4 [ 1633.407763][ T2499] EXT4-fs (loop2): Invalid log block size: 655360 [ 1633.418014][ T2507] loop3: detected capacity change from 0 to 1 09:12:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100ffffffffffff07000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1633.440072][ T2502] loop4: detected capacity change from 0 to 1 [ 1633.459779][ T2518] loop0: detected capacity change from 0 to 4 [ 1633.466060][ T381] loop3: p1 < > p2 < > p4 [ 1633.466713][ T2518] EXT4-fs (loop0): Invalid log block size: 4294967295 [ 1633.470485][ T381] loop3: partition table partially beyond EOD, truncated [ 1633.470590][ T381] loop3: p1 start 335762607 is beyond EOD, truncated 09:12:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000001000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1633.491015][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1633.499566][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1633.509171][ T381] loop3: p1 < > p2 < > p4 [ 1633.513697][ T381] loop3: partition table partially beyond EOD, truncated [ 1633.520820][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1633.527483][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1633.534271][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1633.544021][ T2518] loop0: detected capacity change from 0 to 4 [ 1633.546249][ T2507] loop3: p1 < > p2 < > p4 [ 1633.552498][ T2518] EXT4-fs (loop0): Invalid log block size: 4294967295 [ 1633.554553][ T2507] loop3: partition table partially beyond EOD, truncated [ 1633.568427][ T2507] loop3: p1 start 335762607 is beyond EOD, truncated [ 1633.575117][ T2507] loop3: p2 size 2 extends beyond EOD, truncated [ 1633.581805][ T2507] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1633.634354][ T2507] loop3: detected capacity change from 0 to 1 [ 1633.690218][ T381] loop3: p1 < > p2 < > p4 [ 1633.694619][ T381] loop3: partition table partially beyond EOD, truncated [ 1633.701712][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1633.708371][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1633.715059][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1633.723116][ T2507] loop3: p1 < > p2 < > p4 [ 1633.727616][ T2507] loop3: partition table partially beyond EOD, truncated 09:12:36 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000feff004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000b0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001004000def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:36 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000a000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000002000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000010000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1633.734645][ T2507] loop3: p1 start 335762607 is beyond EOD, truncated [ 1633.741339][ T2507] loop3: p2 size 2 extends beyond EOD, truncated [ 1633.747931][ T2507] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1633.775343][ T2524] loop4: detected capacity change from 0 to 1 [ 1633.782506][ T2530] loop2: detected capacity change from 0 to 4 09:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001007700def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001007e00def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1633.783455][ T2529] loop0: detected capacity change from 0 to 4 [ 1633.795843][ T2530] EXT4-fs (loop2): Invalid log block size: 720896 [ 1633.803344][ T2529] EXT4-fs (loop0): Invalid log cluster size: 256 09:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001fffe00def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000009000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1633.842195][ T2536] loop3: detected capacity change from 0 to 1 [ 1633.860309][ T2530] loop2: detected capacity change from 0 to 4 [ 1633.860316][ T2529] loop0: detected capacity change from 0 to 4 [ 1633.873105][ T2530] EXT4-fs (loop2): Invalid log block size: 720896 [ 1633.879824][ T2529] EXT4-fs (loop0): Invalid log cluster size: 256 [ 1633.886611][ T2536] loop3: p1 < > p2 < > p4 09:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001feff00def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000200def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1633.891087][ T2536] loop3: partition table partially beyond EOD, truncated [ 1633.898142][ T2536] loop3: p1 start 335762607 is beyond EOD, truncated [ 1633.904829][ T2536] loop3: p2 size 2 extends beyond EOD, truncated [ 1633.912144][ T2536] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1633.946253][ T2524] loop4: detected capacity change from 0 to 1 [ 1633.978069][ T2536] loop3: detected capacity change from 0 to 1 [ 1634.030188][ T381] loop3: p1 < > p2 < > p4 [ 1634.034594][ T381] loop3: partition table partially beyond EOD, truncated [ 1634.041669][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1634.048333][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1634.055053][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1634.062932][ T2536] loop3: p1 < > p2 < > p4 [ 1634.067323][ T2536] loop3: partition table partially beyond EOD, truncated [ 1634.074456][ T2536] loop3: p1 start 335762607 is beyond EOD, truncated [ 1634.081195][ T2536] loop3: p2 size 2 extends beyond EOD, truncated [ 1634.087737][ T2536] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:37 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000ffffffee00000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000c0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000020000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000300def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000c000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:37 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000b000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1634.170902][ T381] loop3: p1 < > p2 < > p4 [ 1634.175308][ T381] loop3: partition table partially beyond EOD, truncated [ 1634.182455][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1634.189117][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1634.197888][ T2552] loop0: detected capacity change from 0 to 4 [ 1634.203949][ T2555] loop2: detected capacity change from 0 to 4 [ 1634.211493][ T2552] EXT4-fs (loop0): Invalid log cluster size: 512 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000400def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000500def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1634.217951][ T2555] EXT4-fs (loop2): Invalid log block size: 786432 [ 1634.219377][ T2554] loop4: detected capacity change from 0 to 1 [ 1634.224926][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000600def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000001000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000700def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000d0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1634.270835][ T2555] loop2: detected capacity change from 0 to 4 [ 1634.278078][ T2552] loop0: detected capacity change from 0 to 4 [ 1634.284305][ T2555] EXT4-fs (loop2): Invalid log block size: 786432 [ 1634.284751][ T2552] EXT4-fs (loop0): Invalid log cluster size: 512 [ 1634.301234][ T2559] loop3: detected capacity change from 0 to 1 [ 1634.362895][ T2554] loop4: detected capacity change from 0 to 1 [ 1634.370307][ T2573] loop2: detected capacity change from 0 to 4 [ 1634.379735][ T2573] EXT4-fs (loop2): Invalid log block size: 851968 [ 1634.392845][ T2559] loop3: detected capacity change from 0 to 1 09:12:37 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000002004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000002000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000004020000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000800def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:37 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000c000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1634.440882][ T2573] loop2: detected capacity change from 0 to 4 [ 1634.451562][ T2573] EXT4-fs (loop2): Invalid log block size: 851968 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000a00def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000e0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1634.503293][ T2580] loop0: detected capacity change from 0 to 4 [ 1634.513611][ T2580] EXT4-fs (loop0): Invalid log cluster size: 516 [ 1634.524649][ T2581] loop4: detected capacity change from 0 to 1 [ 1634.543239][ T2583] loop3: detected capacity change from 0 to 1 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000b00def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000402000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1634.546328][ T2588] loop2: detected capacity change from 0 to 4 [ 1634.556126][ T2588] EXT4-fs (loop2): Invalid log block size: 917504 [ 1634.566097][ T2580] loop0: detected capacity change from 0 to 4 [ 1634.572531][ T2583] loop3: p1 < > p2 < > p4 [ 1634.576957][ T2583] loop3: partition table partially beyond EOD, truncated [ 1634.577179][ T2580] EXT4-fs (loop0): Invalid log cluster size: 516 [ 1634.584065][ T2583] loop3: p1 start 335762607 is beyond EOD, truncated [ 1634.597092][ T2583] loop3: p2 size 2 extends beyond EOD, truncated 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001001800def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000030000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1634.604579][ T2583] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1634.613041][ T2588] loop2: detected capacity change from 0 to 4 [ 1634.624897][ T2588] EXT4-fs (loop2): Invalid log block size: 917504 09:12:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000003000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001002600def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1634.654377][ T2581] loop4: detected capacity change from 0 to 1 [ 1634.657699][ T2597] loop0: detected capacity change from 0 to 4 [ 1634.667298][ T2597] EXT4-fs (loop0): Invalid log cluster size: 768 [ 1634.699371][ T2583] loop3: detected capacity change from 0 to 1 [ 1634.720837][ T2597] loop0: detected capacity change from 0 to 4 [ 1634.727218][ T2597] EXT4-fs (loop0): Invalid log cluster size: 768 [ 1634.736384][ T381] loop3: p1 < > p2 < > p4 [ 1634.740820][ T381] loop3: partition table partially beyond EOD, truncated [ 1634.747861][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1634.754656][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1634.761472][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1634.769470][ T381] loop3: p1 < > p2 < > p4 [ 1634.773909][ T381] loop3: partition table partially beyond EOD, truncated [ 1634.781119][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1634.787795][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:37 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000003004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000f0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:37 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000d000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001007700def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000004000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000040000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1634.794569][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1634.802742][ T2583] loop3: p1 < > p2 < > p4 [ 1634.807148][ T2583] loop3: partition table partially beyond EOD, truncated [ 1634.814245][ T2583] loop3: p1 start 335762607 is beyond EOD, truncated [ 1634.820922][ T2583] loop3: p2 size 2 extends beyond EOD, truncated [ 1634.827532][ T2583] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001007e00def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1634.861158][ T2604] loop2: detected capacity change from 0 to 4 [ 1634.869660][ T2612] loop0: detected capacity change from 0 to 4 [ 1634.869798][ T2610] loop4: detected capacity change from 0 to 1 [ 1634.882887][ T2604] EXT4-fs (loop2): Invalid log block size: 983040 [ 1634.890121][ T2612] EXT4-fs (loop0): Invalid log cluster size: 1024 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000100fe00def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000005000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1634.907263][ T2617] loop3: detected capacity change from 0 to 1 [ 1634.923718][ T2604] loop2: detected capacity change from 0 to 4 [ 1634.930414][ T2604] EXT4-fs (loop2): Invalid log block size: 983040 [ 1634.942091][ T2612] loop0: detected capacity change from 0 to 4 [ 1634.950711][ T2617] loop3: p1 < > p2 < > p4 [ 1634.955142][ T2617] loop3: partition table partially beyond EOD, 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000402def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000100000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1634.955150][ T2612] EXT4-fs (loop0): Invalid log cluster size: 1024 [ 1634.955151][ T2617] truncated [ 1634.961466][ T2617] loop3: p1 start 335762607 is beyond EOD, truncated [ 1634.977611][ T2617] loop3: p2 size 2 extends beyond EOD, truncated [ 1634.985117][ T2617] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1634.990461][ T2610] loop4: detected capacity change from 0 to 1 09:12:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000003def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1635.014240][ T2626] loop2: detected capacity change from 0 to 4 [ 1635.021203][ T2626] EXT4-fs (loop2): Invalid log block size: 1048576 [ 1635.056214][ T2617] loop3: detected capacity change from 0 to 1 [ 1635.063315][ T2626] loop2: detected capacity change from 0 to 4 [ 1635.069803][ T2626] EXT4-fs (loop2): Invalid log block size: 1048576 [ 1635.090115][ T381] loop3: p1 < > p2 < > p4 [ 1635.094519][ T381] loop3: partition table partially beyond EOD, truncated [ 1635.101640][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1635.108345][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1635.114926][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1635.122958][ T381] loop3: p1 < > p2 < > p4 [ 1635.127382][ T381] loop3: partition table partially beyond EOD, truncated [ 1635.134417][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1635.141079][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1635.147629][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000050000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000006000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000204def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:38 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000004004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:38 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000e000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000004100000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1635.155796][ T2617] loop3: p1 < > p2 < > p4 [ 1635.160266][ T2617] loop3: partition table partially beyond EOD, truncated [ 1635.167320][ T2617] loop3: p1 start 335762607 is beyond EOD, truncated [ 1635.173977][ T2617] loop3: p2 size 2 extends beyond EOD, truncated [ 1635.180700][ T2617] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000604def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1635.211368][ T2637] loop2: detected capacity change from 0 to 4 [ 1635.216569][ T2635] loop4: detected capacity change from 0 to 1 [ 1635.217711][ T2638] loop0: detected capacity change from 0 to 4 [ 1635.231009][ T2638] EXT4-fs (loop0): Invalid log cluster size: 1280 [ 1635.236834][ T2637] EXT4-fs (loop2): Invalid log block size: 1049600 09:12:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000406000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000005def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1635.269668][ T2642] loop3: detected capacity change from 0 to 1 [ 1635.281576][ T2637] loop2: detected capacity change from 0 to 4 [ 1635.281857][ T2638] loop0: detected capacity change from 0 to 4 [ 1635.289550][ T2637] EXT4-fs (loop2): Invalid log block size: 1049600 09:12:38 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000f000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000006def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000406def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1635.313996][ T2638] EXT4-fs (loop0): Invalid log cluster size: 1280 [ 1635.334824][ T2648] loop4: detected capacity change from 0 to 1 [ 1635.340247][ T381] loop3: p1 < > p2 < > p4 [ 1635.345393][ T381] loop3: partition table partially beyond EOD, truncated [ 1635.352535][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1635.359197][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000060000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000110000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000007000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1635.366086][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1635.379600][ T2642] loop3: p1 < > p2 < > p4 [ 1635.384032][ T2642] loop3: partition table partially beyond EOD, truncated [ 1635.391092][ T2642] loop3: p1 start 335762607 is beyond EOD, truncated [ 1635.397827][ T2642] loop3: p2 size 2 extends beyond EOD, truncated [ 1635.408708][ T2642] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1635.414305][ T2655] loop2: detected capacity change from 0 to 4 [ 1635.423196][ T2658] loop0: detected capacity change from 0 to 4 [ 1635.434842][ T381] loop3: p1 < > p2 < > p4 [ 1635.439311][ T381] loop3: partition table partially beyond EOD, truncated [ 1635.441807][ T2658] EXT4-fs (loop0): Invalid log cluster size: 1536 [ 1635.446441][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1635.455304][ T2655] EXT4-fs (loop2): Invalid log block size: 1114112 [ 1635.459439][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1635.460227][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1635.483345][ T2648] loop4: detected capacity change from 0 to 1 [ 1635.506092][ T2655] loop2: detected capacity change from 0 to 4 [ 1635.511436][ T2658] loop0: detected capacity change from 0 to 4 [ 1635.514837][ T2655] EXT4-fs (loop2): Invalid log block size: 1114112 [ 1635.518676][ T2658] EXT4-fs (loop0): Invalid log cluster size: 1536 [ 1635.528392][ T2642] loop3: detected capacity change from 0 to 1 09:12:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000008000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000007def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:38 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000005004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:38 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000011000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000004060000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000120000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000100000adef4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000100000bdef4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1635.610107][ T2663] loop2: detected capacity change from 0 to 4 [ 1635.616109][ T2666] loop0: detected capacity change from 0 to 4 [ 1635.618601][ T2663] EXT4-fs (loop2): Invalid log block size: 1179648 [ 1635.625328][ T2666] EXT4-fs (loop0): Invalid log cluster size: 1540 [ 1635.644401][ T2670] loop4: detected capacity change from 0 to 1 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000018def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000009000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1635.686562][ T2666] loop0: detected capacity change from 0 to 4 [ 1635.688828][ T2677] loop3: detected capacity change from 0 to 1 [ 1635.693024][ T2666] EXT4-fs (loop0): Invalid log cluster size: 1540 [ 1635.705602][ T2663] loop2: detected capacity change from 0 to 4 [ 1635.719288][ T2663] EXT4-fs (loop2): Invalid log block size: 1179648 [ 1635.730246][ T2677] loop3: p1 < > p2 < > p4 09:12:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000070000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000020def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1635.734671][ T2677] loop3: partition table partially beyond EOD, truncated [ 1635.741880][ T2677] loop3: p1 start 335762607 is beyond EOD, truncated [ 1635.748545][ T2677] loop3: p2 size 2 extends beyond EOD, truncated [ 1635.765251][ T2677] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1635.777558][ T2684] loop0: detected capacity change from 0 to 4 09:12:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000a000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000002120000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1635.784941][ T2684] EXT4-fs (loop0): Invalid log cluster size: 1792 [ 1635.796771][ T2670] loop4: detected capacity change from 0 to 1 [ 1635.822759][ T2690] loop2: detected capacity change from 0 to 4 [ 1635.829821][ T2690] EXT4-fs (loop2): Invalid log block size: 1180160 [ 1635.841022][ T2684] loop0: detected capacity change from 0 to 4 [ 1635.848652][ T2684] EXT4-fs (loop0): Invalid log cluster size: 1792 [ 1635.855170][ T2677] loop3: detected capacity change from 0 to 1 [ 1635.880904][ T2690] loop2: detected capacity change from 0 to 4 [ 1635.888154][ T2690] EXT4-fs (loop2): Invalid log block size: 1180160 [ 1635.910163][ T2677] loop3: p1 < > p2 < > p4 [ 1635.914621][ T2677] loop3: partition table partially beyond EOD, truncated [ 1635.921698][ T2677] loop3: p1 start 335762607 is beyond EOD, truncated [ 1635.928371][ T2677] loop3: p2 size 2 extends beyond EOD, truncated [ 1635.934955][ T2677] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:38 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000006004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000026def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000b000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000080000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:38 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000012000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000140000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1636.000888][ T381] loop3: p1 < > p2 < > p4 [ 1636.005318][ T381] loop3: partition table partially beyond EOD, truncated [ 1636.012464][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1636.019129][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1636.034917][ T2699] loop2: detected capacity change from 0 to 4 [ 1636.038862][ T2701] loop0: detected capacity change from 0 to 4 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000100003fdef4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000040def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1636.047756][ T2701] EXT4-fs (loop0): Invalid log cluster size: 2048 [ 1636.051450][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1636.056815][ T2700] loop4: detected capacity change from 0 to 1 [ 1636.061396][ T2699] EXT4-fs (loop2): Invalid log block size: 1310720 09:12:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000c000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000077def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000100007edef4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1636.100778][ T2701] loop0: detected capacity change from 0 to 4 [ 1636.108217][ T2701] EXT4-fs (loop0): Invalid log cluster size: 2048 [ 1636.127993][ T2699] loop2: detected capacity change from 0 to 4 [ 1636.136870][ T2699] EXT4-fs (loop2): Invalid log block size: 1310720 [ 1636.145000][ T2700] loop4: detected capacity change from 0 to 1 09:12:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000090000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1636.162470][ T2715] loop3: detected capacity change from 0 to 1 [ 1636.187329][ T2717] loop0: detected capacity change from 0 to 4 [ 1636.194253][ T2717] EXT4-fs (loop0): Invalid log cluster size: 2304 [ 1636.196667][ T2715] loop3: p1 < > p2 < > p4 [ 1636.205086][ T2715] loop3: partition table partially beyond EOD, truncated [ 1636.212262][ T2715] loop3: p1 start 335762607 is beyond EOD, truncated [ 1636.218999][ T2715] loop3: p2 size 2 extends beyond EOD, truncated [ 1636.225842][ T2715] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1636.233944][ T381] loop3: p1 < > p2 < > p4 [ 1636.238356][ T381] loop3: partition table partially beyond EOD, truncated [ 1636.245493][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1636.252250][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1636.258924][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1636.266771][ T2717] loop0: detected capacity change from 0 to 4 [ 1636.273288][ T2717] EXT4-fs (loop0): Invalid log cluster size: 2304 [ 1636.324744][ T2715] loop3: detected capacity change from 0 to 1 [ 1636.390159][ T381] loop3: p1 < > p2 < > p4 [ 1636.394571][ T381] loop3: partition table partially beyond EOD, truncated [ 1636.401637][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1636.408305][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1636.414923][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1636.422842][ T2715] loop3: p1 < > p2 < > p4 [ 1636.427241][ T2715] loop3: partition table partially beyond EOD, truncated 09:12:39 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000007004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000100fffedef4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000d000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:39 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000020000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000200000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000a0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1636.434409][ T2715] loop3: p1 start 335762607 is beyond EOD, truncated [ 1636.441087][ T2715] loop3: p2 size 2 extends beyond EOD, truncated [ 1636.447625][ T2715] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1636.478358][ T2725] loop2: detected capacity change from 0 to 4 [ 1636.478582][ T2723] loop4: detected capacity change from 0 to 1 09:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000100feffdef4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000002def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1636.492528][ T2727] loop0: detected capacity change from 0 to 4 [ 1636.498682][ T2725] EXT4-fs (loop2): Invalid log block size: 2097152 [ 1636.506186][ T2727] EXT4-fs (loop0): Invalid log cluster size: 2560 09:12:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000e000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000003def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1636.543934][ T2725] loop2: detected capacity change from 0 to 4 [ 1636.554957][ T2727] loop0: detected capacity change from 0 to 4 [ 1636.566512][ T2723] loop4: detected capacity change from 0 to 1 [ 1636.570542][ T2733] loop3: detected capacity change from 0 to 1 [ 1636.578746][ T2727] EXT4-fs (loop0): Invalid log cluster size: 2560 [ 1636.580310][ T2725] EXT4-fs (loop2): Invalid log block size: 2097152 09:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000004def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000000f000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1636.630615][ T381] loop3: p1 < > p2 < > p4 [ 1636.635050][ T381] loop3: partition table partially beyond EOD, truncated [ 1636.642204][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1636.648872][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1636.661765][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1636.670005][ T2733] loop3: p1 < > p2 < > p4 [ 1636.674421][ T2733] loop3: partition table partially beyond EOD, truncated [ 1636.681540][ T2733] loop3: p1 start 335762607 is beyond EOD, truncated [ 1636.688230][ T2733] loop3: p2 size 2 extends beyond EOD, truncated [ 1636.697022][ T2733] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1636.705066][ T381] loop3: p1 < > p2 < > p4 [ 1636.709490][ T381] loop3: partition table partially beyond EOD, truncated [ 1636.716675][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1636.723351][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1636.731235][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1636.780695][ T2733] loop3: detected capacity change from 0 to 1 [ 1636.850189][ T381] loop3: p1 < > p2 < > p4 [ 1636.854598][ T381] loop3: partition table partially beyond EOD, truncated [ 1636.861705][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1636.868366][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1636.875227][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1636.883204][ T2733] loop3: p1 < > p2 < > p4 [ 1636.887593][ T2733] loop3: partition table partially beyond EOD, truncated 09:12:39 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000008004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000b0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:39 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000022000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000010200000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000005def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000010000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1636.894777][ T2733] loop3: p1 start 335762607 is beyond EOD, truncated [ 1636.901448][ T2733] loop3: p2 size 2 extends beyond EOD, truncated [ 1636.908069][ T2733] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1636.937866][ T2749] loop2: detected capacity change from 0 to 4 [ 1636.944483][ T2751] loop0: detected capacity change from 0 to 4 09:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000006def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000007def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1636.945194][ T2749] EXT4-fs (loop2): Invalid log block size: 2101248 [ 1636.953355][ T2753] loop4: detected capacity change from 0 to 1 [ 1636.965640][ T2751] EXT4-fs (loop0): Invalid log cluster size: 2816 09:12:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000011000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000008def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1637.005619][ T2749] loop2: detected capacity change from 0 to 4 [ 1637.012153][ T2761] loop3: detected capacity change from 0 to 1 [ 1637.019152][ T2749] EXT4-fs (loop2): Invalid log block size: 2101248 [ 1637.029413][ T2751] loop0: detected capacity change from 0 to 4 [ 1637.037714][ T2751] EXT4-fs (loop0): Invalid log cluster size: 2816 [ 1637.049500][ T2753] loop4: detected capacity change from 0 to 1 09:12:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000100000adef4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000012000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1637.055236][ T381] loop3: p1 < > p2 < > p4 [ 1637.060059][ T381] loop3: partition table partially beyond EOD, truncated [ 1637.067179][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1637.073962][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1637.094937][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1637.118955][ T381] loop3: p1 < > p2 < > p4 [ 1637.123387][ T381] loop3: partition table partially beyond EOD, truncated [ 1637.130458][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1637.137114][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1637.143887][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1637.152011][ T2761] loop3: p1 < > p2 < > p4 [ 1637.156483][ T2761] loop3: partition table partially beyond EOD, truncated [ 1637.163710][ T2761] loop3: p1 start 335762607 is beyond EOD, truncated [ 1637.170385][ T2761] loop3: p2 size 2 extends beyond EOD, truncated [ 1637.177151][ T2761] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1637.215948][ T2761] loop3: detected capacity change from 0 to 1 09:12:40 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000009004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000220000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000100000bdef4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000c0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:40 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000025000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000001c000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1637.280120][ T2761] loop3: p1 < > p2 < > p4 [ 1637.284516][ T2761] loop3: partition table partially beyond EOD, truncated [ 1637.291585][ T2761] loop3: p1 start 335762607 is beyond EOD, truncated [ 1637.298277][ T2761] loop3: p2 size 2 extends beyond EOD, truncated [ 1637.304951][ T2761] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1637.313067][ T381] loop3: p1 < > p2 < > p4 [ 1637.317523][ T381] loop3: partition table partially beyond EOD, truncated 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000018def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1637.324618][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1637.331296][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1637.341500][ T2778] loop2: detected capacity change from 0 to 4 [ 1637.347975][ T2779] loop0: detected capacity change from 0 to 4 [ 1637.355593][ T2781] loop4: detected capacity change from 0 to 1 [ 1637.362792][ T2778] EXT4-fs (loop2): Invalid log block size: 2228224 [ 1637.367020][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000026def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000020000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000077def4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1637.376650][ T2779] EXT4-fs (loop0): Invalid log cluster size: 3072 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef01000100007edef4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef0100010000fedef4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1637.425230][ T2779] loop0: detected capacity change from 0 to 4 [ 1637.425254][ T2778] loop2: detected capacity change from 0 to 4 [ 1637.439749][ T2778] EXT4-fs (loop2): Invalid log block size: 2228224 [ 1637.447086][ T2779] EXT4-fs (loop0): Invalid log cluster size: 3072 [ 1637.451402][ T2781] loop4: detected capacity change from 0 to 1 [ 1637.468655][ T2793] loop3: detected capacity change from 0 to 1 [ 1637.500199][ T2793] loop3: p1 < > p2 < > p4 [ 1637.504629][ T2793] loop3: partition table partially beyond EOD, truncated [ 1637.511765][ T2793] loop3: p1 start 335762607 is beyond EOD, truncated [ 1637.518429][ T2793] loop3: p2 size 2 extends beyond EOD, truncated [ 1637.525427][ T2793] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1637.575748][ T2793] loop3: detected capacity change from 0 to 1 [ 1637.640109][ T381] loop3: p1 < > p2 < > p4 [ 1637.644514][ T381] loop3: partition table partially beyond EOD, truncated [ 1637.651692][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1637.658348][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1637.664994][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1637.672962][ T2793] loop3: p1 < > p2 < > p4 [ 1637.677366][ T2793] loop3: partition table partially beyond EOD, truncated 09:12:40 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000a004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000002e0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000022000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000d0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:40 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800003f000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4795f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1637.684484][ T2793] loop3: p1 start 335762607 is beyond EOD, truncated [ 1637.691152][ T2793] loop3: p2 size 2 extends beyond EOD, truncated [ 1637.697722][ T2793] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f020000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1637.730459][ T2804] loop0: detected capacity change from 0 to 4 [ 1637.734945][ T2807] loop2: detected capacity change from 0 to 4 [ 1637.743786][ T2803] loop4: detected capacity change from 0 to 1 [ 1637.750899][ T2807] EXT4-fs (loop2): Invalid log block size: 3014656 [ 1637.757571][ T2804] EXT4-fs (loop0): Invalid log cluster size: 3328 09:12:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000025000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f030000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1637.777796][ T2812] loop3: detected capacity change from 0 to 1 [ 1637.786575][ T2807] loop2: detected capacity change from 0 to 4 [ 1637.799208][ T2804] loop0: detected capacity change from 0 to 4 [ 1637.800447][ T2807] EXT4-fs (loop2): Invalid log block size: 3014656 [ 1637.811965][ T2812] loop3: p1 < > p2 < > p4 [ 1637.816460][ T2812] loop3: partition table partially beyond EOD, truncated [ 1637.823541][ T2812] loop3: p1 start 335762607 is beyond EOD, truncated 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f040000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000e0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000003f0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1637.823645][ T2804] EXT4-fs (loop0): Invalid log cluster size: 3328 [ 1637.836765][ T2812] loop3: p2 size 2 extends beyond EOD, truncated [ 1637.843668][ T2812] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1637.882060][ T2822] loop0: detected capacity change from 0 to 4 [ 1637.894237][ T2823] loop2: detected capacity change from 0 to 4 [ 1637.896134][ T2803] loop4: detected capacity change from 0 to 1 [ 1637.906615][ T2822] EXT4-fs (loop0): Invalid log cluster size: 3584 [ 1637.914155][ T2823] EXT4-fs (loop2): Invalid log block size: 4128768 [ 1637.924088][ T2812] loop3: detected capacity change from 0 to 1 [ 1637.950962][ T2823] loop2: detected capacity change from 0 to 4 [ 1637.951076][ T2822] loop0: detected capacity change from 0 to 4 [ 1637.963240][ T2823] EXT4-fs (loop2): Invalid log block size: 4128768 [ 1637.963419][ T2812] loop3: p1 < > p2 < > p4 [ 1637.973407][ T2822] EXT4-fs (loop0): Invalid log cluster size: 3584 [ 1637.974229][ T2812] loop3: partition table partially beyond EOD, truncated [ 1637.987800][ T2812] loop3: p1 start 335762607 is beyond EOD, truncated [ 1637.994485][ T2812] loop3: p2 size 2 extends beyond EOD, truncated [ 1638.001181][ T2812] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:40 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000b004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000026000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f050000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:40 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000040000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000400000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000000f0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f060000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1638.099689][ T2828] loop2: detected capacity change from 0 to 4 [ 1638.108470][ T2831] loop0: detected capacity change from 0 to 4 [ 1638.111037][ T2828] EXT4-fs (loop2): Invalid log block size: 4194304 [ 1638.121277][ T2831] EXT4-fs (loop0): Invalid log cluster size: 3840 [ 1638.142281][ T2833] loop4: detected capacity change from 0 to 1 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f070000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000002e000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1638.151810][ T2835] loop3: detected capacity change from 0 to 1 [ 1638.170342][ T2828] loop2: detected capacity change from 0 to 4 [ 1638.176760][ T2831] loop0: detected capacity change from 0 to 4 [ 1638.184190][ T2831] EXT4-fs (loop0): Invalid log cluster size: 3840 [ 1638.190052][ T2828] EXT4-fs (loop2): Invalid log block size: 4194304 [ 1638.197348][ T381] loop3: p1 < > p2 < > p4 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f080000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1638.201788][ T381] loop3: partition table partially beyond EOD, truncated [ 1638.208891][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1638.215581][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1638.222598][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1638.235958][ T2833] loop4: detected capacity change from 0 to 1 [ 1638.247114][ T2835] loop3: p1 < > p2 < > p4 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f0a0000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000800400000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1638.251572][ T2835] loop3: partition table partially beyond EOD, truncated [ 1638.258632][ T2835] loop3: p1 start 335762607 is beyond EOD, truncated [ 1638.265383][ T2835] loop3: p2 size 2 extends beyond EOD, truncated [ 1638.275002][ T2835] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1638.275632][ T2847] loop2: detected capacity change from 0 to 4 [ 1638.288861][ T2847] EXT4-fs (loop2): Invalid log block size: 4194312 [ 1638.325330][ T2835] loop3: detected capacity change from 0 to 1 [ 1638.340927][ T2847] loop2: detected capacity change from 0 to 4 [ 1638.347218][ T2847] EXT4-fs (loop2): Invalid log block size: 4194312 [ 1638.380073][ T2835] loop3: p1 < > p2 < > p4 [ 1638.384486][ T2835] loop3: partition table partially beyond EOD, truncated [ 1638.391670][ T2835] loop3: p1 start 335762607 is beyond EOD, truncated [ 1638.398334][ T2835] loop3: p2 size 2 extends beyond EOD, truncated [ 1638.405055][ T2835] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:41 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000c004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100ffffffffffffff0f0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f0b0000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000003f000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:41 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000048000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000480000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1638.460836][ T381] loop3: p1 < > p2 < > p4 [ 1638.465249][ T381] loop3: partition table partially beyond EOD, truncated [ 1638.472323][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1638.479021][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1638.479877][ T2851] loop4: detected capacity change from 0 to 1 [ 1638.497438][ T2854] loop0: detected capacity change from 0 to 4 [ 1638.503887][ T2856] loop2: detected capacity change from 0 to 4 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f180000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f260000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1638.504118][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1638.517694][ T2854] EXT4-fs (loop0): Invalid log block size: 4294967295 [ 1638.525017][ T2856] EXT4-fs (loop2): Invalid log block size: 4718592 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f770000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000040000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f7e0000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffe0000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1638.574361][ T2851] loop4: detected capacity change from 0 to 1 [ 1638.580808][ T2854] loop0: detected capacity change from 0 to 4 [ 1638.590193][ T2856] loop2: detected capacity change from 0 to 4 [ 1638.597976][ T2866] loop3: detected capacity change from 0 to 1 [ 1638.603214][ T2854] EXT4-fs (loop0): Invalid log block size: 4294967295 [ 1638.604329][ T2856] EXT4-fs (loop2): Invalid log block size: 4718592 [ 1638.666535][ T2866] loop3: p1 < > p2 < > p4 [ 1638.670993][ T2866] loop3: partition table partially beyond EOD, truncated [ 1638.678072][ T2866] loop3: p1 start 335762607 is beyond EOD, truncated [ 1638.684759][ T2866] loop3: p2 size 2 extends beyond EOD, truncated [ 1638.699818][ T2866] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1638.736733][ T2866] loop3: detected capacity change from 0 to 1 [ 1638.770168][ T381] loop3: p1 < > p2 < > p4 [ 1638.774692][ T381] loop3: partition table partially beyond EOD, truncated [ 1638.781802][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1638.788506][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1638.795235][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1638.803287][ T2866] loop3: p1 < > p2 < > p4 [ 1638.807692][ T2866] loop3: partition table partially beyond EOD, truncated [ 1638.814784][ T2866] loop3: p1 start 335762607 is beyond EOD, truncated [ 1638.821554][ T2866] loop3: p2 size 2 extends beyond EOD, truncated [ 1638.828166][ T2866] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:41 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000d004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:41 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800004c000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000100000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f040200000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000004c0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000080040000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1638.860758][ T381] loop3: p1 < > p2 < > p4 [ 1638.865169][ T381] loop3: partition table partially beyond EOD, truncated [ 1638.872429][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1638.879095][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1638.892740][ T2884] loop2: detected capacity change from 0 to 4 [ 1638.894386][ T2883] loop4: detected capacity change from 0 to 1 [ 1638.899771][ T2882] loop0: detected capacity change from 0 to 4 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000300000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f020400000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1638.908962][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1638.923028][ T2884] EXT4-fs (loop2): Invalid log block size: 4980736 [ 1638.932010][ T2882] EXT4-fs (loop0): Invalid log cluster size: 4096 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f060400000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000048000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1638.960807][ T2884] loop2: detected capacity change from 0 to 4 [ 1638.967232][ T2887] loop3: detected capacity change from 0 to 1 [ 1638.972322][ T2884] EXT4-fs (loop2): Invalid log block size: 4980736 [ 1638.986256][ T2882] loop0: detected capacity change from 0 to 4 [ 1638.995735][ T2882] EXT4-fs (loop0): Invalid log cluster size: 4096 [ 1638.997628][ T2883] loop4: detected capacity change from 0 to 1 09:12:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000500000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000600000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1639.020302][ T2887] loop3: p1 < > p2 < > p4 [ 1639.024736][ T2887] loop3: partition table partially beyond EOD, truncated [ 1639.031867][ T2887] loop3: p1 start 335762607 is beyond EOD, truncated [ 1639.038578][ T2887] loop3: p2 size 2 extends beyond EOD, truncated [ 1639.046180][ T2887] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1639.062388][ T2899] loop2: detected capacity change from 0 to 4 [ 1639.076674][ T2899] EXT4-fs (loop2): Invalid log block size: 6291456 [ 1639.103450][ T2887] loop3: detected capacity change from 0 to 1 [ 1639.120899][ T2899] loop2: detected capacity change from 0 to 4 [ 1639.127294][ T2899] EXT4-fs (loop2): Invalid log block size: 6291456 [ 1639.134903][ T381] loop3: p1 < > p2 < > p4 [ 1639.139333][ T381] loop3: partition table partially beyond EOD, truncated [ 1639.146409][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1639.153138][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1639.159843][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1639.167965][ T2887] loop3: p1 < > p2 < > p4 09:12:42 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000e004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:42 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000068000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000004100000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000600000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000004c000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000680000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1639.172402][ T2887] loop3: partition table partially beyond EOD, truncated [ 1639.179423][ T2887] loop3: p1 start 335762607 is beyond EOD, truncated [ 1639.186078][ T2887] loop3: p2 size 2 extends beyond EOD, truncated [ 1639.192805][ T2887] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f040600000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1639.222487][ T2907] loop0: detected capacity change from 0 to 4 [ 1639.226615][ T2908] loop4: detected capacity change from 0 to 1 [ 1639.236698][ T2907] EXT4-fs (loop0): Invalid log cluster size: 4100 [ 1639.245281][ T2910] loop2: detected capacity change from 0 to 4 [ 1639.252569][ T2910] EXT4-fs (loop2): Invalid log block size: 6815744 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000700000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000054000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1639.271179][ T2907] loop0: detected capacity change from 0 to 4 [ 1639.277953][ T2907] EXT4-fs (loop0): Invalid log cluster size: 4100 [ 1639.297076][ T2910] loop2: detected capacity change from 0 to 4 [ 1639.307086][ T2908] loop4: detected capacity change from 0 to 1 [ 1639.313492][ T2910] EXT4-fs (loop2): Invalid log block size: 6815744 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000a00000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000110000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1639.318063][ T2916] loop3: detected capacity change from 0 to 1 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000b00000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1639.353093][ T2922] loop0: detected capacity change from 0 to 4 [ 1639.360518][ T2916] loop3: p1 < > p2 < > p4 [ 1639.364956][ T2916] loop3: partition table partially beyond EOD, truncated [ 1639.372093][ T2916] loop3: p1 start 335762607 is beyond EOD, truncated [ 1639.378837][ T2916] loop3: p2 size 2 extends beyond EOD, truncated [ 1639.386021][ T2922] EXT4-fs (loop0): Invalid log cluster size: 4352 [ 1639.395583][ T2916] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1639.431686][ T2922] loop0: detected capacity change from 0 to 4 [ 1639.438132][ T2922] EXT4-fs (loop0): Invalid log cluster size: 4352 [ 1639.448189][ T2916] loop3: detected capacity change from 0 to 1 [ 1639.480206][ T2916] loop3: p1 < > p2 < > p4 [ 1639.484619][ T2916] loop3: partition table partially beyond EOD, truncated [ 1639.491688][ T2916] loop3: p1 start 335762607 is beyond EOD, truncated [ 1639.498355][ T2916] loop3: p2 size 2 extends beyond EOD, truncated [ 1639.505012][ T2916] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:42 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000000f004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000006c0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f001800000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000055000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:42 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800006c000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000120000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1639.563485][ T381] loop3: p1 < > p2 < > p4 [ 1639.567960][ T381] loop3: partition table partially beyond EOD, truncated [ 1639.575050][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1639.581784][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1639.588396][ T2928] loop2: detected capacity change from 0 to 4 [ 1639.602970][ T2933] loop4: detected capacity change from 0 to 1 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f002000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f002600000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1639.605302][ T2928] EXT4-fs (loop2): Invalid log block size: 7077888 [ 1639.609653][ T2935] loop0: detected capacity change from 0 to 4 [ 1639.622213][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1639.627438][ T2935] EXT4-fs (loop0): Invalid log cluster size: 4608 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f003f00000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1639.662255][ T2935] loop0: detected capacity change from 0 to 4 [ 1639.668676][ T2935] EXT4-fs (loop0): Invalid log cluster size: 4608 [ 1639.682853][ T2928] loop2: detected capacity change from 0 to 4 [ 1639.695417][ T2928] EXT4-fs (loop2): Invalid log block size: 7077888 [ 1639.699644][ T2933] loop4: detected capacity change from 0 to 1 09:12:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000060000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000140000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f004000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1639.706006][ T2942] loop3: detected capacity change from 0 to 1 [ 1639.744850][ T2948] loop0: detected capacity change from 0 to 4 [ 1639.751928][ T2948] EXT4-fs (loop0): Invalid log cluster size: 5120 [ 1639.774623][ T381] loop3: p1 < > p2 < > p4 [ 1639.779043][ T381] loop3: partition table partially beyond EOD, truncated [ 1639.786169][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1639.792852][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1639.799680][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1639.805280][ T2948] loop0: detected capacity change from 0 to 4 [ 1639.813324][ T2948] EXT4-fs (loop0): Invalid log cluster size: 5120 [ 1639.820086][ T381] loop3: p1 < > p2 < > p4 [ 1639.824503][ T381] loop3: partition table partially beyond EOD, truncated [ 1639.831679][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1639.838339][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1639.845174][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1639.853275][ T2942] loop3: p1 < > p2 < > p4 [ 1639.857687][ T2942] loop3: partition table partially beyond EOD, truncated [ 1639.864845][ T2942] loop3: p1 start 335762607 is beyond EOD, truncated [ 1639.871527][ T2942] loop3: p2 size 2 extends beyond EOD, truncated [ 1639.878238][ T2942] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1639.923979][ T2942] loop3: detected capacity change from 0 to 1 [ 1639.960067][ T381] loop3: p1 < > p2 < > p4 [ 1639.964479][ T381] loop3: partition table partially beyond EOD, truncated [ 1639.971806][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1639.978504][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1639.985149][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1639.993232][ T2942] loop3: p1 < > p2 < > p4 [ 1639.997640][ T2942] loop3: partition table partially beyond EOD, truncated [ 1640.004734][ T2942] loop3: p1 start 335762607 is beyond EOD, truncated [ 1640.011419][ T2942] loop3: p2 size 2 extends beyond EOD, truncated 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f007700000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000002700000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:42 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000074000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000063000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:42 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000010004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000200000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1640.018013][ T2942] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1640.041372][ T2954] loop0: detected capacity change from 0 to 4 [ 1640.051338][ T2959] loop2: detected capacity change from 0 to 4 [ 1640.061516][ T2954] EXT4-fs (loop0): Invalid log cluster size: 8192 [ 1640.061860][ T2957] loop4: detected capacity change from 0 to 1 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f007e00000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffffe00000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1640.074544][ T2959] EXT4-fs (loop2): Invalid log block size: 7340544 [ 1640.098392][ T2965] loop3: detected capacity change from 0 to 1 09:12:42 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000068000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffeff00000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1640.132102][ T2959] loop2: detected capacity change from 0 to 4 [ 1640.140529][ T2959] EXT4-fs (loop2): Invalid log block size: 7340544 [ 1640.140696][ T2965] loop3: p1 < > p2 < > p4 [ 1640.151482][ T2965] loop3: partition table partially beyond EOD, truncated [ 1640.158579][ T2965] loop3: p1 start 335762607 is beyond EOD, truncated [ 1640.165267][ T2965] loop3: p2 size 2 extends beyond EOD, truncated [ 1640.172193][ T2954] loop0: detected capacity change from 0 to 4 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000004000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000740000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000006c000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1640.172238][ T2965] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1640.179683][ T2954] EXT4-fs (loop0): Invalid log cluster size: 8192 [ 1640.213052][ T2957] loop4: detected capacity change from 0 to 1 [ 1640.224602][ T2965] loop3: detected capacity change from 0 to 1 09:12:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000010200000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1640.251850][ T2977] loop2: detected capacity change from 0 to 4 [ 1640.260975][ T2977] EXT4-fs (loop2): Invalid log block size: 7602176 [ 1640.261290][ T2965] loop3: p1 < > p2 < > p4 [ 1640.271985][ T2965] loop3: partition table partially beyond EOD, truncated [ 1640.279136][ T2965] loop3: p1 start 335762607 is beyond EOD, truncated [ 1640.285819][ T2965] loop3: p2 size 2 extends beyond EOD, truncated [ 1640.292688][ T2965] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:43 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800007a000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000008000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1640.294499][ T2981] loop0: detected capacity change from 0 to 4 [ 1640.306692][ T2981] EXT4-fs (loop0): Invalid log cluster size: 8208 [ 1640.321735][ T2977] loop2: detected capacity change from 0 to 4 [ 1640.328332][ T2977] EXT4-fs (loop2): Invalid log block size: 7602176 09:12:43 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000011004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f400008000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000074000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000020000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000007a0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1640.355919][ T2981] loop0: detected capacity change from 0 to 4 [ 1640.363883][ T2981] EXT4-fs (loop0): Invalid log cluster size: 8208 [ 1640.388363][ T2990] loop4: detected capacity change from 0 to 1 09:12:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000220000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1640.404701][ T2994] loop2: detected capacity change from 0 to 4 [ 1640.422320][ T2995] loop3: detected capacity change from 0 to 1 [ 1640.426202][ T2994] EXT4-fs (loop2): Invalid log block size: 7995392 [ 1640.443875][ T2999] loop0: detected capacity change from 0 to 4 09:12:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000007a000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000010000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000020000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1640.451290][ T2999] EXT4-fs (loop0): Invalid log cluster size: 8704 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000004020000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1640.491316][ T2995] loop3: p1 < > p2 < > p4 [ 1640.495742][ T2995] loop3: partition table partially beyond EOD, truncated [ 1640.502904][ T2995] loop3: p1 start 335762607 is beyond EOD, truncated [ 1640.509624][ T2995] loop3: p2 size 2 extends beyond EOD, truncated [ 1640.515851][ T2999] loop0: detected capacity change from 0 to 4 [ 1640.518276][ T2994] loop2: detected capacity change from 0 to 4 [ 1640.522245][ T2990] loop4: detected capacity change from 0 to 1 [ 1640.530417][ T2994] EXT4-fs (loop2): Invalid log block size: 7995392 [ 1640.541208][ T2999] EXT4-fs (loop0): Invalid log cluster size: 8704 [ 1640.545413][ T2995] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1640.562823][ T381] loop3: p1 < > p2 < > p4 [ 1640.567260][ T381] loop3: partition table partially beyond EOD, truncated [ 1640.574326][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1640.580993][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:43 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800017c000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000000000017c000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1640.587646][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:43 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000012004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000030000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000017c0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000002e0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffff80000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1640.641220][ T2995] loop3: detected capacity change from 0 to 1 [ 1640.672283][ T3013] loop4: detected capacity change from 0 to 1 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000040000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000050000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1640.694044][ T3016] loop0: detected capacity change from 0 to 4 [ 1640.702246][ T3020] loop2: detected capacity change from 0 to 4 [ 1640.712075][ T3016] EXT4-fs (loop0): Invalid log cluster size: 11776 [ 1640.721113][ T3020] EXT4-fs (loop2): Invalid log block size: 8126720 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000060000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffff81000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1640.768730][ T3028] loop3: detected capacity change from 0 to 1 [ 1640.781080][ T3020] loop2: detected capacity change from 0 to 4 [ 1640.791152][ T3013] loop4: detected capacity change from 0 to 1 [ 1640.797633][ T3016] loop0: detected capacity change from 0 to 4 [ 1640.798072][ T3020] EXT4-fs (loop2): Invalid log block size: 8126720 [ 1640.804602][ T3016] EXT4-fs (loop0): Invalid log cluster size: 11776 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000004060000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1640.820125][ T381] loop3: p1 < > p2 < > p4 [ 1640.824549][ T381] loop3: partition table partially beyond EOD, truncated [ 1640.831684][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1640.838447][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1640.845382][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1640.856584][ T3028] loop3: p1 < > p2 < > p4 [ 1640.861023][ T3028] loop3: partition table partially beyond EOD, truncated 09:12:43 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000090000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000ffffff850000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1640.868209][ T3028] loop3: p1 start 335762607 is beyond EOD, truncated [ 1640.874892][ T3028] loop3: p2 size 2 extends beyond EOD, truncated [ 1640.881653][ T3028] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1640.926394][ T3028] loop3: detected capacity change from 0 to 1 [ 1640.926915][ T3037] loop2: detected capacity change from 0 to 4 [ 1640.939214][ T3037] EXT4-fs (loop2): Invalid log block size: 8781823 [ 1640.950259][ T3028] loop3: p1 < > p2 < > p4 [ 1640.954725][ T3028] loop3: partition table partially beyond EOD, truncated [ 1640.961898][ T3028] loop3: p1 start 335762607 is beyond EOD, truncated [ 1640.968546][ T3028] loop3: p2 size 2 extends beyond EOD, truncated 09:12:43 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000014004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000070000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000003f0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffff82000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1640.975341][ T3028] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1640.978244][ T3037] loop2: detected capacity change from 0 to 4 [ 1640.988702][ T3037] EXT4-fs (loop2): Invalid log block size: 8781823 [ 1641.004913][ T3039] loop4: detected capacity change from 0 to 1 09:12:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000ffffff8c0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000080000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1641.053416][ T3045] loop0: detected capacity change from 0 to 4 [ 1641.060687][ T3045] EXT4-fs (loop0): Invalid log cluster size: 16128 [ 1641.073274][ T3047] loop2: detected capacity change from 0 to 4 [ 1641.087498][ T3047] EXT4-fs (loop2): Invalid log block size: 9240575 [ 1641.094610][ T3052] loop3: detected capacity change from 0 to 1 09:12:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffff85000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f0000000a0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1641.104391][ T3045] loop0: detected capacity change from 0 to 4 [ 1641.111060][ T3039] loop4: detected capacity change from 0 to 1 [ 1641.117352][ T3045] EXT4-fs (loop0): Invalid log cluster size: 16128 [ 1641.134708][ T3047] loop2: detected capacity change from 0 to 4 [ 1641.140906][ T3052] loop3: p1 < > p2 < > p4 [ 1641.145336][ T3052] loop3: partition table partially beyond EOD, truncated 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f0000000b0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000400000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:44 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680001a2000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000180000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1641.148047][ T3047] EXT4-fs (loop2): Invalid log block size: 9240575 [ 1641.152536][ T3052] loop3: p1 start 335762607 is beyond EOD, truncated [ 1641.165582][ T3052] loop3: p2 size 2 extends beyond EOD, truncated [ 1641.176770][ T3052] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1641.193882][ T3061] loop0: detected capacity change from 0 to 4 [ 1641.210726][ T3061] EXT4-fs (loop0): Invalid log cluster size: 16384 [ 1641.232322][ T3052] loop3: detected capacity change from 0 to 1 [ 1641.250870][ T3061] loop0: detected capacity change from 0 to 4 [ 1641.257162][ T3061] EXT4-fs (loop0): Invalid log cluster size: 16384 [ 1641.270185][ T381] loop3: p1 < > p2 < > p4 [ 1641.271507][ T3065] loop4: detected capacity change from 0 to 1 [ 1641.274724][ T381] loop3: partition table partially beyond EOD, truncated [ 1641.287812][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1641.294523][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1641.301208][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:44 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000001c004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000018f0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000089000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000260000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000800400000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1641.309138][ T3052] loop3: p1 < > p2 < > p4 [ 1641.313557][ T3052] loop3: partition table partially beyond EOD, truncated [ 1641.320660][ T3052] loop3: p1 start 335762607 is beyond EOD, truncated [ 1641.327406][ T3052] loop3: p2 size 2 extends beyond EOD, truncated [ 1641.334114][ T3052] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1641.354172][ T3065] loop4: detected capacity change from 0 to 1 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f0000003f0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1641.371913][ T3071] loop2: detected capacity change from 0 to 4 [ 1641.379089][ T3071] EXT4-fs (loop2): Invalid log block size: 9371904 [ 1641.383635][ T3073] loop0: detected capacity change from 0 to 4 [ 1641.397393][ T3073] EXT4-fs (loop0): Invalid log block size: 134217728 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000400000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffff8c000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1641.423933][ T3071] loop2: detected capacity change from 0 to 4 [ 1641.434117][ T3078] loop3: detected capacity change from 0 to 1 [ 1641.441134][ T3073] loop0: detected capacity change from 0 to 4 [ 1641.447580][ T3073] EXT4-fs (loop0): Invalid log block size: 134217728 [ 1641.454784][ T3071] EXT4-fs (loop2): Invalid log block size: 9371904 [ 1641.461563][ T3078] loop3: p1 < > p2 < > p4 [ 1641.465972][ T3078] loop3: partition table partially beyond EOD, truncated 09:12:44 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800fffe000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000800400000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000001a20000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000480000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1641.473169][ T3078] loop3: p1 start 335762607 is beyond EOD, truncated [ 1641.479847][ T3078] loop3: p2 size 2 extends beyond EOD, truncated [ 1641.491640][ T3078] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1641.528294][ T3085] loop4: detected capacity change from 0 to 1 [ 1641.538130][ T3088] loop0: detected capacity change from 0 to 4 [ 1641.544101][ T3090] loop2: detected capacity change from 0 to 4 [ 1641.550941][ T3090] EXT4-fs (loop2): Invalid log block size: 10617088 [ 1641.558320][ T3088] EXT4-fs (loop0): Invalid log cluster size: 18432 [ 1641.564485][ T3078] loop3: detected capacity change from 0 to 1 [ 1641.591445][ T3078] loop3: p1 < > p2 < > p4 [ 1641.595872][ T3078] loop3: partition table partially beyond EOD, truncated [ 1641.596478][ T3090] loop2: detected capacity change from 0 to 4 [ 1641.603033][ T3078] loop3: p1 start 335762607 is beyond EOD, truncated [ 1641.609255][ T3088] loop0: detected capacity change from 0 to 4 [ 1641.615624][ T3078] loop3: p2 size 2 extends beyond EOD, truncated [ 1641.616327][ T3090] EXT4-fs (loop2): Invalid log block size: 10617088 [ 1641.629743][ T3088] EXT4-fs (loop0): Invalid log cluster size: 18432 [ 1641.634895][ T3078] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1641.653191][ T3085] loop4: detected capacity change from 0 to 1 09:12:44 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000022004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000a0000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000770000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000edc00000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000004c0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1641.683258][ T381] loop3: p1 < > p2 < > p4 [ 1641.687676][ T381] loop3: partition table partially beyond EOD, truncated [ 1641.694831][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1641.701595][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1641.715877][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1641.723452][ T3097] loop0: detected capacity change from 0 to 4 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f0000007e0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:44 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000fff000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655fffffff850000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1641.723510][ T3098] loop2: detected capacity change from 0 to 4 [ 1641.736779][ T3098] EXT4-fs (loop2): Invalid log block size: 12643584 [ 1641.746854][ T3097] EXT4-fs (loop0): Invalid log cluster size: 19456 [ 1641.765382][ T3102] loop4: detected capacity change from 0 to 1 09:12:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffffa1000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffffffff60000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffffffdfc0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1641.791049][ T3097] loop0: detected capacity change from 0 to 4 [ 1641.797873][ T3097] EXT4-fs (loop0): Invalid log cluster size: 19456 [ 1641.809621][ T3098] loop2: detected capacity change from 0 to 4 [ 1641.813298][ T3107] loop3: detected capacity change from 0 to 1 [ 1641.816241][ T3098] EXT4-fs (loop2): Invalid log block size: 12643584 09:12:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000001a2000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1641.881084][ T3107] loop3: p1 < > p2 < > p4 [ 1641.885518][ T3107] loop3: partition table partially beyond EOD, truncated [ 1641.892666][ T3107] loop3: p1 start 335762607 is beyond EOD, truncated [ 1641.899341][ T3107] loop3: p2 size 2 extends beyond EOD, truncated [ 1641.925838][ T3107] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1641.934076][ T381] loop3: p1 < > p2 < > p4 [ 1641.938486][ T381] loop3: partition table partially beyond EOD, truncated [ 1641.945586][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1641.952267][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1641.958877][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:44 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000025004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000600000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffffffdfd0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000ffffffda0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:44 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800feff000080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffffa5000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffffffffe0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffcfdffff0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1642.050656][ T3127] loop2: detected capacity change from 0 to 4 [ 1642.051511][ T3121] loop0: detected capacity change from 0 to 4 [ 1642.058057][ T3125] loop4: detected capacity change from 0 to 1 [ 1642.071107][ T3127] EXT4-fs (loop2): Invalid log block size: 14352383 [ 1642.078609][ T3121] EXT4-fs (loop0): Invalid log cluster size: 24576 [ 1642.078666][ T3129] loop3: detected capacity change from 0 to 1 09:12:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffffa6000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffdfdffff0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1642.130376][ T381] loop3: p1 < > p2 < > p4 [ 1642.134821][ T381] loop3: partition table partially beyond EOD, truncated [ 1642.141921][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1642.148581][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1642.155538][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1642.163019][ T3127] loop2: detected capacity change from 0 to 4 [ 1642.170698][ T3129] loop3: p1 < > p2 < > p4 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f85ffffff0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1642.170787][ T3127] EXT4-fs (loop2): Invalid log block size: 14352383 [ 1642.175117][ T3129] loop3: partition table partially beyond EOD, truncated [ 1642.188794][ T3129] loop3: p1 start 335762607 is beyond EOD, truncated [ 1642.192492][ T3121] loop0: detected capacity change from 0 to 4 [ 1642.195465][ T3129] loop3: p2 size 2 extends beyond EOD, truncated [ 1642.204586][ T3121] EXT4-fs (loop0): Invalid log cluster size: 24576 [ 1642.214806][ T3129] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ff6ffffff0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1642.227777][ T3125] loop4: detected capacity change from 0 to 1 [ 1642.272078][ T3129] loop3: detected capacity change from 0 to 1 [ 1642.340139][ T3129] loop3: p1 < > p2 < > p4 [ 1642.344587][ T3129] loop3: partition table partially beyond EOD, truncated [ 1642.351660][ T3129] loop3: p1 start 335762607 is beyond EOD, truncated [ 1642.358324][ T3129] loop3: p2 size 2 extends beyond EOD, truncated [ 1642.365543][ T3129] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:45 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000026004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffffa9000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000001ed0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffeffffff0000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000680000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:45 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000080080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1642.430745][ T381] loop3: p1 < > p2 < > p4 [ 1642.435219][ T381] loop3: partition table partially beyond EOD, truncated [ 1642.442329][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1642.449022][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1642.462538][ T3148] loop4: detected capacity change from 0 to 1 [ 1642.465529][ T3150] loop0: detected capacity change from 0 to 4 [ 1642.473239][ T3153] loop2: detected capacity change from 0 to 4 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f037dc1250200000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1642.481848][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1642.481829][ T3153] EXT4-fs (loop2): Invalid log block size: 15532288 [ 1642.488942][ T3150] EXT4-fs (loop0): Invalid log cluster size: 26624 09:12:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000001aa000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000001000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000004000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1642.532424][ T3153] loop2: detected capacity change from 0 to 4 [ 1642.541333][ T3153] EXT4-fs (loop2): Invalid log block size: 15532288 [ 1642.554976][ T3156] loop3: detected capacity change from 0 to 1 [ 1642.555573][ T3150] loop0: detected capacity change from 0 to 4 [ 1642.563390][ T3148] loop4: detected capacity change from 0 to 1 [ 1642.571714][ T3150] EXT4-fs (loop0): Invalid log cluster size: 26624 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000008000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000fffffff60000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1642.600163][ T3156] loop3: p1 < > p2 < > p4 [ 1642.604595][ T3156] loop3: partition table partially beyond EOD, truncated [ 1642.611680][ T3156] loop3: p1 start 335762607 is beyond EOD, truncated [ 1642.618374][ T3156] loop3: p2 size 2 extends beyond EOD, truncated [ 1642.625249][ T3156] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1642.625289][ T3169] loop2: detected capacity change from 0 to 4 [ 1642.659126][ T3169] EXT4-fs (loop2): Invalid log block size: 16187391 [ 1642.673003][ T3156] loop3: detected capacity change from 0 to 1 [ 1642.701079][ T3169] loop2: detected capacity change from 0 to 4 [ 1642.701092][ T3156] loop3: p1 < > p2 < > p4 [ 1642.707544][ T3169] EXT4-fs (loop2): Invalid log block size: 16187391 [ 1642.711553][ T3156] loop3: partition table partially beyond EOD, truncated [ 1642.711606][ T3156] loop3: p1 start 335762607 is beyond EOD, truncated [ 1642.731810][ T3156] loop3: p2 size 2 extends beyond EOD, truncated [ 1642.738404][ T3156] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:45 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000002e004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffffbf000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000010001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:45 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068004000080080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000006c0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000fffffdf90000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1642.772054][ T381] loop3: p1 < > p2 < > p4 [ 1642.776525][ T381] loop3: partition table partially beyond EOD, truncated [ 1642.783663][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1642.790357][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1642.805764][ T3178] loop0: detected capacity change from 0 to 4 [ 1642.807613][ T3179] loop4: detected capacity change from 0 to 1 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655fffffffffffff070001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000200001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1642.818672][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1642.823576][ T3178] EXT4-fs (loop0): Invalid log cluster size: 27648 [ 1642.825973][ T3181] loop2: detected capacity change from 0 to 4 [ 1642.839225][ T3181] EXT4-fs (loop2): Invalid log block size: 16383487 09:12:45 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffffc9000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000101000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000201000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1642.875959][ T3178] loop0: detected capacity change from 0 to 4 [ 1642.884166][ T3178] EXT4-fs (loop0): Invalid log cluster size: 27648 [ 1642.899314][ T3179] loop4: detected capacity change from 0 to 1 [ 1642.906298][ T3181] loop2: detected capacity change from 0 to 4 [ 1642.913035][ T3181] EXT4-fs (loop2): Invalid log block size: 16383487 09:12:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000016f0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1642.932282][ T3192] loop3: detected capacity change from 0 to 1 [ 1642.955365][ T3192] loop3: p1 < > p2 < > p4 [ 1642.959782][ T3192] loop3: partition table partially beyond EOD, truncated [ 1642.966862][ T3192] loop3: p1 start 335762607 is beyond EOD, truncated [ 1642.973621][ T3192] loop3: p2 size 2 extends beyond EOD, truncated [ 1642.975248][ T3197] loop0: detected capacity change from 0 to 4 [ 1642.997763][ T3192] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1643.000592][ T3197] EXT4-fs (loop0): Invalid log cluster size: 28417 [ 1643.012445][ T381] loop3: p1 < > p2 < > p4 [ 1643.016861][ T381] loop3: partition table partially beyond EOD, truncated [ 1643.023904][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1643.030609][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1643.037221][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1643.047247][ T3197] loop0: detected capacity change from 0 to 4 [ 1643.053827][ T3197] EXT4-fs (loop0): Invalid log cluster size: 28417 [ 1643.135127][ T3192] loop3: detected capacity change from 0 to 1 [ 1643.200186][ T381] loop3: p1 < > p2 < > p4 [ 1643.204588][ T381] loop3: partition table partially beyond EOD, truncated [ 1643.211781][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1643.218441][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1643.225078][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1643.232968][ T3192] loop3: p1 < > p2 < > p4 [ 1643.237367][ T3192] loop3: partition table partially beyond EOD, truncated [ 1643.244479][ T3192] loop3: p1 start 335762607 is beyond EOD, truncated [ 1643.251170][ T3192] loop3: p2 size 2 extends beyond EOD, truncated [ 1643.257817][ T3192] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:46 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000048004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:46 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000900080000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000fffffdfd0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000040201000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffffe4000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000001700000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1643.300737][ T381] loop3: p1 < > p2 < > p4 [ 1643.305158][ T381] loop3: partition table partially beyond EOD, truncated [ 1643.312334][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1643.318997][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1643.331375][ T3204] loop2: detected capacity change from 0 to 4 [ 1643.332682][ T3205] loop0: detected capacity change from 0 to 4 [ 1643.341987][ T3206] loop4: detected capacity change from 0 to 1 09:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000301000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f0000000225c17d0301000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1643.346259][ T3205] EXT4-fs (loop0): Invalid log cluster size: 28673 [ 1643.356688][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1643.357515][ T3204] EXT4-fs (loop2): Invalid log block size: 16645631 09:12:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000001e6000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000401000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000501000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1643.412264][ T3205] loop0: detected capacity change from 0 to 4 [ 1643.418673][ T3205] EXT4-fs (loop0): Invalid log cluster size: 28673 [ 1643.433535][ T3206] loop4: detected capacity change from 0 to 1 [ 1643.440210][ T3204] loop2: detected capacity change from 0 to 4 [ 1643.448970][ T3204] EXT4-fs (loop2): Invalid log block size: 16645631 09:12:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000011ea000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1643.472595][ T3219] loop3: detected capacity change from 0 to 1 [ 1643.504621][ T3219] loop3: p1 < > p2 < > p4 [ 1643.509038][ T3219] loop3: partition table partially beyond EOD, truncated [ 1643.516194][ T3219] loop3: p1 start 335762607 is beyond EOD, truncated [ 1643.522881][ T3219] loop3: p2 size 2 extends beyond EOD, truncated [ 1643.537183][ T3219] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1643.545456][ T381] loop3: p1 < > p2 < > p4 [ 1643.549869][ T381] loop3: partition table partially beyond EOD, truncated [ 1643.556977][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1643.563642][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1643.570348][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1643.601689][ T3219] loop3: detected capacity change from 0 to 1 [ 1643.650124][ T381] loop3: p1 < > p2 < > p4 [ 1643.654531][ T381] loop3: partition table partially beyond EOD, truncated [ 1643.661644][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1643.668302][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1643.675066][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1643.682980][ T3219] loop3: p1 < > p2 < > p4 [ 1643.687383][ T3219] loop3: partition table partially beyond EOD, truncated [ 1643.694490][ T3219] loop3: p1 start 335762607 is beyond EOD, truncated [ 1643.701150][ T3219] loop3: p2 size 2 extends beyond EOD, truncated [ 1643.707729][ T3219] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:46 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000004c004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000601000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000fffffffe0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000001710000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:46 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000180000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000000000ec000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1643.740754][ T381] loop3: p1 < > p2 < > p4 [ 1643.745182][ T381] loop3: partition table partially beyond EOD, truncated [ 1643.752358][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1643.759106][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1643.773251][ T3232] loop4: detected capacity change from 0 to 1 [ 1643.780123][ T3230] loop2: detected capacity change from 0 to 4 09:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000040601000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000701000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000801000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1643.787193][ T3233] loop0: detected capacity change from 0 to 4 [ 1643.789166][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1643.796878][ T3233] EXT4-fs (loop0): Invalid log cluster size: 28929 [ 1643.807111][ T3230] EXT4-fs (loop2): Invalid log block size: 16711679 09:12:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffffee000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1643.855409][ T3238] loop3: detected capacity change from 0 to 1 [ 1643.870139][ T3233] ================================================================== [ 1643.878207][ T3233] BUG: KCSAN: data-race in __lru_add_drain_all / __pagevec_lru_add [ 1643.886079][ T3233] [ 1643.888385][ T3233] write to 0xffff888237c266a8 of 1 bytes by task 3245 on cpu 0: [ 1643.895989][ T3233] __pagevec_lru_add+0x243/0x270 [ 1643.900914][ T3233] folio_add_lru+0x11a/0x160 [ 1643.905480][ T3233] lru_cache_add+0x37/0x50 [ 1643.909880][ T3233] lru_cache_add_inactive_or_unevictable+0x46/0x140 [ 1643.916454][ T3233] wp_page_copy+0x8cf/0x11e0 [ 1643.921026][ T3233] do_wp_page+0x4fb/0xa80 [ 1643.925334][ T3233] handle_mm_fault+0x975/0x1590 [ 1643.930168][ T3233] do_user_addr_fault+0x609/0xbe0 [ 1643.935182][ T3233] exc_page_fault+0x91/0x290 [ 1643.939751][ T3233] asm_exc_page_fault+0x1e/0x30 [ 1643.944587][ T3233] [ 1643.946889][ T3233] read to 0xffff888237c266a8 of 1 bytes by task 3233 on cpu 1: [ 1643.954406][ T3233] __lru_add_drain_all+0x12c/0x3e0 [ 1643.959497][ T3233] lru_add_drain_all+0xc/0x10 [ 1643.964162][ T3233] invalidate_bdev+0x56/0x80 [ 1643.968730][ T3233] invalidate_disk+0x25/0xb0 [ 1643.973302][ T3233] __loop_clr_fd+0x41f/0x6c0 [ 1643.977875][ T3233] lo_ioctl+0x985/0x1270 [ 1643.982097][ T3233] blkdev_ioctl+0x20e/0x440 [ 1643.986580][ T3233] __se_sys_ioctl+0xcb/0x140 [ 1643.991152][ T3233] __x64_sys_ioctl+0x3f/0x50 [ 1643.995721][ T3233] do_syscall_64+0x44/0xa0 [ 1644.000117][ T3233] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1644.005998][ T3233] [ 1644.008301][ T3233] value changed: 0x0f -> 0x00 [ 1644.012950][ T3233] [ 1644.015248][ T3233] Reported by Kernel Concurrency Sanitizer on: [ 1644.021380][ T3233] CPU: 1 PID: 3233 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0 [ 1644.029681][ T3233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1644.039712][ T3233] ================================================================== 09:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000a01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1644.052648][ T3232] loop4: detected capacity change from 0 to 1 [ 1644.060496][ T3230] loop2: detected capacity change from 0 to 4 [ 1644.067713][ T3233] loop0: detected capacity change from 0 to 4 [ 1644.074353][ T3230] EXT4-fs (loop2): Invalid log block size: 16711679 [ 1644.081576][ T381] loop3: p1 < > p2 < > p4 [ 1644.086003][ T381] loop3: partition table partially beyond EOD, truncated [ 1644.093092][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1644.094752][ T3233] EXT4-fs (loop0): Invalid log cluster size: 28929 09:12:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000000b01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1644.099791][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1644.113514][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1644.121805][ T3238] loop3: p1 < > p2 < > p4 [ 1644.126258][ T3238] loop3: partition table partially beyond EOD, truncated [ 1644.133379][ T3238] loop3: p1 start 335762607 is beyond EOD, truncated [ 1644.140064][ T3238] loop3: p2 size 2 extends beyond EOD, truncated [ 1644.146953][ T3238] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1644.191565][ T3238] loop3: detected capacity change from 0 to 1 [ 1644.240099][ T381] loop3: p1 < > p2 < > p4 [ 1644.244504][ T381] loop3: partition table partially beyond EOD, truncated [ 1644.251704][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1644.258418][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1644.265204][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1644.273099][ T3238] loop3: p1 < > p2 < > p4 [ 1644.277494][ T3238] loop3: partition table partially beyond EOD, truncated 09:12:47 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000054004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000001801000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000fffffff6000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000fff0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:47 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000280000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000740000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1644.284526][ T3238] loop3: p1 start 335762607 is beyond EOD, truncated [ 1644.291185][ T3238] loop3: p2 size 2 extends beyond EOD, truncated [ 1644.297786][ T3238] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1644.324318][ T3256] loop2: detected capacity change from 0 to 4 [ 1644.333768][ T3260] loop0: detected capacity change from 0 to 4 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000002601000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000003f01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1644.335030][ T3259] loop4: detected capacity change from 0 to 1 [ 1644.348589][ T3256] EXT4-fs (loop2): Invalid log block size: 16715520 [ 1644.356081][ T3260] EXT4-fs (loop0): Invalid log cluster size: 29696 [ 1644.378272][ T3266] loop3: detected capacity change from 0 to 1 09:12:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000fffffffb000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1644.391052][ T3256] loop2: detected capacity change from 0 to 4 [ 1644.398021][ T3256] EXT4-fs (loop2): Invalid log block size: 16715520 [ 1644.407139][ T3260] loop0: detected capacity change from 0 to 4 [ 1644.413461][ T3266] loop3: p1 < > p2 < > p4 [ 1644.416745][ T3260] EXT4-fs (loop0): Invalid log cluster size: 29696 [ 1644.417885][ T3266] loop3: partition table partially beyond EOD, truncated [ 1644.431482][ T3266] loop3: p1 start 335762607 is beyond EOD, truncated 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000004001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1644.438159][ T3266] loop3: p2 size 2 extends beyond EOD, truncated [ 1644.444780][ T3259] loop4: detected capacity change from 0 to 1 [ 1644.445626][ T3266] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1644.459345][ T381] loop3: p1 < > p2 < > p4 [ 1644.463797][ T381] loop3: partition table partially beyond EOD, truncated [ 1644.470964][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1644.477630][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000008004001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000fffffbff0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1644.487078][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1644.529715][ T3276] loop2: detected capacity change from 0 to 4 [ 1644.536123][ T3266] loop3: detected capacity change from 0 to 1 [ 1644.542396][ T3276] EXT4-fs (loop2): Invalid log block size: 16776191 [ 1644.580174][ T3266] loop3: p1 < > p2 < > p4 [ 1644.584597][ T3266] loop3: partition table partially beyond EOD, truncated [ 1644.590606][ T3276] loop2: detected capacity change from 0 to 4 [ 1644.591719][ T3266] loop3: p1 start 335762607 is beyond EOD, truncated [ 1644.598213][ T3276] EXT4-fs (loop2): Invalid log block size: 16776191 [ 1644.604330][ T3266] loop3: p2 size 2 extends beyond EOD, truncated [ 1644.604860][ T3266] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:47 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000055004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000007a0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000fffffdfd000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000007701000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:47 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000040280000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000fffbffff0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1644.673074][ T381] loop3: p1 < > p2 < > p4 [ 1644.677491][ T381] loop3: partition table partially beyond EOD, truncated [ 1644.684591][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1644.691265][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1644.697062][ T3281] loop0: detected capacity change from 0 to 4 [ 1644.707845][ T3283] loop4: detected capacity change from 0 to 1 [ 1644.714075][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000000007e01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00000000ffffff8501000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1644.714502][ T3280] loop2: detected capacity change from 0 to 4 [ 1644.728011][ T3281] EXT4-fs (loop0): Invalid log cluster size: 31232 [ 1644.727938][ T3280] EXT4-fs (loop2): Invalid log block size: 16777211 09:12:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000fffffffd000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00000000fffffff601000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00000000fffffdfc01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00000000fffffdfd01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1644.770674][ T3280] loop2: detected capacity change from 0 to 4 [ 1644.784837][ T3280] EXT4-fs (loop2): Invalid log block size: 16777211 [ 1644.793783][ T3281] loop0: detected capacity change from 0 to 4 [ 1644.800479][ T3281] EXT4-fs (loop0): Invalid log cluster size: 31232 [ 1644.849824][ T3283] loop4: detected capacity change from 0 to 1 [ 1644.851895][ T3302] loop3: detected capacity change from 0 to 1 [ 1644.900028][ T3302] loop3: p1 < > p2 < > p4 [ 1644.904454][ T3302] loop3: partition table partially beyond EOD, truncated [ 1644.911527][ T3302] loop3: p1 start 335762607 is beyond EOD, truncated [ 1644.918252][ T3302] loop3: p2 size 2 extends beyond EOD, truncated [ 1644.925047][ T3302] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1644.995983][ T3302] loop3: detected capacity change from 0 to 1 [ 1645.060088][ T381] loop3: p1 < > p2 < > p4 [ 1645.064486][ T381] loop3: partition table partially beyond EOD, truncated [ 1645.071565][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1645.078303][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1645.085033][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1645.093102][ T3302] loop3: p1 < > p2 < > p4 [ 1645.097502][ T3302] loop3: partition table partially beyond EOD, truncated 09:12:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000f9fdffff0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00000000fffffffe01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000017c0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000fffffffe000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:47 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000060004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:47 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000380000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1645.104550][ T3302] loop3: p1 start 335762607 is beyond EOD, truncated [ 1645.111207][ T3302] loop3: p2 size 2 extends beyond EOD, truncated [ 1645.117747][ T3302] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1645.149207][ T3309] loop4: detected capacity change from 0 to 1 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffffffffffffffffe01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00000000ffffffff01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1645.151020][ T3316] loop2: detected capacity change from 0 to 4 [ 1645.155748][ T3315] loop0: detected capacity change from 0 to 4 [ 1645.162404][ T3316] EXT4-fs (loop2): Invalid log block size: 16777213 [ 1645.175003][ T3315] EXT4-fs (loop0): Invalid log cluster size: 31745 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f0007ffffffffffff01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1645.213037][ T3321] loop3: detected capacity change from 0 to 1 [ 1645.213640][ T3316] loop2: detected capacity change from 0 to 4 [ 1645.226324][ T3315] loop0: detected capacity change from 0 to 4 [ 1645.226842][ T3316] EXT4-fs (loop2): Invalid log block size: 16777213 [ 1645.233121][ T3315] EXT4-fs (loop0): Invalid log cluster size: 31745 09:12:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000fff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1645.260221][ T3321] loop3: p1 < > p2 < > p4 [ 1645.264626][ T3321] loop3: partition table partially beyond EOD, truncated [ 1645.271735][ T3321] loop3: p1 start 335762607 is beyond EOD, truncated [ 1645.278462][ T3321] loop3: p2 size 2 extends beyond EOD, truncated [ 1645.281967][ T3309] loop4: detected capacity change from 0 to 1 09:12:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000fdfdffff0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100ffffffffffffff7f0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655ffeffffffffffffff01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:48 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000480000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655fffffffffffffffff01000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1645.309913][ T3321] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1645.333007][ T381] loop3: p1 < > p2 < > p4 [ 1645.337417][ T381] loop3: partition table partially beyond EOD, truncated [ 1645.344554][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1645.351250][ T381] loop3: p2 size 2 extends beyond EOD, truncated 09:12:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffffefff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1645.363133][ T3337] loop2: detected capacity change from 0 to 4 [ 1645.370262][ T3339] loop0: detected capacity change from 0 to 4 [ 1645.370684][ T3337] EXT4-fs (loop2): Invalid log block size: 16777213 [ 1645.383166][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1645.391029][ T3339] EXT4-fs (loop0): Invalid log block size: 4294967295 [ 1645.405121][ T3341] loop4: detected capacity change from 0 to 1 [ 1645.433712][ T3337] loop2: detected capacity change from 0 to 4 [ 1645.435174][ T3321] loop3: detected capacity change from 0 to 1 [ 1645.448730][ T3339] loop0: detected capacity change from 0 to 4 [ 1645.451359][ T3337] EXT4-fs (loop2): Invalid log block size: 16777213 [ 1645.462450][ T3339] EXT4-fs (loop0): Invalid log block size: 4294967295 [ 1645.550243][ T3321] loop3: p1 < > p2 < > p4 [ 1645.554705][ T3321] loop3: partition table partially beyond EOD, truncated [ 1645.561790][ T3321] loop3: p1 start 335762607 is beyond EOD, truncated [ 1645.568453][ T3321] loop3: p2 size 2 extends beyond EOD, truncated [ 1645.575421][ T3321] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1645.582863][ T3341] loop4: detected capacity change from 0 to 1 09:12:48 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000063004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000200000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000ffefffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100007fffffff0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000ffffff850000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1645.621596][ T381] loop3: p1 < > p2 < > p4 [ 1645.626084][ T381] loop3: partition table partially beyond EOD, truncated [ 1645.633199][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1645.639948][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1645.651238][ T3351] loop2: detected capacity change from 0 to 4 [ 1645.659583][ T3353] loop0: detected capacity change from 0 to 4 09:12:48 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000580000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000300000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000400000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1645.670334][ T3351] EXT4-fs (loop2): Invalid log block size: 16777215 [ 1645.677133][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1645.680491][ T3353] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1645.695819][ T3356] loop4: detected capacity change from 0 to 1 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000500000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000fdfdffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000600000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1645.721318][ T3351] loop2: detected capacity change from 0 to 4 [ 1645.727633][ T3351] EXT4-fs (loop2): Invalid log block size: 16777215 [ 1645.750225][ T3358] loop3: detected capacity change from 0 to 1 [ 1645.756704][ T3353] loop0: detected capacity change from 0 to 4 [ 1645.765624][ T3353] EXT4-fs (loop0): Invalid log block size: 4294901760 09:12:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000085ffffff0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1645.782831][ T3356] loop4: detected capacity change from 0 to 1 [ 1645.789779][ T3358] loop3: p1 < > p2 < > p4 [ 1645.794219][ T3358] loop3: partition table partially beyond EOD, truncated [ 1645.796366][ T3369] loop2: detected capacity change from 0 to 4 [ 1645.801277][ T3358] loop3: p1 start 335762607 is beyond EOD, truncated [ 1645.812526][ T3369] EXT4-fs (loop2): Invalid log block size: 16777215 [ 1645.814036][ T3358] loop3: p2 size 2 extends beyond EOD, truncated [ 1645.827300][ T3358] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1645.845664][ T3369] loop2: detected capacity change from 0 to 4 [ 1645.852880][ T3369] EXT4-fs (loop2): Invalid log block size: 16777215 [ 1645.889557][ T3358] loop3: detected capacity change from 0 to 1 [ 1645.910053][ T3358] loop3: p1 < > p2 < > p4 [ 1645.914476][ T3358] loop3: partition table partially beyond EOD, truncated [ 1645.921563][ T3358] loop3: p1 start 335762607 is beyond EOD, truncated [ 1645.928280][ T3358] loop3: p2 size 2 extends beyond EOD, truncated [ 1645.934900][ T3358] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:48 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000068004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000700000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000ffffff8c0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000007fffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:48 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000680000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100008cffffff0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1645.990698][ T381] loop3: p1 < > p2 < > p4 [ 1645.995119][ T381] loop3: partition table partially beyond EOD, truncated [ 1646.002233][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1646.008947][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1646.023945][ T3375] loop0: detected capacity change from 0 to 4 [ 1646.024626][ T3383] loop2: detected capacity change from 0 to 4 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000800000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000080ffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000a00000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1646.032878][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1646.036441][ T3375] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1646.054544][ T3383] EXT4-fs (loop2): Invalid log block size: 16777215 [ 1646.054874][ T3384] loop4: detected capacity change from 0 to 1 [ 1646.081362][ T3386] loop3: detected capacity change from 0 to 1 09:12:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000b00000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1646.108796][ T3383] loop2: detected capacity change from 0 to 4 [ 1646.114546][ T3375] loop0: detected capacity change from 0 to 4 [ 1646.116426][ T3383] EXT4-fs (loop2): Invalid log block size: 16777215 [ 1646.122669][ T3375] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1646.134671][ T3386] loop3: p1 < > p2 < > p4 [ 1646.139111][ T3386] loop3: partition table partially beyond EOD, truncated [ 1646.146262][ T3386] loop3: p1 start 335762607 is beyond EOD, truncated 09:12:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000081ffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f001800000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1646.153039][ T3386] loop3: p2 size 2 extends beyond EOD, truncated [ 1646.165202][ T3386] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1646.195777][ T3384] loop4: detected capacity change from 0 to 1 [ 1646.265621][ T3386] loop3: detected capacity change from 0 to 1 [ 1646.310239][ T3386] loop3: p1 < > p2 < > p4 [ 1646.314656][ T3386] loop3: partition table partially beyond EOD, truncated [ 1646.321851][ T3386] loop3: p1 start 335762607 is beyond EOD, truncated [ 1646.328546][ T3386] loop3: p2 size 2 extends beyond EOD, truncated [ 1646.335259][ T3386] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:49 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000006c004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000028e0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000daffffff0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f002600000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000082ffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:49 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000040680000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1646.380755][ T381] loop3: p1 < > p2 < > p4 [ 1646.385179][ T381] loop3: partition table partially beyond EOD, truncated [ 1646.392317][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1646.398976][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1646.400741][ T3406] loop0: detected capacity change from 0 to 4 [ 1646.416373][ T3411] loop4: detected capacity change from 0 to 1 [ 1646.421959][ T3406] EXT4-fs (loop0): Invalid log cluster size: 36354 09:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f007700000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1646.429472][ T3410] loop2: detected capacity change from 0 to 4 [ 1646.431293][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1646.449980][ T3410] EXT4-fs (loop2): Invalid log block size: 16777215 [ 1646.471239][ T3406] loop0: detected capacity change from 0 to 4 09:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f007e00000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000085ffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1646.477921][ T3406] EXT4-fs (loop0): Invalid log cluster size: 36354 [ 1646.485779][ T3410] loop2: detected capacity change from 0 to 4 [ 1646.492119][ T3416] loop3: detected capacity change from 0 to 1 [ 1646.506454][ T3411] loop4: detected capacity change from 0 to 1 [ 1646.507897][ T3410] EXT4-fs (loop2): Invalid log block size: 16777215 09:12:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000000000028f0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00fe00000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1646.530119][ T381] loop3: p1 < > p2 < > p4 [ 1646.534544][ T381] loop3: partition table partially beyond EOD, truncated [ 1646.541650][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1646.548311][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1646.552075][ T3425] loop0: detected capacity change from 0 to 4 [ 1646.560933][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1646.569731][ T381] loop3: p1 < > p2 < > p4 [ 1646.574171][ T381] loop3: partition table partially beyond EOD, truncated 09:12:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000f6ffffff0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1646.581292][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1646.588005][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1646.595110][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1646.595138][ T3425] EXT4-fs (loop0): Invalid log cluster size: 36610 [ 1646.617051][ T3416] loop3: p1 < > p2 < > p4 [ 1646.621489][ T3416] loop3: partition table partially beyond EOD, truncated [ 1646.628537][ T3416] loop3: p1 start 335762607 is beyond EOD, truncated [ 1646.635227][ T3416] loop3: p2 size 2 extends beyond EOD, truncated [ 1646.642523][ T3416] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1646.642897][ T3431] loop2: detected capacity change from 0 to 4 [ 1646.656512][ T3431] EXT4-fs (loop2): Invalid log block size: 16777215 [ 1646.663348][ T3425] loop0: detected capacity change from 0 to 4 [ 1646.669851][ T3425] EXT4-fs (loop0): Invalid log cluster size: 36610 [ 1646.677725][ T3416] loop3: detected capacity change from 0 to 1 [ 1646.684848][ T3431] loop2: detected capacity change from 0 to 4 [ 1646.691276][ T3431] EXT4-fs (loop2): Invalid log block size: 16777215 [ 1646.720029][ T381] loop3: p1 < > p2 < > p4 [ 1646.724454][ T381] loop3: partition table partially beyond EOD, truncated [ 1646.731514][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1646.738290][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1646.745066][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1646.753192][ T381] loop3: p1 < > p2 < > p4 [ 1646.757598][ T381] loop3: partition table partially beyond EOD, truncated [ 1646.764728][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1646.771398][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1646.778086][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1646.786152][ T3416] loop3: p1 < > p2 < > p4 [ 1646.790624][ T3416] loop3: partition table partially beyond EOD, truncated [ 1646.797647][ T3416] loop3: p1 start 335762607 is beyond EOD, truncated [ 1646.804335][ T3416] loop3: p2 size 2 extends beyond EOD, truncated [ 1646.810899][ T3416] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:49 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000074004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:49 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000780000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000402000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f006800000000008000050000000000420000008cffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000002900000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000feffffff0000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1646.849197][ T381] loop3: p1 < > p2 < > p4 [ 1646.853663][ T381] loop3: partition table partially beyond EOD, truncated [ 1646.860781][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1646.867467][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1646.868916][ T3437] loop0: detected capacity change from 0 to 4 [ 1646.881927][ T3440] loop2: detected capacity change from 0 to 4 [ 1646.890816][ T3441] loop4: detected capacity change from 0 to 1 09:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000003000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000204000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1646.890919][ T3440] EXT4-fs (loop2): Invalid log block size: 16777215 [ 1646.899814][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1646.910650][ T3437] EXT4-fs (loop0): Invalid log cluster size: 36866 [ 1646.951393][ T3437] loop0: detected capacity change from 0 to 4 [ 1646.961272][ T3444] loop3: detected capacity change from 0 to 1 [ 1646.963729][ T3437] EXT4-fs (loop0): Invalid log cluster size: 36866 [ 1646.967613][ T3440] loop2: detected capacity change from 0 to 4 [ 1646.987475][ T3440] EXT4-fs (loop2): Invalid log block size: 16777215 [ 1646.989071][ T3441] loop4: detected capacity change from 0 to 1 09:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000604000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000a1ffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000005000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1646.994143][ T3444] loop3: p1 < > p2 < > p4 [ 1647.004561][ T3444] loop3: partition table partially beyond EOD, truncated [ 1647.011653][ T3444] loop3: p1 start 335762607 is beyond EOD, truncated [ 1647.018326][ T3444] loop3: p2 size 2 extends beyond EOD, truncated [ 1647.024994][ T3444] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1647.041848][ T381] loop3: p1 < > p2 < > p4 09:12:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000001a20000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1647.046268][ T381] loop3: partition table partially beyond EOD, truncated [ 1647.053394][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1647.060070][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1647.067198][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1647.080955][ T3458] loop0: detected capacity change from 0 to 4 [ 1647.091555][ T3458] EXT4-fs (loop0): Invalid log cluster size: 41473 09:12:49 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f006800000000008000050000007a004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000006000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000001000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000a5ffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:49 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000880000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1647.121519][ T3458] loop0: detected capacity change from 0 to 4 [ 1647.125871][ T3444] loop3: detected capacity change from 0 to 1 [ 1647.127889][ T3458] EXT4-fs (loop0): Invalid log cluster size: 41473 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000406000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000ffffffda0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1647.168917][ T3463] loop2: detected capacity change from 0 to 4 [ 1647.182274][ T3464] loop4: detected capacity change from 0 to 1 [ 1647.197953][ T3463] EXT4-fs (loop2): Invalid log block size: 268435456 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000007000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000a6ffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1647.223065][ T3469] loop3: detected capacity change from 0 to 1 [ 1647.228354][ T3472] loop0: detected capacity change from 0 to 4 [ 1647.240244][ T3469] loop3: p1 < > p2 < > p4 [ 1647.242899][ T3472] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1647.244683][ T3469] loop3: partition table partially beyond EOD, truncated [ 1647.258477][ T3469] loop3: p1 start 335762607 is beyond EOD, truncated [ 1647.265175][ T3469] loop3: p2 size 2 extends beyond EOD, truncated 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00000a000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1647.273233][ T3463] loop2: detected capacity change from 0 to 4 [ 1647.274721][ T3469] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1647.283530][ T3463] EXT4-fs (loop2): Invalid log block size: 268435456 [ 1647.300245][ T3464] loop4: detected capacity change from 0 to 1 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00000b000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000a9ffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1647.321876][ T3472] loop0: detected capacity change from 0 to 4 [ 1647.328481][ T3472] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1647.341445][ T3469] loop3: detected capacity change from 0 to 1 [ 1647.390254][ T3469] loop3: p1 < > p2 < > p4 [ 1647.394679][ T3469] loop3: partition table partially beyond EOD, truncated [ 1647.401808][ T3469] loop3: p1 start 335762607 is beyond EOD, truncated [ 1647.408472][ T3469] loop3: p2 size 2 extends beyond EOD, truncated [ 1647.415348][ T3469] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:50 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000089004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000008000000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000018000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:50 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000980000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000fffffff60000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000bfffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1647.471788][ T381] loop3: p1 < > p2 < > p4 [ 1647.476206][ T381] loop3: partition table partially beyond EOD, truncated [ 1647.483320][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1647.490050][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1647.490327][ T3488] loop2: detected capacity change from 0 to 4 [ 1647.506680][ T3490] loop0: detected capacity change from 0 to 4 [ 1647.513461][ T3495] loop4: detected capacity change from 0 to 1 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000020000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000026000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1647.515684][ T3490] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1647.520608][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1647.529369][ T3488] EXT4-fs (loop2): Invalid log block size: 2147483648 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00003f000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000c9ffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1647.582673][ T3488] loop2: detected capacity change from 0 to 4 [ 1647.590767][ T3497] loop3: detected capacity change from 0 to 1 [ 1647.592715][ T3488] EXT4-fs (loop2): Invalid log block size: 2147483648 [ 1647.599418][ T3490] loop0: detected capacity change from 0 to 4 [ 1647.610185][ T3490] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1647.623824][ T3495] loop4: detected capacity change from 0 to 1 09:12:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000008000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000fffffdf90000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1647.632594][ T3497] loop3: p1 < > p2 < > p4 [ 1647.637022][ T3497] loop3: partition table partially beyond EOD, truncated [ 1647.644120][ T3497] loop3: p1 start 335762607 is beyond EOD, truncated [ 1647.650803][ T3497] loop3: p2 size 2 extends beyond EOD, truncated [ 1647.675550][ T3508] loop2: detected capacity change from 0 to 4 [ 1647.678075][ T3497] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1647.692294][ T3511] loop0: detected capacity change from 0 to 4 [ 1647.700165][ T3511] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1647.730529][ T3508] loop2: detected capacity change from 0 to 4 [ 1647.741422][ T3511] loop0: detected capacity change from 0 to 4 [ 1647.747840][ T3511] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1647.753226][ T3497] loop3: detected capacity change from 0 to 1 [ 1647.810910][ T3497] loop3: p1 < > p2 < > p4 [ 1647.815320][ T3497] loop3: partition table partially beyond EOD, truncated [ 1647.822469][ T3497] loop3: p1 start 335762607 is beyond EOD, truncated [ 1647.829237][ T3497] loop3: p2 size 2 extends beyond EOD, truncated [ 1647.835923][ T3497] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:50 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000090004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000040000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000e4ffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:50 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000a80000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000c0ed000000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000fffffdfd0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1647.930584][ T381] loop3: p1 < > p2 < > p4 [ 1647.934999][ T381] loop3: partition table partially beyond EOD, truncated [ 1647.942071][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1647.948778][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1647.962067][ T3518] loop2: detected capacity change from 0 to 4 [ 1647.965356][ T3519] loop4: detected capacity change from 0 to 1 [ 1647.974821][ T3521] loop0: detected capacity change from 0 to 4 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000077000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00007e000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000eeffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1647.979946][ T3518] EXT4-fs (loop2): Invalid log block size: 3221225472 [ 1647.988418][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1647.989293][ T3521] EXT4-fs (loop0): Invalid log block size: 4294901760 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00fffe000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f00feff000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1648.053888][ T3521] loop0: detected capacity change from 0 to 4 [ 1648.059276][ T3518] loop2: detected capacity change from 0 to 4 [ 1648.066158][ T3521] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1648.073815][ T3518] EXT4-fs (loop2): Invalid log block size: 3221225472 [ 1648.090664][ T3519] loop4: detected capacity change from 0 to 1 09:12:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000f6ffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1648.102215][ T3534] loop3: detected capacity change from 0 to 1 [ 1648.140500][ T3534] loop3: p1 < > p2 < > p4 [ 1648.144931][ T3534] loop3: partition table partially beyond EOD, truncated [ 1648.152048][ T3534] loop3: p1 start 335762607 is beyond EOD, truncated [ 1648.158718][ T3534] loop3: p2 size 2 extends beyond EOD, truncated [ 1648.165596][ T3534] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1648.233983][ T3534] loop3: detected capacity change from 0 to 1 [ 1648.310128][ T3534] loop3: p1 < > p2 < > p4 [ 1648.314545][ T3534] loop3: partition table partially beyond EOD, truncated [ 1648.321643][ T3534] loop3: p1 start 335762607 is beyond EOD, truncated [ 1648.328372][ T3534] loop3: p2 size 2 extends beyond EOD, truncated [ 1648.335066][ T3534] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1648.343097][ T381] loop3: p1 < > p2 < > p4 [ 1648.347520][ T381] loop3: partition table partially beyond EOD, truncated 09:12:51 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000000800005000000c0004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000040000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000fffffffe0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000010000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000fbffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:51 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000b80000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 1648.354678][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1648.361353][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1648.368160][ T3547] loop2: detected capacity change from 0 to 4 [ 1648.379158][ T3553] loop0: detected capacity change from 0 to 4 [ 1648.388152][ T3552] loop4: detected capacity change from 0 to 1 [ 1648.388599][ T3547] EXT4-fs (loop2): Invalid log cluster size: 256 [ 1648.395282][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000080000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f004000080000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000200000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1648.408022][ T3553] EXT4-fs (loop0): Invalid log block size: 4294901760 09:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000100000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000fdffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1648.463776][ T3553] loop0: detected capacity change from 0 to 4 [ 1648.474103][ T3552] loop4: detected capacity change from 0 to 1 [ 1648.475330][ T3547] loop2: detected capacity change from 0 to 4 [ 1648.486077][ T3553] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1648.486713][ T3547] EXT4-fs (loop2): Invalid log cluster size: 256 09:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000200000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1648.513233][ T3566] loop3: detected capacity change from 0 to 1 [ 1648.550678][ T3566] loop3: p1 < > p2 < > p4 [ 1648.555090][ T3566] loop3: partition table partially beyond EOD, truncated [ 1648.562225][ T3566] loop3: p1 start 335762607 is beyond EOD, truncated [ 1648.569012][ T3566] loop3: p2 size 2 extends beyond EOD, truncated [ 1648.575895][ T3566] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1648.625338][ T3566] loop3: detected capacity change from 0 to 1 [ 1648.691106][ T3566] loop3: p1 < > p2 < > p4 [ 1648.695531][ T3566] loop3: partition table partially beyond EOD, truncated [ 1648.702618][ T3566] loop3: p1 start 335762607 is beyond EOD, truncated [ 1648.709297][ T3566] loop3: p2 size 2 extends beyond EOD, truncated [ 1648.716070][ T3566] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:51 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000000800005000000ec004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100fffffffffffffffe0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000040200000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000ffffffffffff070000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:51 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000c80000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f00680000000000800005000000000042000000feffffff000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1648.850763][ T381] loop3: p1 < > p2 < > p4 [ 1648.855194][ T381] loop3: partition table partially beyond EOD, truncated [ 1648.862348][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1648.869010][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1648.881341][ T3576] loop2: detected capacity change from 0 to 4 [ 1648.883396][ T3577] loop4: detected capacity change from 0 to 1 09:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000300000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000400000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1648.895775][ T3579] loop0: detected capacity change from 0 to 4 [ 1648.896325][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1648.902701][ T3579] EXT4-fs (loop0): Invalid log block size: 4294967295 [ 1648.916183][ T3576] EXT4-fs (loop2): Invalid log block size: 4294967295 09:12:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000100000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1648.956045][ T3581] loop3: detected capacity change from 0 to 1 [ 1648.957170][ T3576] loop2: detected capacity change from 0 to 4 [ 1648.962700][ T3579] loop0: detected capacity change from 0 to 4 [ 1648.970529][ T3576] EXT4-fs (loop2): Invalid log block size: 4294967295 [ 1648.975044][ T3579] EXT4-fs (loop0): Invalid log block size: 4294967295 [ 1649.000208][ T3581] loop3: p1 < > p2 < > p4 09:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000500000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000600000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f00000001000000000000000fff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1649.004616][ T3581] loop3: partition table partially beyond EOD, truncated [ 1649.009281][ T3577] loop4: detected capacity change from 0 to 1 [ 1649.011716][ T3581] loop3: p1 start 335762607 is beyond EOD, truncated [ 1649.011732][ T3581] loop3: p2 size 2 extends beyond EOD, truncated [ 1649.033300][ T3581] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1649.065041][ T3592] loop0: detected capacity change from 0 to 4 [ 1649.077891][ T3592] EXT4-fs (loop0): Invalid log cluster size: 65295 [ 1649.092085][ T3581] loop3: detected capacity change from 0 to 1 [ 1649.120484][ T3581] loop3: p1 < > p2 < > p4 [ 1649.124003][ T3592] loop0: detected capacity change from 0 to 4 [ 1649.124905][ T3581] loop3: partition table partially beyond EOD, truncated [ 1649.131617][ T3592] EXT4-fs (loop0): Invalid log cluster size: 65295 [ 1649.138068][ T3581] loop3: p1 start 335762607 is beyond EOD, truncated [ 1649.151226][ T3581] loop3: p2 size 2 extends beyond EOD, truncated [ 1649.157829][ T3581] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1649.165848][ T381] loop3: p1 < > p2 < > p4 09:12:52 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f00680000000000800005000000fe004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000100002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000040600000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:52 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000d80000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000800000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) [ 1649.170312][ T381] loop3: partition table partially beyond EOD, truncated [ 1649.177365][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1649.184113][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1649.196192][ T3599] loop2: detected capacity change from 0 to 4 [ 1649.197721][ T3602] loop4: detected capacity change from 0 to 1 [ 1649.209216][ T3599] EXT4-fs (loop2): Invalid log cluster size: 65536 09:12:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000fffffbff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000700000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1649.209420][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000800000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000a00000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1649.244195][ T3608] loop0: detected capacity change from 0 to 4 [ 1649.251002][ T3608] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1649.271322][ T3599] loop2: detected capacity change from 0 to 4 [ 1649.277857][ T3599] EXT4-fs (loop2): Invalid log cluster size: 65536 [ 1649.283928][ T3605] loop3: detected capacity change from 0 to 1 09:12:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000001000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000200002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1649.287351][ T3608] loop0: detected capacity change from 0 to 4 [ 1649.296772][ T3608] EXT4-fs (loop0): Invalid log block size: 4294901760 [ 1649.311847][ T3602] loop4: detected capacity change from 0 to 1 [ 1649.320033][ T3605] loop3: p1 < > p2 < > p4 [ 1649.324439][ T3605] loop3: partition table partially beyond EOD, truncated [ 1649.331561][ T3605] loop3: p1 start 335762607 is beyond EOD, truncated [ 1649.338230][ T3605] loop3: p2 size 2 extends beyond EOD, truncated 09:12:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000000b00000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1649.353033][ T3605] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1649.354050][ T3618] loop2: detected capacity change from 0 to 4 [ 1649.371224][ T3618] EXT4-fs (loop2): Invalid log cluster size: 131072 [ 1649.407565][ T3605] loop3: detected capacity change from 0 to 1 [ 1649.414797][ T3618] loop2: detected capacity change from 0 to 4 [ 1649.421235][ T3618] EXT4-fs (loop2): Invalid log cluster size: 131072 [ 1649.460074][ T381] loop3: p1 < > p2 < > p4 [ 1649.464520][ T381] loop3: partition table partially beyond EOD, truncated [ 1649.471698][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1649.478362][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1649.486095][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1649.494208][ T381] loop3: p1 < > p2 < > p4 [ 1649.498680][ T381] loop3: partition table partially beyond EOD, truncated 09:12:52 executing program 3: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000080000500000010014200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f0000000100000000007fffffff0000002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) 09:12:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000001000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:52 executing program 4: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c6480ffffff0f0068000000000e80000510010000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 09:12:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000001800000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000040200002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1649.505793][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1649.512538][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1649.519207][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 1649.527083][ T3605] loop3: p1 < > p2 < > p4 [ 1649.531517][ T3605] loop3: partition table partially beyond EOD, truncated [ 1649.538663][ T3605] loop3: p1 start 335762607 is beyond EOD, truncated [ 1649.545373][ T3605] loop3: p2 size 2 extends beyond EOD, truncated [ 1649.552079][ T3605] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000002600000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1649.582586][ T3629] loop2: detected capacity change from 0 to 4 [ 1649.589169][ T3625] loop0: detected capacity change from 0 to 4 [ 1649.592015][ T3632] loop4: detected capacity change from 0 to 1 [ 1649.602193][ T3629] EXT4-fs (loop2): Invalid log cluster size: 132096 [ 1649.614182][ T3625] EXT4-fs (loop0): Invalid log block size: 4286513152 09:12:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000003f00000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) 09:12:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f60f020206af5403149a168c64000000000f0068000000000080000500000000004200000000000000000004000000000000000000000000000000200055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8298, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x0, 0xffffffffffffffff, 0x9) open(0x0, 0x141042, 0x0) 09:12:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000000004000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1649.634259][ T3629] loop2: detected capacity change from 0 to 4 [ 1649.642956][ T3629] EXT4-fs (loop2): Invalid log cluster size: 132096 [ 1649.649951][ T3639] loop3: detected capacity change from 0 to 1 [ 1649.671016][ T3625] loop0: detected capacity change from 0 to 4 [ 1649.677873][ T3625] EXT4-fs (loop0): Invalid log block size: 4286513152 09:12:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000300002000000020000020000000dff4655fdff4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xfffffffffffffff7}}]}) [ 1649.690033][ T381] loop3: p1 < > p2 < > p4 [ 1649.692873][ T3632] loop4: detected capacity change from 0 to 1 [ 1649.694476][ T381] loop3: partition table partially beyond EOD, truncated [ 1649.707605][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1649.714285][ T381] loop3: p2 size 2 extends beyond EOD, truncated [ 1649.729107][ T381] loop3: p4 size 2097152 extends beyond EOD, truncated 09:12:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000dff4655fdff4655f0100ffff53ef010001000000def4655f000008004000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000def4655fdff4655fdff4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000040)={[{@journal_dev}]}) [ 1649.735006][ T3647] loop2: detected capacity change from 0 to 4 [ 1649.742894][ T381] loop3: p1 < > p2 < > p4 [ 1649.747324][ T381] loop3: partition table partially beyond EOD, truncated [ 1649.754456][ T381] loop3: p1 start 335762607 is beyond EOD, truncated [ 1649.756076][ T3647] EXT4-fs (loop2):