0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000002c00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:07 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000008900000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:07 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000039e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2940.802087][T29263] loop5: detected capacity change from 0 to 1 [ 2940.811930][T29265] loop1: detected capacity change from 0 to 1 [ 2940.817976][T29266] loop4: detected capacity change from 0 to 131072 [ 2940.823316][T29260] loop2: detected capacity change from 0 to 131072 [ 2940.851317][T29267] loop3: detected capacity change from 0 to 131072 [ 2940.897469][T29265] loop1: p1 < > p2 < > p4 [ 2940.901918][T29265] loop1: partition table partially beyond EOD, truncated [ 2940.910807][T29263] loop5: p1 < > p2 < > p4 [ 2940.915278][T29263] loop5: partition table partially beyond EOD, truncated [ 2940.924172][T29267] loop3: p1 < > p2 < > p4 [ 2940.925007][T29263] loop5: p1 start 10 is beyond EOD, truncated [ 2940.934795][T29263] loop5: p2 size 2 extends beyond EOD, truncated 17:12:08 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000009000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:08 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000002d00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2940.945421][T29267] loop3: p4 start 4293918719 is beyond EOD, truncated [ 2940.947269][T29265] loop1: p1 start 10 is beyond EOD, truncated [ 2940.958516][T29265] loop1: p2 size 2 extends beyond EOD, truncated [ 2940.971886][T29263] loop5: p4 start 285212672 is beyond EOD, truncated [ 2940.984895][T29265] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:08 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000ffffffe400200055aa", 0x40, 0x1c0}]) [ 2940.996550][T29272] loop2: detected capacity change from 0 to 131072 [ 2941.009213][T29274] loop4: detected capacity change from 0 to 131072 17:12:08 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000059c00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:08 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000002e00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:08 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000001ffff0000200055aa", 0x40, 0x1c0}]) [ 2941.107165][T29277] loop5: detected capacity change from 0 to 1 [ 2941.135919][T29280] loop2: detected capacity change from 0 to 131072 [ 2941.142637][T29282] loop4: detected capacity change from 0 to 131072 [ 2941.157716][T29277] loop5: p1 < > p2 < > p4 [ 2941.161021][T29283] loop3: detected capacity change from 0 to 131072 [ 2941.162244][T29277] loop5: partition table partially beyond EOD, truncated [ 2941.162394][T29277] loop5: p1 start 10 is beyond EOD, truncated [ 2941.181953][T29277] loop5: p2 size 2 extends beyond EOD, truncated [ 2941.192819][T29277] loop5: p4 start 4294967040 is beyond EOD, truncated [ 2941.200149][ T3068] loop3: p1 < > p2 < > p4 [ 2941.226616][ T3068] loop3: p4 start 4294902016 is beyond EOD, truncated [ 2941.253239][T29283] loop3: p1 < > p2 < > p4 [ 2941.267311][T29283] loop3: p4 start 4294902016 is beyond EOD, truncated 17:12:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) 17:12:08 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000003ae525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:08 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000000000ec00200055aa", 0x40, 0x1c0}]) 17:12:08 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000002bc00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:08 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000002f00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:08 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000007fffffff0000200055aa", 0x40, 0x1c0}]) [ 2941.683235][T29290] loop5: detected capacity change from 0 to 1 [ 2941.700275][T29287] loop1: detected capacity change from 0 to 1 [ 2941.711716][T29294] loop2: detected capacity change from 0 to 131072 [ 2941.714316][T29293] loop4: detected capacity change from 0 to 131072 [ 2941.732747][T29295] loop3: detected capacity change from 0 to 131072 [ 2941.763773][ T4634] loop1: p1 < > p2 < > p4 [ 2941.768280][ T4634] loop1: partition table partially beyond EOD, truncated [ 2941.778422][ T3068] loop5: p1 < > p2 < > p4 17:12:08 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000c000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2941.782886][ T3068] loop5: partition table partially beyond EOD, truncated [ 2941.790357][ T4998] loop3: p1 < > p2 < > p4 [ 2941.815751][ T4998] loop3: p4 start 4294967167 is beyond EOD, truncated 17:12:08 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2941.831142][ T3068] loop5: p1 start 10 is beyond EOD, truncated [ 2941.837282][ T3068] loop5: p2 size 2 extends beyond EOD, truncated [ 2941.853328][ T4634] loop1: p1 start 10 is beyond EOD, truncated [ 2941.859464][ T4634] loop1: p2 size 2 extends beyond EOD, truncated [ 2941.871121][T29301] loop2: detected capacity change from 0 to 131072 [ 2941.885899][ T4634] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2941.890307][T29303] loop4: detected capacity change from 0 to 131072 [ 2941.895007][ T3068] loop5: p4 size 2097388 extends beyond EOD, truncated [ 2941.906370][T29295] loop3: p1 < > p2 < > p4 [ 2941.919088][T29287] loop1: p1 < > p2 < > p4 [ 2941.921453][T29295] loop3: p4 start 4294967167 is beyond EOD, truncated 17:12:09 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003100000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000001c000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2941.923630][T29287] loop1: partition table partially beyond EOD, truncated [ 2941.926165][T29287] loop1: p1 start 10 is beyond EOD, truncated [ 2941.943670][T29287] loop1: p2 size 2 extends beyond EOD, truncated [ 2941.950665][T29290] loop5: p1 < > p2 < > p4 [ 2941.955221][T29290] loop5: partition table partially beyond EOD, truncated [ 2941.962726][T29287] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2941.999788][T29290] loop5: p1 start 10 is beyond EOD, truncated [ 2942.005951][T29290] loop5: p2 size 2 extends beyond EOD, truncated 17:12:09 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000005c200000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000ffffffff0000200055aa", 0x40, 0x1c0}]) [ 2942.041882][T29307] loop4: detected capacity change from 0 to 131072 [ 2942.044764][T29290] loop5: p4 size 2097388 extends beyond EOD, truncated [ 2942.078110][T29310] loop2: detected capacity change from 0 to 131072 [ 2942.115815][T29313] loop3: detected capacity change from 0 to 131072 [ 2942.164055][ T1437] loop3: p1 < > p2 < > p4 [ 2942.169240][ T1437] loop3: p4 start 4294967295 is beyond EOD, truncated [ 2942.179038][T29313] loop3: p1 < > p2 < > p4 [ 2942.185364][T29313] loop3: p4 start 4294967295 is beyond EOD, truncated [ 2942.479599][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop5p4, 10) failed: No such file or directory [ 2942.506580][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 2942.506826][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory 17:12:09 executing program 0: recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:09 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000003be525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003200000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000dc00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000ffffffee00200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000feffffffffffffff0000200055aa", 0x40, 0x1c0}]) [ 2942.517235][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 2942.534858][ T4634] udevd[4634]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 2942.537295][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 2942.562365][ T3066] udevd[3066]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory 17:12:09 executing program 0: recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2942.591463][T29319] loop5: detected capacity change from 0 to 1 [ 2942.597970][T29325] loop1: detected capacity change from 0 to 1 [ 2942.598415][T29322] loop2: detected capacity change from 0 to 131072 [ 2942.614924][T29321] loop4: detected capacity change from 0 to 131072 [ 2942.644726][ T4998] loop5: p1 < > p2 < > p4 [ 2942.645297][ T4230] loop1: p1 < > p2 < > p4 [ 2942.649169][ T4998] loop5: partition table partially beyond EOD, truncated [ 2942.653620][ T4230] loop1: partition table partially beyond EOD, truncated [ 2942.662792][ T4230] loop1: p1 start 10 is beyond EOD, truncated [ 2942.668307][ T4998] loop5: p1 start 10 is beyond EOD, [ 2942.673946][ T4230] loop1: p2 size 2 extends beyond EOD, truncated [ 2942.679231][ T4998] truncated [ 2942.679237][ T4998] loop5: p2 size 2 extends beyond EOD, truncated 17:12:09 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000ec00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 0: recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2942.696744][ T4998] loop5: p4 start 4294967040 is beyond EOD, truncated [ 2942.700810][T29324] loop3: detected capacity change from 0 to 131072 [ 2942.712236][T29319] loop5: p1 < > p2 < > p4 [ 2942.714378][ T4230] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2942.716684][T29319] loop5: partition table partially beyond EOD, truncated 17:12:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(r1, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:09 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003300000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2942.749346][T29325] loop1: p1 < > p2 < > p4 [ 2942.753815][T29325] loop1: partition table partially beyond EOD, truncated [ 2942.778876][T29319] loop5: p1 start 10 is beyond EOD, truncated [ 2942.785055][T29319] loop5: p2 size 2 extends beyond EOD, truncated [ 2942.786307][T29334] loop2: detected capacity change from 0 to 131072 17:12:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(r1, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2942.794144][T29324] loop3: p1 < > p2 < > p4 [ 2942.798381][T29325] loop1: p1 start 10 is beyond EOD, truncated [ 2942.808581][T29325] loop1: p2 size 2 extends beyond EOD, truncated [ 2942.822075][T29325] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2942.828256][T29319] loop5: p4 start 4294967040 is beyond EOD, truncated [ 2942.837729][T29324] loop3: p4 start 4294967295 is beyond EOD, truncated 17:12:09 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000003ff00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000003ce525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(r1, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2942.859371][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 2942.869454][T29339] loop4: detected capacity change from 0 to 131072 17:12:09 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000ffffffffffffffff0000200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000fffffff600200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003400000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2942.937158][T29343] loop1: detected capacity change from 0 to 1 [ 2942.958088][T29348] loop5: detected capacity change from 0 to 1 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:10 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003500000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2942.984072][ T3068] loop1: p1 < > p2 < > p4 [ 2942.988509][ T3068] loop1: partition table partially beyond EOD, truncated [ 2943.002713][ T3068] loop1: p1 start 10 is beyond EOD, truncated [ 2943.008831][ T3068] loop1: p2 size 2 extends beyond EOD, truncated [ 2943.021469][T29356] loop2: detected capacity change from 0 to 131072 [ 2943.021841][ T3068] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2943.039379][T29355] loop3: detected capacity change from 0 to 131072 [ 2943.048421][T29343] loop1: p1 < > p2 < > p4 [ 2943.052860][T29343] loop1: partition table partially beyond EOD, truncated [ 2943.067127][T29348] loop5: p1 < > p2 < > p4 [ 2943.071562][T29348] loop5: partition table partially beyond EOD, truncated [ 2943.078939][T29343] loop1: p1 start 10 is beyond EOD, truncated 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(r0, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:10 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000fff00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2943.081219][T29363] loop4: detected capacity change from 0 to 131072 [ 2943.085060][T29343] loop1: p2 size 2 extends beyond EOD, truncated [ 2943.095945][T29348] loop5: p1 start 10 is beyond EOD, truncated [ 2943.100223][ T4230] loop3: p1 < > p2 < > p4 [ 2943.103961][T29348] loop5: p2 size 2 extends beyond EOD, truncated [ 2943.115382][T29343] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2943.116926][T29348] loop5: p4 start 4294967040 is beyond EOD, truncated [ 2943.122460][ T4230] loop3: p4 start 4294967295 is beyond EOD, truncated 17:12:10 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000fffffffb00200055aa", 0x40, 0x1c0}]) 17:12:10 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000003de525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:10 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003600000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2943.183406][T29355] loop3: p1 < > p2 < > p4 17:12:10 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000020000000000000000200055aa", 0x40, 0x1c0}]) 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(r0, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2943.203980][T29355] loop3: p4 start 4294967295 is beyond EOD, truncated [ 2943.217678][T29376] loop1: detected capacity change from 0 to 1 [ 2943.228321][T29370] loop2: detected capacity change from 0 to 131072 [ 2943.236312][T29375] loop5: detected capacity change from 0 to 1 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x120, &(0x7f000000d340)) sendmmsg$unix(r0, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:10 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003700000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2943.265606][T29376] loop1: p1 < > p2 < > p4 [ 2943.270057][T29376] loop1: partition table partially beyond EOD, truncated [ 2943.277738][T29376] loop1: p1 start 10 is beyond EOD, truncated [ 2943.283876][T29376] loop1: p2 size 2 extends beyond EOD, truncated [ 2943.292963][T29376] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2943.306575][T29375] loop5: p1 < > p2 < > p4 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x120, &(0x7f000000d340)) sendmmsg$unix(r1, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x120, &(0x7f000000d340)) sendmmsg$unix(r1, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2943.311073][T29375] loop5: partition table partially beyond EOD, truncated [ 2943.321074][T29381] loop3: detected capacity change from 0 to 131072 [ 2943.330463][T29375] loop5: p1 start 10 is beyond EOD, truncated [ 2943.331408][T29386] loop4: detected capacity change from 0 to 131072 [ 2943.336629][T29375] loop5: p2 size 2 extends beyond EOD, truncated 17:12:10 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000003ee525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:10 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000f8ff01000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:10 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003800000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2943.375462][T29381] loop3: p1 < > p2 < > p4 [ 2943.381957][T29375] loop5: p4 start 4294967040 is beyond EOD, truncated [ 2943.406377][T29381] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2943.418069][T29397] loop2: detected capacity change from 0 to 131072 [ 2943.427462][T29393] loop1: detected capacity change from 0 to 1 [ 2943.435727][T29398] loop4: detected capacity change from 0 to 131072 [ 2943.463960][T29393] loop1: p1 < > p2 < > p4 [ 2943.468474][T29393] loop1: partition table partially beyond EOD, truncated 17:12:10 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000fffffdfd00200055aa", 0x40, 0x1c0}]) 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x120, &(0x7f000000d340)) sendmmsg$unix(r1, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:10 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffff01000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:10 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000030000000000000000200055aa", 0x40, 0x1c0}]) [ 2943.476190][T29393] loop1: p1 start 10 is beyond EOD, truncated [ 2943.482274][T29393] loop1: p2 size 2 extends beyond EOD, truncated [ 2943.501610][T29393] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:10 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003900000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200), 0x0, 0x120, &(0x7f000000d340)) sendmmsg$unix(r1, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2943.525742][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 2943.533459][T29407] loop2: detected capacity change from 0 to 131072 [ 2943.540617][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 2943.546102][T29403] loop5: detected capacity change from 0 to 1 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200), 0x0, 0x120, &(0x7f000000d340)) sendmmsg$unix(r1, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200), 0x0, 0x120, &(0x7f000000d340)) sendmmsg$unix(r1, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:10 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000002000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2943.577631][T29409] loop4: detected capacity change from 0 to 131072 [ 2943.583307][T29405] loop3: detected capacity change from 0 to 131072 [ 2943.592654][T29403] loop5: p1 < > p2 < > p4 [ 2943.597136][T29403] loop5: partition table partially beyond EOD, truncated [ 2943.621278][T29403] loop5: p1 start 10 is beyond EOD, truncated 17:12:10 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000077e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x168}}], 0x1, 0x0, &(0x7f000000d340)) sendmmsg$unix(r1, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:10 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003a00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2943.627456][T29403] loop5: p2 size 2 extends beyond EOD, truncated [ 2943.634577][T29403] loop5: p4 start 4261412608 is beyond EOD, truncated [ 2943.646329][T29420] loop1: detected capacity change from 0 to 1 [ 2943.657166][T29405] loop3: p1 < > p2 < > p4 [ 2943.665213][T29423] loop2: detected capacity change from 0 to 131072 [ 2943.666861][T29405] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:10 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000fffffffd00200055aa", 0x40, 0x1c0}]) 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2943.694120][T29420] loop1: p1 < > p2 < > p4 [ 2943.696511][ T1437] loop2: p1 < > p2 < > p4 [ 2943.698555][T29420] loop1: partition table partially beyond EOD, truncated [ 2943.705443][ T1437] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2943.721649][T29423] loop2: p1 < > p2 < > p4 [ 2943.733378][T29423] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:10 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000040000000000000000200055aa", 0x40, 0x1c0}]) [ 2943.736990][T29428] loop5: detected capacity change from 0 to 1 [ 2943.747851][T29431] loop4: detected capacity change from 0 to 131072 [ 2943.747941][ T1437] loop2: p1 < > p2 < > p4 [ 2943.754814][T29420] loop1: p1 start 10 is beyond EOD, truncated [ 2943.762284][ T1437] loop2: p4 size 2097152 extends beyond EOD, [ 2943.765003][T29420] loop1: p2 size 2 extends beyond EOD, truncated [ 2943.765452][T29420] loop1: p4 size 2097152 extends beyond EOD, [ 2943.771071][ T1437] truncated [ 2943.786593][T29420] truncated 17:12:10 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffff03000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:10 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000078e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2943.804335][T29428] loop5: p1 < > p2 < > p4 [ 2943.808816][T29428] loop5: partition table partially beyond EOD, truncated [ 2943.843320][T29428] loop5: p1 start 10 is beyond EOD, truncated 17:12:10 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003b00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2943.849530][T29428] loop5: p2 size 2 extends beyond EOD, truncated [ 2943.861943][T29435] loop3: detected capacity change from 0 to 131072 [ 2943.864605][T29441] loop2: detected capacity change from 0 to 131072 [ 2943.878448][T29428] loop5: p4 start 4294967040 is beyond EOD, truncated [ 2943.885868][T29443] loop1: detected capacity change from 0 to 1 [ 2943.907182][T29447] loop4: detected capacity change from 0 to 131072 [ 2943.924225][T29435] loop3: p1 < > p2 < > p4 [ 2943.931009][T29435] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2943.938768][T29443] loop1: p1 < > p2 < > p4 [ 2943.943198][T29443] loop1: partition table partially beyond EOD, truncated 17:12:10 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000fffffffe00200055aa", 0x40, 0x1c0}]) [ 2943.952521][T29443] loop1: p1 start 10 is beyond EOD, truncated [ 2943.958743][T29443] loop1: p2 size 2 extends beyond EOD, truncated [ 2943.967540][T29443] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2943.976262][T29449] loop5: detected capacity change from 0 to 1 17:12:11 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003c00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:11 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000004000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:11 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000050000000000000000200055aa", 0x40, 0x1c0}]) 17:12:11 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000079e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2944.020819][ T4998] loop5: p1 < > p2 < > p4 [ 2944.025285][ T4998] loop5: partition table partially beyond EOD, truncated [ 2944.032783][ T4998] loop5: p1 start 10 is beyond EOD, truncated [ 2944.038915][ T4998] loop5: p2 size 2 extends beyond EOD, truncated [ 2944.055863][ T4998] loop5: p4 start 4294967040 is beyond EOD, truncated [ 2944.058146][T29452] loop4: detected capacity change from 0 to 131072 [ 2944.081447][T29449] loop5: p1 < > p2 < > p4 [ 2944.084887][T29456] loop2: detected capacity change from 0 to 131072 [ 2944.085930][T29449] loop5: partition table partially beyond EOD, truncated [ 2944.093884][T29459] loop1: detected capacity change from 0 to 1 [ 2944.101050][T29449] loop5: p1 start 10 is beyond EOD, truncated [ 2944.111552][T29449] loop5: p2 size 2 extends beyond EOD, truncated [ 2944.119982][T29449] loop5: p4 start 4294967040 is beyond EOD, truncated [ 2944.122496][T29457] loop3: detected capacity change from 0 to 131072 [ 2944.163937][ T4230] loop2: p1 < > p2 < > p4 [ 2944.169180][ T4230] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2944.178356][T29456] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 2944.187518][ T3066] loop1: p1 < > p2 < > p4 [ 2944.192094][ T3066] loop1: partition table partially beyond EOD, truncated [ 2944.197566][ T1437] loop3: p1 < > p2 < > p4 [ 2944.201716][ T3066] loop1: p1 start 10 is beyond EOD, truncated 17:12:11 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000008000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:11 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000000003ff00200055aa", 0x40, 0x1c0}]) [ 2944.209620][ T3066] loop1: p2 size 2 extends beyond EOD, truncated [ 2944.221047][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2944.222977][ T3066] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2944.237898][T29459] loop1: p1 < > p2 < > p4 [ 2944.242323][T29459] loop1: partition table partially beyond EOD, truncated [ 2944.246561][T29462] loop5: detected capacity change from 0 to 1 [ 2944.250518][T29459] loop1: p1 start 10 is beyond EOD, truncated [ 2944.261529][T29459] loop1: p2 size 2 extends beyond EOD, truncated [ 2944.262739][T29457] loop3: p1 < > p2 < > p4 [ 2944.270010][T29459] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2944.285909][T29462] loop5: p1 < > p2 < > p4 [ 2944.288445][T29457] loop3: p4 size 2097152 extends beyond EOD, [ 2944.290384][T29462] loop5: partition table partially beyond EOD, [ 2944.290392][T29457] truncated [ 2944.296479][T29462] truncated [ 2944.299603][T29462] loop5: p1 start 10 is beyond EOD, 17:12:11 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003d00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:11 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000060000000000000000200055aa", 0x40, 0x1c0}]) [ 2944.307931][T29464] loop2: detected capacity change from 0 to 131072 [ 2944.309195][T29462] truncated [ 2944.309201][T29462] loop5: p2 size 2 extends beyond EOD, truncated [ 2944.337298][T29466] loop4: detected capacity change from 0 to 131072 [ 2944.344832][T29462] loop5: p4 start 50331648 is beyond EOD, truncated [ 2944.354508][T29464] loop2: p1 < > p2 < > p4 [ 2944.360863][T29464] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2944.399972][T29469] loop3: detected capacity change from 0 to 131072 [ 2944.456123][T29469] loop3: p1 < > p2 < > p4 [ 2944.462245][T29469] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2944.471942][ T1437] loop3: p1 < > p2 < > p4 [ 2944.477281][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:11 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000007ae525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:11 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003e00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:11 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000000fff00200055aa", 0x40, 0x1c0}]) 17:12:11 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000400008000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:11 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000070000000000000000200055aa", 0x40, 0x1c0}]) [ 2944.698914][T29473] loop2: detected capacity change from 0 to 131072 [ 2944.701732][T29479] loop1: detected capacity change from 0 to 1 [ 2944.707787][T29476] loop4: detected capacity change from 0 to 131072 [ 2944.716559][T29480] loop5: detected capacity change from 0 to 1 [ 2944.749606][T29478] loop3: detected capacity change from 0 to 131072 [ 2944.774387][ T4998] loop5: p1 < > p2 < > p4 [ 2944.778896][ T4998] loop5: partition table partially beyond EOD, truncated [ 2944.787507][T29479] loop1: p1 < > p2 < > p4 [ 2944.787625][T29478] loop3: p1 < > p2 < > p4 [ 2944.791976][T29479] loop1: partition table partially beyond EOD, truncated [ 2944.793562][T29479] loop1: p1 start 10 is beyond EOD, [ 2944.797822][ T4230] loop2: p1 < > p2 < > p3 p4 [ 2944.803475][T29479] truncated [ 2944.803480][T29479] loop1: p2 size 2 extends beyond EOD, truncated [ 2944.807067][T29479] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2944.841973][ T4998] loop5: p1 start 10 is beyond EOD, truncated 17:12:11 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000003f00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2944.843207][ T4230] loop2: p3 size 1073741824 extends beyond EOD, truncated [ 2944.848111][ T4998] loop5: p2 size 2 extends beyond EOD, truncated [ 2944.872408][ T4230] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2944.881701][ T4998] loop5: p4 start 251658240 is beyond EOD, truncated [ 2944.883348][T29486] loop4: detected capacity change from 0 to 131072 [ 2944.889952][T29478] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2944.903932][T29473] loop2: p1 < > p2 < > p3 p4 [ 2944.909386][T29480] loop5: p1 < > p2 < > p4 [ 2944.913848][T29480] loop5: partition table partially beyond EOD, truncated [ 2944.921560][T29480] loop5: p1 start 10 is beyond EOD, truncated [ 2944.927744][T29480] loop5: p2 size 2 extends beyond EOD, truncated 17:12:11 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000007be525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:12 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000ffffefff00200055aa", 0x40, 0x1c0}]) 17:12:12 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000080000000000000000200055aa", 0x40, 0x1c0}]) 17:12:12 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000004000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2944.946100][T29480] loop5: p4 start 251658240 is beyond EOD, truncated [ 2944.949236][T29473] loop2: p3 size 1073741824 extends beyond EOD, truncated [ 2944.971905][T29489] loop1: detected capacity change from 0 to 1 [ 2944.987229][T29473] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:12 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000010000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2945.017446][ T1437] loop1: p1 < > p2 < > p4 [ 2945.021896][ T1437] loop1: partition table partially beyond EOD, truncated [ 2945.034073][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2945.040245][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2945.052541][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2945.061837][T29492] loop5: detected capacity change from 0 to 1 [ 2945.071420][T29489] loop1: p1 < > p2 < > p4 [ 2945.073314][T29494] loop3: detected capacity change from 0 to 131072 [ 2945.075876][T29489] loop1: partition table partially beyond EOD, truncated [ 2945.077201][T29496] loop4: detected capacity change from 0 to 131072 [ 2945.085278][T29498] loop2: detected capacity change from 0 to 131072 [ 2945.090589][T29489] loop1: p1 start 10 is beyond EOD, truncated [ 2945.108703][T29489] loop1: p2 size 2 extends beyond EOD, truncated [ 2945.115573][T29489] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2945.144955][T29494] loop3: p1 < > p2 < > p4 [ 2945.145111][T29498] loop2: p1 < > p2 < > p4 [ 2945.153754][T29494] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2945.154296][ T1437] loop5: p1 < > p2 < > p4 [ 2945.165250][ T1437] loop5: partition table partially beyond EOD, truncated [ 2945.169202][T29498] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2945.179963][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2945.186097][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2945.195160][ T1437] loop5: p4 start 4026531584 is beyond EOD, truncated [ 2945.206824][T29492] loop5: p1 < > p2 < > p4 [ 2945.211364][T29492] loop5: partition table partially beyond EOD, truncated [ 2945.220504][T29492] loop5: p1 start 10 is beyond EOD, truncated [ 2945.226636][T29492] loop5: p2 size 2 extends beyond EOD, truncated [ 2945.234064][T29492] loop5: p4 start 4026531584 is beyond EOD, truncated [ 2945.241512][ T1437] loop5: p1 < > p2 < > p4 [ 2945.245983][ T1437] loop5: partition table partially beyond EOD, truncated [ 2945.253180][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2945.259301][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2945.266189][ T1437] loop5: p4 start 4026531584 is beyond EOD, truncated 17:12:12 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000007ce525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000021dc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:12:12 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000004800000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:12 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000090000000000000000200055aa", 0x40, 0x1c0}]) 17:12:12 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000020000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:12 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000080ffff00200055aa", 0x40, 0x1c0}]) [ 2945.599508][T29504] loop5: detected capacity change from 0 to 1 [ 2945.601479][T29509] loop1: detected capacity change from 0 to 1 [ 2945.622130][T29507] loop2: detected capacity change from 0 to 131072 [ 2945.632286][T29508] loop4: detected capacity change from 0 to 131072 [ 2945.646590][ T4634] loop1: p1 < > p2 < > p4 [ 2945.651103][ T4634] loop1: partition table partially beyond EOD, truncated [ 2945.665894][ T4634] loop1: p1 start 10 is beyond EOD, truncated [ 2945.671999][ T4634] loop1: p2 size 2 extends beyond EOD, truncated [ 2945.695779][T29504] loop5: p1 < > p2 < > p4 17:12:12 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000004c00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2945.700229][T29504] loop5: partition table partially beyond EOD, truncated [ 2945.710085][T29507] loop2: p1 < > p2 < > p4 [ 2945.714813][T29504] loop5: p1 start 10 is beyond EOD, truncated [ 2945.719742][ T4634] loop1: p4 size 2097152 extends beyond EOD, [ 2945.720871][T29504] loop5: p2 size 2 extends beyond EOD, truncated [ 2945.726960][ T4634] truncated [ 2945.730253][T29510] loop3: detected capacity change from 0 to 131072 17:12:12 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000040000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2945.760633][T29507] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2945.772817][T29509] loop1: p1 < > p2 < > p4 [ 2945.777306][T29509] loop1: partition table partially beyond EOD, truncated [ 2945.787249][T29516] loop4: detected capacity change from 0 to 131072 [ 2945.788662][T29509] loop1: p1 start 10 is beyond EOD, truncated [ 2945.799858][T29509] loop1: p2 size 2 extends beyond EOD, truncated 17:12:12 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000005400000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:12 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000007de525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2945.807936][T29509] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2945.815988][T29510] loop3: p1 < > p2 < > p4 [ 2945.816217][T29504] loop5: p4 start 4286578688 is beyond EOD, truncated [ 2945.834299][T29518] loop2: detected capacity change from 0 to 131072 17:12:12 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000ffefffff00200055aa", 0x40, 0x1c0}]) 17:12:12 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000a0000000000000000200055aa", 0x40, 0x1c0}]) [ 2945.870156][T29510] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2945.877789][T29518] loop2: p1 < > p2 < > p4 [ 2945.878757][T29523] loop1: detected capacity change from 0 to 1 [ 2945.888350][T29518] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2945.905891][T29521] loop4: detected capacity change from 0 to 131072 17:12:12 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffff80000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2945.924876][ T4634] loop1: p1 < > p2 < > p4 [ 2945.929472][ T4634] loop1: partition table partially beyond EOD, truncated [ 2945.942571][T29525] loop5: detected capacity change from 0 to 1 [ 2945.951168][ T4634] loop1: p1 start 10 is beyond EOD, truncated [ 2945.957427][ T4634] loop1: p2 size 2 extends beyond EOD, truncated [ 2945.965609][ T4634] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2945.981012][T29523] loop1: p1 < > p2 < > p4 [ 2945.985494][T29523] loop1: partition table partially beyond EOD, truncated [ 2945.990679][T29530] loop3: detected capacity change from 0 to 131072 [ 2945.993370][T29523] loop1: p1 start 10 is beyond EOD, truncated [ 2946.003807][ T4230] loop5: p1 < > p2 < > p4 [ 2946.005240][T29523] loop1: p2 size 2 extends beyond EOD, truncated [ 2946.009767][ T4230] loop5: partition table partially beyond EOD, truncated [ 2946.010039][ T4230] loop5: p1 start 10 is beyond EOD, [ 2946.019921][T29523] loop1: p4 size 2097152 extends beyond EOD, [ 2946.023176][ T4230] truncated [ 2946.023181][ T4230] loop5: p2 size 2 extends beyond EOD, [ 2946.028469][T29523] truncated [ 2946.034519][ T4230] truncated [ 2946.034795][T29529] loop2: detected capacity change from 0 to 131072 [ 2946.042127][ T4230] loop5: p4 start 4293918464 is beyond EOD, truncated [ 2946.064432][ T1437] loop5: p1 < > p2 < > p4 [ 2946.064647][T29530] loop3: p1 < > p2 < > p4 [ 2946.068884][ T1437] loop5: partition table partially beyond EOD, truncated [ 2946.069106][ T1437] loop5: p1 start 10 is beyond EOD, [ 2946.078790][T29530] loop3: p4 size 2097152 extends beyond EOD, [ 2946.080612][ T1437] truncated [ 2946.080618][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2946.089511][ T1437] loop5: p4 start 4293918464 is beyond EOD, [ 2946.092090][T29530] truncated [ 2946.095213][ T1437] truncated [ 2946.102748][T29525] loop5: p1 < > p2 < > p4 [ 2946.118370][T29525] loop5: partition table partially beyond EOD, truncated [ 2946.125570][T29525] loop5: p1 start 10 is beyond EOD, truncated [ 2946.131729][T29525] loop5: p2 size 2 extends beyond EOD, truncated [ 2946.138611][T29525] loop5: p4 start 4293918464 is beyond EOD, truncated 17:12:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x0) 17:12:13 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000005500000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:13 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000007ee525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:13 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000090000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:13 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000b0000000000000000200055aa", 0x40, 0x1c0}]) 17:12:13 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000fdfdffff00200055aa", 0x40, 0x1c0}]) [ 2946.496643][T29538] loop2: detected capacity change from 0 to 131072 [ 2946.508749][T29535] loop1: detected capacity change from 0 to 1 [ 2946.516793][T29533] loop4: detected capacity change from 0 to 131072 [ 2946.525012][T29542] loop5: detected capacity change from 0 to 1 [ 2946.561403][T29540] loop3: detected capacity change from 0 to 131072 [ 2946.569325][ T3066] loop5: p1 < > p2 < > p4 [ 2946.573792][ T3066] loop5: partition table partially beyond EOD, truncated [ 2946.581197][ T4998] loop2: p1 < > p2 < > p4 [ 2946.584537][T29535] loop1: p1 < > p2 < > p4 [ 2946.587649][ T4998] loop2: p4 size 2097152 extends beyond EOD, [ 2946.590076][T29535] loop1: partition table partially beyond EOD, truncated [ 2946.603272][T29535] loop1: p1 start 10 is beyond EOD, truncated 17:12:13 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000006000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2946.603226][ T4998] truncated [ 2946.604207][ T3066] loop5: p1 start 10 is beyond EOD, [ 2946.609408][T29535] loop1: p2 size 2 extends beyond EOD, [ 2946.612462][ T3066] truncated [ 2946.612468][ T3066] loop5: p2 size 2 extends beyond EOD, [ 2946.617749][T29535] truncated [ 2946.635037][ T3066] truncated [ 2946.641262][T29538] loop2: p1 < > p2 < > p4 [ 2946.643043][ T3066] loop5: p4 start 4294835456 is beyond EOD, truncated [ 2946.657110][T29542] loop5: p1 < > p2 < > p4 [ 2946.661546][T29542] loop5: partition table partially beyond EOD, truncated [ 2946.669611][T29538] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2946.679851][T29540] loop3: p1 < > p2 < > p4 [ 2946.684876][T29535] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2946.693296][T29542] loop5: p1 start 10 is beyond EOD, truncated [ 2946.699484][T29542] loop5: p2 size 2 extends beyond EOD, truncated 17:12:13 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000c0000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2946.709103][T29548] loop4: detected capacity change from 0 to 131072 [ 2946.719097][T29542] loop5: p4 start 4294835456 is beyond EOD, truncated [ 2946.727077][T29540] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:13 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000007fffffff00200055aa", 0x40, 0x1c0}]) 17:12:13 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000007fe525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:13 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000026000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2946.770592][T29550] loop2: detected capacity change from 0 to 131072 [ 2946.798520][T29552] loop5: detected capacity change from 0 to 1 [ 2946.807019][T29555] loop1: detected capacity change from 0 to 1 17:12:13 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000c0000000000000000200055aa", 0x40, 0x1c0}]) [ 2946.819003][T29550] loop2: p1 < > p2 < > p4 [ 2946.830838][T29550] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2946.853779][ T1437] loop5: p1 < > p2 < > p4 [ 2946.853805][T29555] loop1: p1 < > p2 < > p4 [ 2946.858223][ T1437] loop5: partition table partially beyond EOD, [ 2946.863130][T29555] loop1: partition table partially beyond EOD, [ 2946.863133][ T1437] truncated [ 2946.863139][T29555] truncated [ 2946.876631][T29555] loop1: p1 start 10 is beyond EOD, [ 2946.881680][ T1437] loop5: p1 start 10 is beyond EOD, [ 2946.881929][T29555] truncated [ 2946.881934][T29555] loop1: p2 size 2 extends beyond EOD, [ 2946.887224][ T1437] truncated [ 2946.892572][T29555] truncated [ 2946.907445][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2946.921902][T29559] loop3: detected capacity change from 0 to 131072 [ 2946.924113][ T1437] loop5: p4 start 4294934272 is beyond EOD, truncated [ 2946.928666][T29555] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2946.943915][ T1437] loop5: p1 < > p2 < > p4 [ 2946.948442][ T1437] loop5: partition table partially beyond EOD, truncated [ 2946.956733][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2946.962822][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2946.964647][T29559] loop3: p1 < > p2 < > p4 [ 2946.969803][ T1437] loop5: p4 start 4294934272 is beyond EOD, truncated [ 2946.978542][T29559] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2946.988106][T29552] loop5: p1 < > p2 < > p4 [ 2946.992568][T29552] loop5: partition table partially beyond EOD, truncated [ 2946.999757][T29552] loop5: p1 start 10 is beyond EOD, truncated [ 2947.005848][T29552] loop5: p2 size 2 extends beyond EOD, truncated [ 2947.012571][T29552] loop5: p4 start 4294934272 is beyond EOD, truncated 17:12:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x0) 17:12:14 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000010000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:14 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000006300000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:14 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000080e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:14 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000d0000000000000000200055aa", 0x40, 0x1c0}]) 17:12:14 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000080ffffff00200055aa", 0x40, 0x1c0}]) [ 2947.369198][T29569] loop5: detected capacity change from 0 to 1 [ 2947.377829][T29565] loop4: detected capacity change from 0 to 131072 [ 2947.380437][T29570] loop1: detected capacity change from 0 to 1 [ 2947.403211][T29571] loop2: detected capacity change from 0 to 131072 [ 2947.415097][T29570] loop1: p1 < > p2 < > p4 17:12:14 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000016700000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2947.419540][T29570] loop1: partition table partially beyond EOD, truncated [ 2947.442430][T29567] loop3: detected capacity change from 0 to 131072 [ 2947.451228][ T3068] loop5: p1 < > p2 < > p4 [ 2947.455813][ T3068] loop5: partition table partially beyond EOD, truncated [ 2947.479470][ T3068] loop5: p1 start 10 is beyond EOD, truncated [ 2947.485595][ T3068] loop5: p2 size 2 extends beyond EOD, truncated [ 2947.494686][ T4457] loop2: p1 < > p2 < > p4 [ 2947.500097][ T4457] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2947.504475][T29570] loop1: p1 start 10 is beyond EOD, truncated [ 2947.513026][T29570] loop1: p2 size 2 extends beyond EOD, truncated [ 2947.513824][ T3068] loop5: p4 start 4294934528 is beyond EOD, truncated [ 2947.530415][T29570] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2947.540035][T29569] loop5: p1 < > p2 < > p4 [ 2947.544534][T29569] loop5: partition table partially beyond EOD, truncated [ 2947.552490][T29569] loop5: p1 start 10 is beyond EOD, truncated [ 2947.552584][T29571] loop2: p1 < > p2 < > p4 [ 2947.558655][T29569] loop5: p2 size 2 extends beyond EOD, truncated [ 2947.564684][T29571] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:14 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000006800000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:14 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000020000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2947.571817][T29569] loop5: p4 start 4294934528 is beyond EOD, truncated [ 2947.585249][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 2947.595991][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory 17:12:14 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000081e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:14 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000081ffffff00200055aa", 0x40, 0x1c0}]) [ 2947.654172][T29567] loop3: p1 < > p2 < > p4 [ 2947.666343][T29579] loop4: detected capacity change from 0 to 131072 [ 2947.679576][T29583] loop1: detected capacity change from 0 to 1 [ 2947.689608][T29581] loop2: detected capacity change from 0 to 131072 [ 2947.698335][T29567] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2947.701693][T29585] loop5: detected capacity change from 0 to 1 [ 2947.725921][ T3068] loop2: p1 < > p2 < > p4 [ 2947.726537][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 2947.733660][ T3068] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2947.740529][T29583] loop1: p1 < > p2 < > p4 17:12:14 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000006c00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2947.751585][T29583] loop1: partition table partially beyond EOD, truncated [ 2947.754347][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 2947.776252][T29583] loop1: p1 start 10 is beyond EOD, truncated [ 2947.782392][T29583] loop1: p2 size 2 extends beyond EOD, truncated [ 2947.796690][T29581] loop2: p1 < > p2 < > p4 [ 2947.801474][T29583] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2947.802099][T29581] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2947.827298][ T4634] loop5: p1 < > p2 < > p4 [ 2947.831761][ T4634] loop5: partition table partially beyond EOD, truncated [ 2947.835058][T29588] loop4: detected capacity change from 0 to 131072 [ 2947.846761][ T4634] loop5: p1 start 10 is beyond EOD, truncated [ 2947.852861][ T4634] loop5: p2 size 2 extends beyond EOD, truncated [ 2947.855121][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 2947.868941][ T4634] loop5: p4 start 4294934784 is beyond EOD, truncated [ 2947.870210][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 2947.886026][T29585] loop5: p1 < > p2 < > p4 [ 2947.890445][T29585] loop5: partition table partially beyond EOD, truncated [ 2947.897725][T29585] loop5: p1 start 10 is beyond EOD, truncated [ 2947.903920][T29585] loop5: p2 size 2 extends beyond EOD, truncated [ 2947.906950][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 2947.917211][T29585] loop5: p4 start 4294934784 is beyond EOD, truncated [ 2947.923338][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 2948.016690][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 2948.035338][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory 17:12:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x0) 17:12:15 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000082e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:15 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000001020000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:15 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000e0000000000000000200055aa", 0x40, 0x1c0}]) 17:12:15 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000007400000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:15 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000082ffffff00200055aa", 0x40, 0x1c0}]) [ 2948.247814][T29591] loop1: detected capacity change from 0 to 1 [ 2948.253246][T29594] loop2: detected capacity change from 0 to 131072 [ 2948.271224][T29599] loop5: detected capacity change from 0 to 1 [ 2948.273968][T29595] loop4: detected capacity change from 0 to 131072 [ 2948.311874][T29598] loop3: detected capacity change from 0 to 131072 [ 2948.334268][T29591] loop1: p1 < > p2 < > p4 [ 2948.338747][T29591] loop1: partition table partially beyond EOD, truncated [ 2948.347117][T29599] loop5: p1 < > p2 < > p4 [ 2948.351565][T29599] loop5: partition table partially beyond EOD, truncated 17:12:15 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000007a00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2948.359919][ T4230] loop2: p1 < > p2 < > p4 [ 2948.360174][T29591] loop1: p1 start 10 is beyond EOD, truncated [ 2948.370465][T29591] loop1: p2 size 2 extends beyond EOD, truncated [ 2948.380224][ T4230] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2948.381120][T29598] loop3: p1 < > p2 < > p4 [ 2948.390716][T29599] loop5: p1 start 10 is beyond EOD, truncated [ 2948.397012][T29598] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2948.397793][T29599] loop5: p2 size 2 extends beyond EOD, truncated [ 2948.406340][T29591] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2948.426945][T29594] loop2: p1 < > p2 < > p4 [ 2948.445117][T29605] loop4: detected capacity change from 0 to 131072 [ 2948.451990][T29599] loop5: p4 start 4294935040 is beyond EOD, truncated 17:12:15 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000f0000000000000000200055aa", 0x40, 0x1c0}]) [ 2948.454682][T29594] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:15 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000085ffffff00200055aa", 0x40, 0x1c0}]) 17:12:15 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000004020000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:15 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000008900000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:15 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000083e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2948.548657][T29610] loop5: detected capacity change from 0 to 1 [ 2948.576130][T29615] loop2: detected capacity change from 0 to 131072 [ 2948.578024][T29608] loop3: detected capacity change from 0 to 131072 [ 2948.586878][T29618] loop1: detected capacity change from 0 to 1 [ 2948.596165][T29614] loop4: detected capacity change from 0 to 131072 [ 2948.604477][ T1437] loop5: p1 < > p2 < > p4 [ 2948.604685][T29615] loop2: p1 < > p2 < > p4 [ 2948.608938][ T1437] loop5: partition table partially beyond EOD, truncated [ 2948.609004][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2948.609017][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2948.609536][T29608] loop3: p1 < > p2 < > p4 [ 2948.614692][T29615] loop2: p4 size 2097152 extends beyond EOD, [ 2948.620875][ T1437] loop5: p4 start 4294935808 is beyond EOD, [ 2948.626617][T29615] truncated [ 2948.634667][T29608] loop3: p4 size 2097152 extends beyond EOD, [ 2948.637342][ T1437] truncated [ 2948.644007][T29618] loop1: p1 < > p2 < > p4 [ 2948.649664][T29608] truncated [ 2948.650653][T29610] loop5: p1 < > p2 < > p4 [ 2948.652799][T29618] loop1: partition table partially beyond EOD, [ 2948.658881][T29610] loop5: partition table partially beyond EOD, [ 2948.662001][T29618] truncated [ 2948.662683][T29618] loop1: p1 start 10 is beyond EOD, [ 2948.666476][T29610] truncated [ 2948.676592][T29610] loop5: p1 start 10 is beyond EOD, [ 2948.680216][T29618] truncated [ 2948.680222][T29618] loop1: p2 size 2 extends beyond EOD, [ 2948.686464][T29610] truncated [ 2948.689539][T29618] truncated [ 2948.694806][T29610] loop5: p2 size 2 extends beyond EOD, [ 2948.701972][T29618] loop1: p4 size 2097152 extends beyond EOD, [ 2948.703232][T29610] truncated [ 2948.728688][T29610] loop5: p4 start 4294935808 is beyond EOD, [ 2948.729832][T29618] truncated [ 2948.742075][T29610] truncated 17:12:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000021dc0), 0x0, 0x0) 17:12:16 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000030000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:16 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000009000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:16 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000008cffffff00200055aa", 0x40, 0x1c0}]) 17:12:16 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000084e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:16 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000100000000000000000200055aa", 0x40, 0x1c0}]) [ 2949.154266][T29622] loop1: detected capacity change from 0 to 1 [ 2949.156091][T29628] loop2: detected capacity change from 0 to 131072 [ 2949.176248][T29627] loop5: detected capacity change from 0 to 1 [ 2949.182164][T29626] loop3: detected capacity change from 0 to 131072 [ 2949.185440][T29629] loop4: detected capacity change from 0 to 131072 [ 2949.224142][ T4230] loop1: p1 < > p2 < > p4 [ 2949.228614][ T4230] loop1: partition table partially beyond EOD, truncated [ 2949.237403][ T4998] loop3: p1 < > p2 < > p4 [ 2949.241971][ T4457] loop2: p1 < > p2 < > p4 [ 2949.246829][T29627] loop5: p1 < > p2 < > p4 [ 2949.251265][T29627] loop5: partition table partially beyond EOD, truncated [ 2949.262186][ T4457] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:16 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000059c00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2949.269545][ T4998] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2949.273659][T29627] loop5: p1 start 10 is beyond EOD, truncated [ 2949.282478][T29627] loop5: p2 size 2 extends beyond EOD, truncated [ 2949.299843][T29628] loop2: p1 < > p2 < > p4 [ 2949.301683][ T4230] loop1: p1 start 10 is beyond EOD, truncated [ 2949.309450][T29626] loop3: p1 < > p2 < > p4 [ 2949.310348][ T4230] loop1: p2 size 2 extends beyond EOD, truncated [ 2949.321712][ T4230] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2949.323271][T29627] loop5: p4 start 4294937600 is beyond EOD, truncated [ 2949.335220][T29636] loop4: detected capacity change from 0 to 131072 [ 2949.337587][T29628] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2949.350826][T29622] loop1: p1 < > p2 < > p4 [ 2949.355289][T29622] loop1: partition table partially beyond EOD, truncated [ 2949.363570][T29622] loop1: p1 start 10 is beyond EOD, truncated 17:12:16 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000002bc00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2949.369659][T29622] loop1: p2 size 2 extends beyond EOD, truncated [ 2949.383022][T29626] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2949.393711][T29622] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:16 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000085e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:16 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000097ffffff00200055aa", 0x40, 0x1c0}]) 17:12:16 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000110000000000000000200055aa", 0x40, 0x1c0}]) 17:12:16 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000040000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2949.492113][T29642] loop1: detected capacity change from 0 to 1 [ 2949.512247][T29643] loop5: detected capacity change from 0 to 1 [ 2949.523174][T29645] loop2: detected capacity change from 0 to 131072 [ 2949.526263][ T3068] loop1: p1 < > p2 < > p4 [ 2949.534191][ T3068] loop1: partition table partially beyond EOD, truncated [ 2949.542601][ T3068] loop1: p1 start 10 is beyond EOD, truncated [ 2949.548722][ T3068] loop1: p2 size 2 extends beyond EOD, truncated [ 2949.548835][T29647] loop3: detected capacity change from 0 to 131072 [ 2949.557358][ T3068] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2949.563919][T29643] loop5: p1 < > p2 < > p4 [ 2949.573099][T29643] loop5: partition table partially beyond EOD, truncated [ 2949.580363][T29643] loop5: p1 start 10 is beyond EOD, truncated [ 2949.581228][ T1437] loop1: p1 < > p2 < > p4 [ 2949.586566][T29643] loop5: p2 size 2 extends beyond EOD, [ 2949.590937][ T1437] loop1: partition table partially beyond EOD, [ 2949.590937][T29643] truncated [ 2949.596530][ T1437] truncated [ 2949.597194][ T1437] loop1: p1 start 10 is beyond EOD, [ 2949.606051][T29643] loop5: p4 start 4294940416 is beyond EOD, [ 2949.609039][ T1437] truncated [ 2949.609045][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2949.609527][T29645] loop2: p1 < > p2 < > p4 [ 2949.614400][T29643] truncated [ 2949.615964][ T1437] loop1: p4 size 2097152 extends beyond EOD, [ 2949.621374][T29647] loop3: p1 < > p2 < > p4 [ 2949.623485][ T1437] truncated [ 2949.625038][T29645] loop2: p4 size 2097152 extends beyond EOD, [ 2949.633622][T29642] loop1: p1 < > p2 < > p4 [ 2949.634442][T29645] truncated [ 2949.637532][T29642] loop1: partition table partially beyond EOD, [ 2949.647600][T29647] loop3: p4 size 2097152 extends beyond EOD, [ 2949.648009][T29642] truncated [ 2949.649955][T29642] loop1: p1 start 10 is beyond EOD, [ 2949.651150][T29647] truncated [ 2949.657228][T29642] truncated [ 2949.657236][T29642] loop1: p2 size 2 extends beyond EOD, truncated [ 2949.658714][T29642] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000021dc0), 0x0, 0x0) 17:12:17 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000c000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:17 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000a1ffffff00200055aa", 0x40, 0x1c0}]) 17:12:17 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000086e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:17 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000050000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:17 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000120000000000000000200055aa", 0x40, 0x1c0}]) [ 2950.040425][T29658] loop1: detected capacity change from 0 to 1 [ 2950.041338][T29659] loop5: detected capacity change from 0 to 1 [ 2950.046775][T29653] loop4: detected capacity change from 0 to 131072 [ 2950.064783][T29651] loop2: detected capacity change from 0 to 131072 [ 2950.074181][T29660] loop3: detected capacity change from 0 to 131072 [ 2950.125124][ T4457] loop5: p1 < > p2 < > p4 [ 2950.129570][ T4457] loop5: partition table partially beyond EOD, truncated [ 2950.136997][ T4856] loop2: p1 < > p2 < > p4 [ 2950.141650][T29660] loop3: p1 < > p2 < > p4 [ 2950.147092][T29658] loop1: p1 < > p2 < > p4 [ 2950.151539][T29658] loop1: partition table partially beyond EOD, truncated [ 2950.164903][ T4856] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:17 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000001c000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2950.186050][T29658] loop1: p1 start 10 is beyond EOD, truncated [ 2950.189070][T29660] loop3: p4 size 2097152 extends beyond EOD, [ 2950.192149][T29658] loop1: p2 size 2 extends beyond EOD, truncated [ 2950.199493][ T4457] loop5: p1 start 10 is beyond EOD, truncated [ 2950.204715][T29660] truncated [ 2950.213890][ T4457] loop5: p2 size 2 extends beyond EOD, truncated [ 2950.224004][T29651] loop2: p1 < > p2 < > p4 [ 2950.229081][T29658] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:17 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000001c0000000000000000200055aa", 0x40, 0x1c0}]) [ 2950.245142][T29665] loop4: detected capacity change from 0 to 131072 [ 2950.255097][T29651] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2950.276332][ T4457] loop5: p4 start 4294942976 is beyond EOD, truncated 17:12:17 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000087e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:17 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000060000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2950.295926][T29659] loop5: p1 < > p2 < > p4 [ 2950.300370][T29659] loop5: partition table partially beyond EOD, truncated 17:12:17 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000005c200000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2950.340592][T29670] loop1: detected capacity change from 0 to 1 [ 2950.340820][T29659] loop5: p1 start 10 is beyond EOD, truncated [ 2950.352912][T29659] loop5: p2 size 2 extends beyond EOD, truncated [ 2950.362032][T29659] loop5: p4 start 4294942976 is beyond EOD, truncated [ 2950.377402][T29668] loop3: detected capacity change from 0 to 131072 17:12:17 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000a5ffffff00200055aa", 0x40, 0x1c0}]) [ 2950.398443][T29673] loop2: detected capacity change from 0 to 131072 [ 2950.408246][T29670] loop1: p1 < > p2 < > p4 [ 2950.412678][T29670] loop1: partition table partially beyond EOD, truncated [ 2950.424039][ T4230] loop3: p1 < > p2 < > p4 [ 2950.431415][T29675] loop4: detected capacity change from 0 to 131072 [ 2950.432100][ T4856] loop2: p1 < > p2 < > p4 [ 2950.441266][ T4230] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2950.449924][ T4856] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2950.465046][T29668] loop3: p1 < > p2 < > p4 [ 2950.479196][T29673] loop2: p1 < > p2 < > p4 [ 2950.485840][T29670] loop1: p1 start 10 is beyond EOD, truncated [ 2950.487714][T29678] loop5: detected capacity change from 0 to 1 [ 2950.491930][T29670] loop1: p2 size 2 extends beyond EOD, truncated [ 2950.508540][T29673] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2950.516938][ T4998] loop5: p1 < > p2 < > p4 [ 2950.521400][ T4998] loop5: partition table partially beyond EOD, truncated [ 2950.529421][T29668] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2950.536360][ T4998] loop5: p1 start 10 is beyond EOD, truncated [ 2950.542680][ T4998] loop5: p2 size 2 extends beyond EOD, truncated [ 2950.572149][T29670] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2950.582306][ T4998] loop5: p4 start 4294944000 is beyond EOD, truncated [ 2950.606565][T29678] loop5: p1 < > p2 < > p4 [ 2950.611013][T29678] loop5: partition table partially beyond EOD, truncated [ 2950.643771][T29678] loop5: p1 start 10 is beyond EOD, truncated [ 2950.649944][T29678] loop5: p2 size 2 extends beyond EOD, truncated [ 2950.660114][T29678] loop5: p4 start 4294944000 is beyond EOD, truncated 17:12:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000000d200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000021dc0), 0x0, 0x0) 17:12:17 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000dc00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:17 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000004060000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:17 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000250000000000000000200055aa", 0x40, 0x1c0}]) 17:12:17 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000088e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:17 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000a6ffffff00200055aa", 0x40, 0x1c0}]) [ 2950.947040][T29687] loop1: detected capacity change from 0 to 1 [ 2950.973105][T29690] loop5: detected capacity change from 0 to 1 [ 2950.984274][T29680] loop4: detected capacity change from 0 to 131072 [ 2951.002169][T29682] loop2: detected capacity change from 0 to 131072 [ 2951.004757][T29687] loop1: p1 < > p2 < > p4 [ 2951.013121][T29687] loop1: partition table partially beyond EOD, truncated [ 2951.039303][T29684] loop3: detected capacity change from 0 to 131072 [ 2951.047271][ T4998] loop2: p1 < > p2 < > p4 [ 2951.052630][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2951.061617][T29687] loop1: p1 start 10 is beyond EOD, truncated [ 2951.067743][T29687] loop1: p2 size 2 extends beyond EOD, truncated [ 2951.077404][T29690] loop5: p1 < > p2 < > p4 [ 2951.077606][T29682] loop2: p1 < > p2 < > p4 [ 2951.081863][T29690] loop5: partition table partially beyond EOD, truncated [ 2951.082093][T29690] loop5: p1 start 10 is beyond EOD, truncated 17:12:18 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000001e600000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2951.099658][T29690] loop5: p2 size 2 extends beyond EOD, truncated [ 2951.109140][T29682] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2951.109516][T29687] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2951.124957][T29690] loop5: p4 start 4294944256 is beyond EOD, truncated 17:12:18 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000070000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:18 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000ec00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2951.149602][T29684] loop3: p1 < > p2 < > p4 [ 2951.153141][T29695] loop4: detected capacity change from 0 to 131072 17:12:18 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000a9ffffff00200055aa", 0x40, 0x1c0}]) 17:12:18 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000089e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2951.208925][T29684] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2951.230991][T29698] loop2: detected capacity change from 0 to 131072 [ 2951.249484][T29700] loop4: detected capacity change from 0 to 131072 [ 2951.250120][T29705] loop1: detected capacity change from 0 to 1 [ 2951.265690][T29704] loop5: detected capacity change from 0 to 1 17:12:18 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000003ff00000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2951.324216][T29704] loop5: p1 < > p2 < > p4 [ 2951.328671][T29704] loop5: partition table partially beyond EOD, truncated [ 2951.338684][T29704] loop5: p1 start 10 is beyond EOD, truncated [ 2951.344835][T29704] loop5: p2 size 2 extends beyond EOD, truncated [ 2951.351836][ T4998] loop2: p1 < > p2 < > p4 [ 2951.354934][T29704] loop5: p4 start 4294945024 is beyond EOD, truncated [ 2951.363390][T29705] loop1: p1 < > p2 < > p4 [ 2951.367844][T29705] loop1: partition table partially beyond EOD, truncated [ 2951.374441][T29708] loop4: detected capacity change from 0 to 131072 [ 2951.377551][T29705] loop1: p1 start 10 is beyond EOD, truncated [ 2951.387492][T29705] loop1: p2 size 2 extends beyond EOD, truncated [ 2951.394059][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2951.395895][T29705] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2951.412160][T29698] loop2: p1 < > p2 < > p4 [ 2951.417949][T29698] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:18 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000bfffffff00200055aa", 0x40, 0x1c0}]) 17:12:18 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000008ae525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:18 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000fff00000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:18 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000260000000000000000200055aa", 0x40, 0x1c0}]) 17:12:18 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000080000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:18 executing program 0: r0 = socket(0x2, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) [ 2951.817729][T29717] loop5: detected capacity change from 0 to 1 [ 2951.820530][T29713] loop1: detected capacity change from 0 to 1 [ 2951.831152][T29711] loop4: detected capacity change from 0 to 131072 [ 2951.836293][T29720] loop2: detected capacity change from 0 to 131072 17:12:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 2951.841522][ T24] audit: type=1400 audit(1640106738.857:417): avc: denied { ioctl } for pid=29719 comm="syz-executor.0" path="socket:[478262]" dev="sockfs" ino=478262 ioctlcmd=0x89f8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 17:12:18 executing program 0: socketpair(0xa, 0x1, 0x0, &(0x7f0000000400)) [ 2951.894363][T29713] loop1: p1 < > p2 < > p4 [ 2951.898809][T29713] loop1: partition table partially beyond EOD, truncated [ 2951.906359][ T4457] loop5: p1 < > p2 < > p4 [ 2951.911027][ T4457] loop5: partition table partially beyond EOD, truncated [ 2951.918910][T29718] loop3: detected capacity change from 0 to 131072 [ 2951.919999][ T4230] loop2: p1 < > p2 < > p4 [ 2951.930152][T29713] loop1: p1 start 10 is beyond EOD, truncated [ 2951.933408][ T4230] loop2: p4 size 2097152 extends beyond EOD, 17:12:18 executing program 0: io_uring_setup(0x1d96, &(0x7f0000000480)={0x0, 0x684d, 0xd}) 17:12:19 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000f8ff01000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2951.936278][T29713] loop1: p2 size 2 extends beyond EOD, truncated [ 2951.936267][ T4230] truncated [ 2951.953774][T29713] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2951.959567][ T4457] loop5: p1 start 10 is beyond EOD, truncated [ 2951.966745][ T4457] loop5: p2 size 2 extends beyond EOD, truncated 17:12:19 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001400000008000300", @ANYBLOB="080003"], 0x2c}}, 0x0) 17:12:19 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, 0x0) [ 2951.993610][ T4457] loop5: p4 start 4294950656 is beyond EOD, truncated [ 2952.003294][T29720] loop2: p1 < > p2 < > p4 [ 2952.008175][ T4856] loop3: p1 < > p2 < > p4 [ 2952.010143][T29734] __nla_validate_parse: 11 callbacks suppressed [ 2952.010155][T29734] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2952.014543][ T4856] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2952.035300][T29732] loop4: detected capacity change from 0 to 131072 [ 2952.038946][T29720] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2952.060338][T29717] loop5: p1 < > p2 < > p4 [ 2952.064797][T29717] loop5: partition table partially beyond EOD, truncated [ 2952.082393][T29718] loop3: p1 < > p2 < > p4 [ 2952.100329][T29717] loop5: p1 start 10 is beyond EOD, truncated [ 2952.106466][T29717] loop5: p2 size 2 extends beyond EOD, truncated [ 2952.133460][T29717] loop5: p4 start 4294950656 is beyond EOD, truncated 17:12:19 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000c9ffffff00200055aa", 0x40, 0x1c0}]) 17:12:19 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000008be525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:19 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000090000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2952.142298][ T24] audit: type=1326 audit(1640106739.147:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29735 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f150c8f0e99 code=0x0 [ 2952.166526][T29718] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2952.213320][T29741] loop1: detected capacity change from 0 to 1 [ 2952.219757][T29740] loop2: detected capacity change from 0 to 131072 [ 2952.230209][T29743] loop5: detected capacity change from 0 to 1 17:12:19 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000002e0000000000000000200055aa", 0x40, 0x1c0}]) 17:12:19 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffff01000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:19 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x5450, 0x0) [ 2952.266372][T29741] loop1: p1 < > p2 < > p4 [ 2952.270917][T29741] loop1: partition table partially beyond EOD, truncated [ 2952.278802][T29741] loop1: p1 start 10 is beyond EOD, truncated [ 2952.284933][T29741] loop1: p2 size 2 extends beyond EOD, truncated [ 2952.292131][T29740] loop2: p1 < > p2 < > p4 [ 2952.314935][ T24] audit: type=1326 audit(1640106739.337:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29746 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f150c8f0e99 code=0x0 [ 2952.339248][T29741] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2952.340696][ T4457] loop5: p1 < > p2 < > p4 [ 2952.350645][ T4457] loop5: partition table partially beyond EOD, truncated 17:12:19 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000008ce525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2952.361736][T29748] loop4: detected capacity change from 0 to 131072 [ 2952.368532][T29740] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2952.374215][ T4457] loop5: p1 start 10 is beyond EOD, truncated [ 2952.381639][ T4457] loop5: p2 size 2 extends beyond EOD, truncated [ 2952.389298][ T4457] loop5: p4 start 4294953216 is beyond EOD, truncated [ 2952.400184][T29743] loop5: p1 < > p2 < > p4 [ 2952.404683][T29743] loop5: partition table partially beyond EOD, truncated 17:12:19 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000002000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2952.412183][T29743] loop5: p1 start 10 is beyond EOD, truncated [ 2952.418320][T29743] loop5: p2 size 2 extends beyond EOD, truncated [ 2952.454161][T29754] loop1: detected capacity change from 0 to 1 [ 2952.458982][T29743] loop5: p4 start 4294953216 is beyond EOD, truncated 17:12:19 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000e4ffffff00200055aa", 0x40, 0x1c0}]) 17:12:19 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000a0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2952.478431][T29751] loop3: detected capacity change from 0 to 131072 [ 2952.514880][T29757] loop4: detected capacity change from 0 to 131072 [ 2952.516311][T29754] loop1: p1 < > p2 < > p4 [ 2952.525861][T29754] loop1: partition table partially beyond EOD, truncated [ 2952.547570][T29754] loop1: p1 start 10 is beyond EOD, truncated [ 2952.552411][T29760] loop5: detected capacity change from 0 to 1 [ 2952.553723][T29754] loop1: p2 size 2 extends beyond EOD, truncated [ 2952.559695][T29762] loop2: detected capacity change from 0 to 131072 [ 2952.565885][T29754] loop1: p4 size 2097152 extends beyond EOD, [ 2952.568373][T29751] loop3: p1 < > p2 < > p4 [ 2952.572802][T29754] truncated [ 2952.589761][T29757] loop4: p1 < > p2 < > p4 [ 2952.591598][T29751] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2952.594522][ T1437] loop2: p1 < > p2 < > p4 [ 2952.607064][T29760] loop5: p1 < > p2 < > p4 [ 2952.611513][T29760] loop5: partition table partially beyond EOD, truncated [ 2952.613451][T29757] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:19 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000008de525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2952.619992][T29760] loop5: p1 start 10 is beyond EOD, truncated [ 2952.630149][ T1437] loop2: p4 size 2097152 extends beyond EOD, [ 2952.631621][T29760] loop5: p2 size 2 extends beyond EOD, truncated [ 2952.633294][T29760] loop5: p4 start 4294960128 is beyond EOD, [ 2952.637727][ T1437] truncated [ 2952.645970][ T1437] loop2: p1 < > p2 < > p4 [ 2952.650059][T29760] truncated [ 2952.661943][ T1437] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2952.668758][T29764] loop1: detected capacity change from 0 to 1 17:12:19 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000480000000000000000200055aa", 0x40, 0x1c0}]) 17:12:19 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000b0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:19 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffff03000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:19 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000eeffffff00200055aa", 0x40, 0x1c0}]) [ 2952.678046][T29762] loop2: p1 < > p2 < > p4 [ 2952.683347][T29762] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2952.715461][T29764] loop1: p1 < > p2 < > p4 [ 2952.719891][T29764] loop1: partition table partially beyond EOD, truncated [ 2952.740363][T29770] loop4: detected capacity change from 0 to 131072 [ 2952.745679][T29772] loop5: detected capacity change from 0 to 1 [ 2952.751544][T29767] loop3: detected capacity change from 0 to 131072 [ 2952.753342][T29764] loop1: p1 start 10 is beyond EOD, truncated [ 2952.765771][T29764] loop1: p2 size 2 extends beyond EOD, truncated [ 2952.774933][T29764] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:19 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000004000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2952.775560][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 2952.782777][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 2952.803436][ T4634] loop3: p1 < > p2 < > p4 [ 2952.805535][T29774] loop2: detected capacity change from 0 to 131072 [ 2952.811795][T29772] loop5: p1 < > p2 < > p4 [ 2952.818826][T29772] loop5: partition table partially beyond EOD, truncated [ 2952.827931][ T4634] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:19 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000400008000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2952.837659][T29772] loop5: p1 start 10 is beyond EOD, truncated [ 2952.843782][T29772] loop5: p2 size 2 extends beyond EOD, truncated [ 2952.850547][T29772] loop5: p4 start 4294962688 is beyond EOD, truncated [ 2952.853463][T29767] loop3: p1 < > p2 < > p4 [ 2952.858584][T29774] loop2: p1 < > p2 < > p4 [ 2952.867458][T29767] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2952.868262][T29774] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2952.918892][T29780] loop4: detected capacity change from 0 to 131072 [ 2952.966032][ T1437] loop4: p1 < > p2 < > p3 p4 [ 2952.971736][ T1437] loop4: p3 size 1073741824 extends beyond EOD, truncated [ 2952.979581][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2952.988968][ T1437] loop4: p1 < > p2 < > p3 p4 [ 2952.994371][ T1437] loop4: p3 size 1073741824 extends beyond EOD, truncated [ 2953.001807][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2953.010932][T29780] loop4: p1 < > p2 < > p3 p4 [ 2953.016708][T29780] loop4: p3 size 1073741824 extends beyond EOD, truncated [ 2953.024659][T29780] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2953.041410][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 2953.042624][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 2953.052879][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 2953.085874][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory 17:12:20 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1004, &(0x7f0000000780)) 17:12:20 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000008ee525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:20 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000f6ffffff00200055aa", 0x40, 0x1c0}]) [ 2953.113564][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop5p2, 10) failed: No such file or directory [ 2953.116804][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop5p4, 10) failed: No such file or directory [ 2953.149563][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory 17:12:20 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000004c0000000000000000200055aa", 0x40, 0x1c0}]) 17:12:20 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000c0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:20 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000010000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2953.162059][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 2953.180502][T29785] loop1: detected capacity change from 0 to 1 [ 2953.182615][T29790] loop5: detected capacity change from 0 to 1 [ 2953.206026][T29789] loop4: detected capacity change from 0 to 131072 17:12:20 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1004, &(0x7f0000000780)) [ 2953.222691][T29791] loop2: detected capacity change from 0 to 131072 [ 2953.234859][ T4230] loop1: p1 < > p2 < > p4 [ 2953.239308][ T4230] loop1: partition table partially beyond EOD, truncated [ 2953.249628][T29788] loop3: detected capacity change from 0 to 131072 [ 2953.259572][ T4230] loop1: p1 start 10 is beyond EOD, truncated [ 2953.265872][ T4230] loop1: p2 size 2 extends beyond EOD, truncated [ 2953.274685][T29789] loop4: p1 < > p2 < > p4 [ 2953.274680][ T4998] loop5: p1 < > p2 < > p4 [ 2953.283549][ T4998] loop5: partition table partially beyond EOD, truncated [ 2953.290633][ T4856] loop2: p1 < > p2 < > p4 [ 2953.302812][ T4856] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2953.306070][T29789] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2953.310138][ T4998] loop5: p1 start 10 is beyond EOD, truncated 17:12:20 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1004, &(0x7f0000000780)) [ 2953.320056][ T4230] loop1: p4 size 2097152 extends beyond EOD, [ 2953.322799][ T4998] loop5: p2 size 2 extends beyond EOD, truncated [ 2953.335257][ T4230] truncated [ 2953.355819][T29791] loop2: p1 < > p2 < > p4 [ 2953.361056][ T4998] loop5: p4 start 4294964736 is beyond EOD, truncated [ 2953.369485][T29788] loop3: p1 < > p2 < > p4 17:12:20 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000020000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2953.378167][T29790] loop5: p1 < > p2 < > p4 [ 2953.382612][T29790] loop5: partition table partially beyond EOD, truncated [ 2953.385562][T29791] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2953.406673][T29790] loop5: p1 start 10 is beyond EOD, truncated [ 2953.412857][T29790] loop5: p2 size 2 extends beyond EOD, truncated [ 2953.421185][T29788] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:20 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000d0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:20 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1004, &(0x7f0000000780)) 17:12:20 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000fbffffff00200055aa", 0x40, 0x1c0}]) [ 2953.422272][T29785] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 2953.438001][T29790] loop5: p4 start 4294964736 is beyond EOD, truncated [ 2953.448641][T29801] loop4: detected capacity change from 0 to 131072 17:12:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0162) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unshare(0x62020400) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\t\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xee#\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\b\x01\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') socket$inet_udplite(0x2, 0x2, 0x88) [ 2953.492256][T29806] loop2: detected capacity change from 0 to 131072 [ 2953.507499][T29801] loop4: p1 < > p2 < > p4 17:12:20 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000008fe525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:20 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000540000000000000000200055aa", 0x40, 0x1c0}]) [ 2953.542333][T29808] loop5: detected capacity change from 0 to 1 [ 2953.549322][T29801] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2953.557169][T29806] loop2: p1 < > p2 < > p4 [ 2953.572463][T29806] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2953.597315][T29811] loop1: detected capacity change from 0 to 1 [ 2953.628033][T29815] loop3: detected capacity change from 0 to 131072 [ 2953.636578][T29811] loop1: p1 < > p2 < > p4 [ 2953.641044][T29811] loop1: partition table partially beyond EOD, truncated [ 2953.663625][T29811] loop1: p1 start 10 is beyond EOD, truncated [ 2953.669743][T29811] loop1: p2 size 2 extends beyond EOD, truncated [ 2953.678933][T29817] device lo entered promiscuous mode [ 2953.682422][T29808] loop5: p1 < > p2 < > p4 [ 2953.688716][T29808] loop5: partition table partially beyond EOD, truncated 17:12:20 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000040000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:20 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000e0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2953.717631][T29808] loop5: p1 start 10 is beyond EOD, truncated [ 2953.723769][T29808] loop5: p2 size 2 extends beyond EOD, truncated [ 2953.735862][T29815] loop3: p1 < > p2 < > p4 [ 2953.744852][T29811] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2953.752768][T29808] loop5: p4 start 4294966016 is beyond EOD, truncated 17:12:20 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000090e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2953.766286][T29819] loop4: detected capacity change from 0 to 131072 [ 2953.776386][T29815] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2953.800671][T29821] loop2: detected capacity change from 0 to 131072 17:12:20 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000fdffffff00200055aa", 0x40, 0x1c0}]) 17:12:20 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000550000000000000000200055aa", 0x40, 0x1c0}]) [ 2953.824910][T29819] loop4: p1 < > p2 < > p4 [ 2953.835542][T29819] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2953.849593][T29823] loop1: detected capacity change from 0 to 1 [ 2953.866326][T29821] loop2: p1 < > p2 < > p4 17:12:20 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffff80000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2953.885907][T29821] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2953.893995][ T4856] loop1: p1 < > p2 < > p4 [ 2953.898443][ T4856] loop1: partition table partially beyond EOD, truncated [ 2953.909309][T29825] loop5: detected capacity change from 0 to 1 [ 2953.920955][ T4856] loop1: p1 start 10 is beyond EOD, truncated [ 2953.927084][ T4856] loop1: p2 size 2 extends beyond EOD, truncated 17:12:21 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000091e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2953.946472][ T4856] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2953.951098][T29831] loop4: detected capacity change from 0 to 131072 [ 2953.960000][T29823] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 2953.975950][T29825] loop5: p1 < > p2 < > p4 [ 2953.980383][T29825] loop5: partition table partially beyond EOD, truncated [ 2953.983407][T29828] loop3: detected capacity change from 0 to 131072 17:12:21 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000f0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:21 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000090000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2953.992917][T29825] loop5: p1 start 10 is beyond EOD, truncated [ 2954.000175][T29825] loop5: p2 size 2 extends beyond EOD, truncated [ 2954.022855][T29833] loop1: detected capacity change from 0 to 1 [ 2954.024634][T29828] loop3: p1 < > p2 < > p4 [ 2954.034324][T29835] loop2: detected capacity change from 0 to 131072 [ 2954.041553][T29825] loop5: p4 start 4294966528 is beyond EOD, truncated [ 2954.044309][T29828] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2954.060215][ T4998] loop1: p1 < > p2 < > p4 [ 2954.064692][ T4998] loop1: partition table partially beyond EOD, truncated [ 2954.074107][ T4998] loop1: p1 start 10 is beyond EOD, truncated [ 2954.079097][ T4230] loop2: p1 < > p2 < > p4 [ 2954.080254][ T4998] loop1: p2 size 2 extends beyond EOD, truncated [ 2954.096703][ T4998] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2954.102968][ T4230] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2954.114482][T29833] loop1: p1 < > p2 < > p4 [ 2954.118910][T29833] loop1: partition table partially beyond EOD, truncated [ 2954.139074][T29837] loop4: detected capacity change from 0 to 131072 [ 2954.141615][T29833] loop1: p1 start 10 is beyond EOD, truncated [ 2954.151682][T29833] loop1: p2 size 2 extends beyond EOD, truncated [ 2954.160771][T29835] loop2: p1 < > p2 < > p4 [ 2954.165453][T29833] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2954.172582][T29835] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2954.183882][ T4457] loop4: p1 < > p2 < > p4 [ 2954.190269][ T4457] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2954.211744][T29837] loop4: p1 < > p2 < > p4 [ 2954.218643][T29837] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:21 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000080)={0x0, 0x0, r0}) 17:12:21 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000feffffff00200055aa", 0x40, 0x1c0}]) 17:12:21 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000092e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:21 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000600000000000000000200055aa", 0x40, 0x1c0}]) 17:12:21 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000100000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:21 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000c0000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2954.447597][T29839] loop5: detected capacity change from 0 to 1 [ 2954.451781][T29847] loop4: detected capacity change from 0 to 131072 [ 2954.461599][T29849] loop2: detected capacity change from 0 to 131072 [ 2954.462758][T29848] loop1: detected capacity change from 0 to 1 [ 2954.494847][ T24] audit: type=1326 audit(1640106741.517:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29850 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f150c8f0e99 code=0x0 [ 2954.498148][T29845] loop3: detected capacity change from 0 to 131072 [ 2954.525799][ T4856] loop2: p1 < > p2 < > p4 [ 2954.531419][ T4856] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2954.540870][T29849] loop2: p1 < > p2 < > p4 [ 2954.548030][T29849] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2954.555963][ T3068] loop5: p1 < > p2 < > p4 [ 2954.560487][ T3068] loop5: partition table partially beyond EOD, truncated [ 2954.567926][ T4230] loop1: p1 < > p2 < > p4 [ 2954.572351][ T4230] loop1: partition table partially beyond EOD, truncated [ 2954.581164][ T4998] loop4: p1 < > p2 < > p4 [ 2954.587292][T29845] loop3: p1 < > p2 < > p4 17:12:21 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000110000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2954.594471][ T4998] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2954.603449][ T4230] loop1: p1 start 10 is beyond EOD, truncated [ 2954.609648][ T4230] loop1: p2 size 2 extends beyond EOD, truncated [ 2954.617142][ T3068] loop5: p1 start 10 is beyond EOD, truncated [ 2954.623225][ T3068] loop5: p2 size 2 extends beyond EOD, truncated [ 2954.623832][T29845] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2954.631848][ T4230] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2954.650206][T29847] loop4: p1 < > p2 < > p4 [ 2954.658141][ T3068] loop5: p4 start 4294966784 is beyond EOD, truncated [ 2954.665520][T29855] loop2: detected capacity change from 0 to 131072 [ 2954.667296][T29847] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2954.681971][T29848] loop1: p1 < > p2 < > p4 [ 2954.686429][T29848] loop1: partition table partially beyond EOD, truncated [ 2954.695158][T29839] loop5: p1 < > p2 < > p4 17:12:21 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000010000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2954.699583][T29839] loop5: partition table partially beyond EOD, truncated [ 2954.713732][T29848] loop1: p1 start 10 is beyond EOD, truncated [ 2954.719965][T29848] loop1: p2 size 2 extends beyond EOD, truncated [ 2954.727454][ T4634] loop2: p1 < > p2 < > p4 [ 2954.732931][ T4634] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:21 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000120000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2954.748283][T29839] loop5: p1 start 10 is beyond EOD, truncated [ 2954.748368][T29855] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 2954.754424][T29839] loop5: p2 size 2 extends beyond EOD, truncated [ 2954.773217][T29848] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2954.787972][T29858] loop4: detected capacity change from 0 to 131072 [ 2954.798718][T29839] loop5: p4 start 4294966784 is beyond EOD, truncated 17:12:21 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000093e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:21 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000002000000200055aa", 0x40, 0x1c0}]) [ 2954.824781][ T4998] loop4: p1 < > p2 < > p4 [ 2954.829773][T29860] loop2: detected capacity change from 0 to 131072 [ 2954.836743][ T4998] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:21 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000630000000000000000200055aa", 0x40, 0x1c0}]) [ 2954.869402][T29858] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 2954.871674][T29862] loop1: detected capacity change from 0 to 1 [ 2954.894953][T29860] loop2: p1 < > p2 < > p4 [ 2954.909740][T29860] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2954.913363][T29865] loop5: detected capacity change from 0 to 1 [ 2954.953696][T29862] loop1: p1 < > p2 < > p4 [ 2954.958201][T29862] loop1: partition table partially beyond EOD, truncated [ 2954.971028][T29867] loop3: detected capacity change from 0 to 131072 [ 2954.983253][T29865] loop5: p1 < > p2 < > p4 [ 2954.987702][T29865] loop5: partition table partially beyond EOD, truncated [ 2955.000933][T29865] loop5: p1 start 10 is beyond EOD, truncated [ 2955.007080][T29865] loop5: p2 size 2 extends beyond EOD, truncated [ 2955.012184][T29862] loop1: p1 start 10 is beyond EOD, truncated [ 2955.019702][T29862] loop1: p2 size 2 extends beyond EOD, truncated [ 2955.026601][T29865] loop5: p4 start 131072 is beyond EOD, truncated [ 2955.038194][T29867] loop3: p1 < > p2 < > p4 [ 2955.052407][T29862] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2955.055569][T29867] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x35}]}) 17:12:22 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000020000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:22 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000130000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:22 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000003000000200055aa", 0x40, 0x1c0}]) 17:12:22 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000efe525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:22 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000680000000000000000200055aa", 0x40, 0x1c0}]) [ 2955.337510][T29874] loop4: detected capacity change from 0 to 131072 [ 2955.338095][T29876] loop5: detected capacity change from 0 to 1 [ 2955.353426][T29878] loop2: detected capacity change from 0 to 131072 [ 2955.355698][T29880] loop1: detected capacity change from 0 to 1 17:12:22 executing program 0: ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x48) getitimer(0x1, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0xc, &(0x7f0000000180)={r0, 0x0, 0x0}, 0x20) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@private, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={""/10, ""/2, @dev}}}, &(0x7f0000000040)=0xe8) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', r2, 0x29, 0x8, 0x88, 0xffffffff, 0x2, @mcast2, @empty, 0x40, 0x7, 0x7, 0x5}}) [ 2955.383139][T29877] loop3: detected capacity change from 0 to 131072 [ 2955.405074][T29874] loop4: p1 < > p2 < > p4 [ 2955.414839][ T3068] loop5: p1 < > p2 < > p4 [ 2955.419282][ T3068] loop5: partition table partially beyond EOD, truncated [ 2955.426718][T29880] loop1: p1 < > p2 < > p4 [ 2955.431157][T29880] loop1: partition table partially beyond EOD, truncated [ 2955.439947][T29877] loop3: p1 < > p2 < > p4 [ 2955.441635][T29878] loop2: p1 < > p2 < > p4 [ 2955.451515][T29874] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2955.457916][T29877] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2955.459132][T29878] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2955.472259][T29880] loop1: p1 start 10 is beyond EOD, truncated [ 2955.478437][T29880] loop1: p2 size 2 extends beyond EOD, truncated 17:12:22 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000140000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:22 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000001020000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2955.478721][ T3068] loop5: p1 start 10 is beyond EOD, truncated [ 2955.490850][ T3068] loop5: p2 size 2 extends beyond EOD, truncated [ 2955.500564][T29880] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2955.503078][ T3068] loop5: p4 start 196608 is beyond EOD, truncated 17:12:22 executing program 0: r0 = io_uring_setup(0x1439, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1) [ 2955.535941][T29876] loop5: p1 < > p2 < > p4 [ 2955.540643][T29876] loop5: partition table partially beyond EOD, truncated [ 2955.549255][T29876] loop5: p1 start 10 is beyond EOD, truncated [ 2955.555437][T29876] loop5: p2 size 2 extends beyond EOD, truncated [ 2955.565089][T29876] loop5: p4 start 196608 is beyond EOD, truncated 17:12:22 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000f0e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) 17:12:22 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000006c0000000000000000200055aa", 0x40, 0x1c0}]) 17:12:22 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000004000000200055aa", 0x40, 0x1c0}]) 17:12:22 executing program 0: add_key$keyring(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000680)={'fscrypt:', @desc1}, &(0x7f00000006c0)={0x0, "abc9fec560127f2a38074768040fa4fd7ec0162a1263219b454355a198f5bdf7e89768edf82a97c0f5e251c941a25a8b3b761f38d6ac2bd88f81254ce18979bb"}, 0x48, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffa, 0x0, 0x0) [ 2955.595434][T29889] loop4: detected capacity change from 0 to 131072 [ 2955.605927][T29891] loop2: detected capacity change from 0 to 131072 [ 2955.649477][T29896] loop1: detected capacity change from 0 to 1 [ 2955.654825][T29900] loop5: detected capacity change from 0 to 1 [ 2955.656216][ T4998] loop2: p1 < > p2 < > p4 [ 2955.672704][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2955.673893][T29889] loop4: p1 < > p2 < > p4 17:12:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x0, 0x0, 0x0, 0x4}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xd000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2955.696536][T29891] loop2: p1 < > p2 < > p4 [ 2955.706992][T29891] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2955.714001][T29901] loop3: detected capacity change from 0 to 131072 [ 2955.725081][T29889] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2955.725103][ T1437] loop5: p1 < > p2 < > p4 [ 2955.725111][ T1437] loop5: partition table partially beyond EOD, truncated [ 2955.725159][ T1437] loop5: p1 start 10 is beyond EOD, [ 2955.732206][T29896] loop1: p1 < > p2 < > p4 [ 2955.736440][ T1437] truncated [ 2955.736446][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2955.753692][ T1437] loop5: p4 start 262144 is beyond EOD, [ 2955.756304][T29896] loop1: partition table partially beyond EOD, [ 2955.762662][ T1437] truncated [ 2955.772112][ T1437] loop5: p1 < > p2 < > p4 [ 2955.774623][T29896] truncated [ 2955.780473][T29896] loop1: p1 start 10 is beyond EOD, [ 2955.782252][ T1437] loop5: partition table partially beyond EOD, truncated 17:12:22 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000150000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:22 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000004020000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2955.787853][ T1437] loop5: p1 start 10 is beyond EOD, [ 2955.790744][T29896] truncated [ 2955.790750][T29896] loop1: p2 size 2 extends beyond EOD, truncated [ 2955.797787][ T1437] truncated [ 2955.805317][T29896] loop1: p4 size 2097152 extends beyond EOD, [ 2955.806243][ T1437] loop5: p2 size 2 extends beyond EOD, [ 2955.812531][T29896] truncated [ 2955.830313][ T1437] truncated [ 2955.839342][T29901] loop3: p1 < > p2 < > p4 17:12:22 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000f1e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2955.858021][T29901] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2955.858433][T29910] loop4: detected capacity change from 0 to 131072 [ 2955.865506][T29913] loop2: detected capacity change from 0 to 131072 [ 2955.880355][T29914] loop0: detected capacity change from 0 to 104 [ 2955.893669][ T1437] loop5: p4 start 262144 is beyond EOD, truncated [ 2955.902380][T29900] loop5: p1 < > p2 < > p4 [ 2955.906894][T29900] loop5: partition table partially beyond EOD, truncated [ 2955.915244][T29913] loop2: p1 < > p2 < > p4 [ 2955.924040][T29910] loop4: p1 < > p2 < > p4 [ 2955.929974][T29910] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2955.938627][T29913] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2955.941453][T29900] loop5: p1 start 10 is beyond EOD, truncated [ 2955.951805][T29900] loop5: p2 size 2 extends beyond EOD, truncated 17:12:23 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000740000000000000000200055aa", 0x40, 0x1c0}]) 17:12:23 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000160000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:23 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000005000000200055aa", 0x40, 0x1c0}]) [ 2955.965507][T29917] loop1: detected capacity change from 0 to 1 [ 2955.974393][T29900] loop5: p4 start 262144 is beyond EOD, truncated 17:12:23 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000030000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2956.013761][T29917] loop1: p1 < > p2 < > p4 [ 2956.018239][T29917] loop1: partition table partially beyond EOD, truncated [ 2956.042803][T29922] loop5: detected capacity change from 0 to 1 [ 2956.054959][T29923] loop2: detected capacity change from 0 to 131072 [ 2956.061645][T29917] loop1: p1 start 10 is beyond EOD, truncated [ 2956.067752][T29917] loop1: p2 size 2 extends beyond EOD, truncated [ 2956.081802][T29919] loop3: detected capacity change from 0 to 131072 [ 2956.091976][T29925] loop4: detected capacity change from 0 to 131072 [ 2956.099465][T29917] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2956.106774][ T4457] loop5: p1 < > p2 < > p4 [ 2956.111196][ T4457] loop5: partition table partially beyond EOD, truncated [ 2956.120060][T29923] loop2: p1 < > p2 < > p4 [ 2956.121552][ T4457] loop5: p1 start 10 is beyond EOD, truncated [ 2956.130590][ T4457] loop5: p2 size 2 extends beyond EOD, truncated [ 2956.138239][T29919] loop3: p1 < > p2 < > p4 [ 2956.138696][ T4457] loop5: p4 start 327680 is beyond EOD, truncated [ 2956.149643][T29923] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2956.157084][T29925] loop4: p1 < > p2 < > p4 17:12:23 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000f2e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2956.161777][T29922] loop5: p1 < > p2 < > p4 [ 2956.166226][T29922] loop5: partition table partially beyond EOD, truncated [ 2956.175740][T29919] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2956.183299][T29925] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2956.191369][T29922] loop5: p1 start 10 is beyond EOD, truncated [ 2956.197505][T29922] loop5: p2 size 2 extends beyond EOD, truncated [ 2956.208212][ T1437] loop3: p1 < > p2 < > p4 17:12:23 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000170000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2956.214953][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2956.218655][T29927] loop1: detected capacity change from 0 to 1 [ 2956.229975][T29922] loop5: p4 start 327680 is beyond EOD, truncated 17:12:23 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000040000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:23 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000007a0000000000000000200055aa", 0x40, 0x1c0}]) [ 2956.256496][ T3068] loop1: p1 < > p2 < > p4 [ 2956.260982][ T3068] loop1: partition table partially beyond EOD, truncated [ 2956.270568][T29929] loop2: detected capacity change from 0 to 131072 [ 2956.291749][T29931] loop4: detected capacity change from 0 to 131072 [ 2956.295740][ T3068] loop1: p1 start 10 is beyond EOD, truncated [ 2956.304468][ T3068] loop1: p2 size 2 extends beyond EOD, truncated [ 2956.315808][T29929] loop2: p1 < > p2 < > p4 [ 2956.328678][T29929] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2956.336608][T29931] loop4: p1 < > p2 < > p4 [ 2956.341462][ T3068] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2956.349629][T29931] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2956.359351][T29927] loop1: p1 < > p2 < > p4 [ 2956.363805][T29927] loop1: partition table partially beyond EOD, truncated [ 2956.373997][T29927] loop1: p1 start 10 is beyond EOD, truncated [ 2956.380197][T29927] loop1: p2 size 2 extends beyond EOD, truncated [ 2956.391667][T29934] loop3: detected capacity change from 0 to 131072 [ 2956.401432][T29927] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2956.436097][ T1437] loop3: p1 < > p2 < > p4 [ 2956.451042][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2956.465660][T29934] loop3: p1 < > p2 < > p4 [ 2956.474848][T29934] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:23 executing program 0: getpgid(0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000002200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ppoll(0x0, 0xff00000000000000, 0x0, 0x0, 0x1c000017) 17:12:23 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000006000000200055aa", 0x40, 0x1c0}]) 17:12:23 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000050000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:23 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000180000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:23 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000f3e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:23 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000890000000000000000200055aa", 0x40, 0x1c0}]) [ 2956.780301][T29942] loop2: detected capacity change from 0 to 131072 [ 2956.780330][T29941] loop4: detected capacity change from 0 to 131072 [ 2956.783488][T29945] loop5: detected capacity change from 0 to 1 [ 2956.790092][T29944] loop1: detected capacity change from 0 to 1 [ 2956.811045][T29943] loop3: detected capacity change from 0 to 131072 [ 2956.818337][ T4457] loop5: p1 < > p2 < > p4 [ 2956.822801][ T4457] loop5: partition table partially beyond EOD, truncated [ 2956.831195][ T4457] loop5: p1 start 10 is beyond EOD, truncated [ 2956.831245][ T4230] loop4: p1 < > p2 < > p4 [ 2956.837296][ T4457] loop5: p2 size 2 extends beyond EOD, truncated [ 2956.838158][ T4457] loop5: p4 start 393216 is beyond EOD, truncated [ 2956.860539][ T4230] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2956.870824][T29941] loop4: p1 < > p2 < > p4 [ 2956.877117][ T4856] loop1: p1 < > p2 < > p4 [ 2956.881551][ T4856] loop1: partition table partially beyond EOD, truncated [ 2956.883976][T29941] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2956.889389][T29943] loop3: p1 < > p2 < > p4 [ 2956.901613][ T4998] loop2: p1 < > p2 < > p4 [ 2956.908379][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2956.912313][ T4856] loop1: p1 start 10 is beyond EOD, truncated [ 2956.921367][ T4856] loop1: p2 size 2 extends beyond EOD, truncated 17:12:23 executing program 0: getpgid(0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000002200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ppoll(0x0, 0xff00000000000000, 0x0, 0x0, 0x1c000017) [ 2956.933782][T29943] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2956.941201][T29945] loop5: p1 < > p2 < > p4 [ 2956.945651][T29945] loop5: partition table partially beyond EOD, truncated [ 2956.961159][ T4856] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:24 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000060000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2956.986023][T29945] loop5: p1 start 10 is beyond EOD, truncated [ 2956.992108][T29945] loop5: p2 size 2 extends beyond EOD, truncated [ 2957.001711][T29942] loop2: p1 < > p2 < > p4 [ 2957.020962][T29942] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:24 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000002dc0)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x0) 17:12:24 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000190000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2957.035394][T29944] loop1: p1 < > p2 < > p4 [ 2957.039843][T29944] loop1: partition table partially beyond EOD, truncated [ 2957.042341][T29945] loop5: p4 start 393216 is beyond EOD, truncated [ 2957.064737][T29944] loop1: p1 start 10 is beyond EOD, truncated [ 2957.070824][T29944] loop1: p2 size 2 extends beyond EOD, truncated 17:12:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) 17:12:24 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000900000000000000000200055aa", 0x40, 0x1c0}]) 17:12:24 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001a0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:24 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000007000000200055aa", 0x40, 0x1c0}]) [ 2957.092590][T29958] loop4: detected capacity change from 0 to 131072 [ 2957.118444][T29944] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2957.134099][T29958] loop4: p1 < > p2 < > p4 17:12:24 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000006700)={0x77359400}) 17:12:24 executing program 0: bind$can_j1939(0xffffffffffffffff, 0x0, 0x0) 17:12:24 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000f4e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:24 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000004060000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2957.152224][T29958] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2957.180173][T29968] loop5: detected capacity change from 0 to 1 17:12:24 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/config', 0x0, 0x0) [ 2957.215715][T29970] loop2: detected capacity change from 0 to 131072 [ 2957.234342][T29979] loop1: detected capacity change from 0 to 1 [ 2957.245757][ T4457] loop5: p1 < > p2 < > p4 [ 2957.250188][ T4457] loop5: partition table partially beyond EOD, truncated [ 2957.261987][T29977] loop4: detected capacity change from 0 to 131072 [ 2957.268655][T29979] loop1: p1 < > p2 < > p4 [ 2957.273147][T29979] loop1: partition table partially beyond EOD, truncated [ 2957.276680][T29971] loop3: detected capacity change from 0 to 131072 [ 2957.288158][ T4998] loop2: p1 < > p2 < > p4 [ 2957.288573][ T4457] loop5: p1 start 10 is beyond EOD, truncated 17:12:24 executing program 0: io_cancel(0x0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 2957.292615][ T24] audit: type=1400 audit(1640106744.307:421): avc: denied { read } for pid=29980 comm="syz-executor.0" name="/" dev="configfs" ino=14208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2957.298676][ T4457] loop5: p2 size 2 extends beyond EOD, truncated [ 2957.311772][ T4457] loop5: p4 start 458752 is beyond EOD, [ 2957.321117][ T24] audit: type=1400 audit(1640106744.307:422): avc: denied { open } for pid=29980 comm="syz-executor.0" path="/sys/kernel/config" dev="configfs" ino=14208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2957.330490][T29979] loop1: p1 start 10 is beyond EOD, [ 2957.333246][ T4457] truncated 17:12:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) [ 2957.365623][T29979] truncated [ 2957.368722][T29979] loop1: p2 size 2 extends beyond EOD, truncated [ 2957.376024][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2957.390376][T29979] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2957.397600][T29968] loop5: p1 < > p2 < > p4 [ 2957.402039][T29968] loop5: partition table partially beyond EOD, truncated 17:12:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @private}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x1ff, 0xe11, 0x4}) [ 2957.415959][T29970] loop2: p1 < > p2 < > p4 [ 2957.416116][T29971] loop3: p1 < > p2 < > p4 [ 2957.427189][T29970] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2957.428133][T29977] loop4: p1 < > p2 < > p4 [ 2957.453807][T29977] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2957.454551][T29968] loop5: p1 start 10 is beyond EOD, truncated 17:12:24 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001b0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2957.463219][T29971] loop3: p4 size 2097152 extends beyond EOD, [ 2957.466818][T29968] loop5: p2 size 2 extends beyond EOD, truncated [ 2957.479660][T29971] truncated [ 2957.504864][T29968] loop5: p4 start 458752 is beyond EOD, truncated [ 2957.541350][T29989] loop2: detected capacity change from 0 to 131072 17:12:24 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/nf_conntrack_h323', 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 17:12:24 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000f5e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:24 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000008000000200055aa", 0x40, 0x1c0}]) 17:12:24 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000a00000000000000000200055aa", 0x40, 0x1c0}]) 17:12:24 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000070000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2957.614275][ T4998] loop2: p1 < > p2 < > p4 [ 2957.629304][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2957.647827][T29995] loop1: detected capacity change from 0 to 1 17:12:24 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 17:12:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x2, 0xb, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1}]}, 0x18}}, 0x0) [ 2957.669724][T29989] loop2: p1 < > p2 < > p4 [ 2957.682645][T29989] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2957.688111][T30003] loop5: detected capacity change from 0 to 1 [ 2957.689593][T29998] loop4: detected capacity change from 0 to 131072 [ 2957.712096][T30000] loop3: detected capacity change from 0 to 131072 [ 2957.720632][T29995] loop1: p1 < > p2 < > p4 [ 2957.725140][T29995] loop1: partition table partially beyond EOD, truncated [ 2957.751636][T29995] loop1: p1 start 10 is beyond EOD, truncated [ 2957.757797][T29995] loop1: p2 size 2 extends beyond EOD, truncated [ 2957.766280][T29998] loop4: p1 < > p2 < > p4 17:12:24 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001c0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) [ 2957.771753][T29998] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2957.779372][T30003] loop5: p1 < > p2 < > p4 [ 2957.781136][T29995] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2957.783897][T30003] loop5: partition table partially beyond EOD, truncated [ 2957.799103][T30000] loop3: p1 < > p2 < > p4 17:12:24 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000080000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:24 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000200)) [ 2957.817539][T30000] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2957.821496][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 2957.837144][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 2957.837379][T30010] loop2: detected capacity change from 0 to 131072 17:12:24 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000f6e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x18, 0x0, &(0x7f0000000040)) [ 2957.873769][T30003] loop5: p1 start 10 is beyond EOD, truncated [ 2957.879867][T30003] loop5: p2 size 2 extends beyond EOD, truncated [ 2957.903774][T30018] loop1: detected capacity change from 0 to 1 [ 2957.909555][T30020] loop4: detected capacity change from 0 to 131072 [ 2957.911187][T30003] loop5: p4 start 524288 is beyond EOD, truncated 17:12:24 executing program 0: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x2, 0xd, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x8}]}, 0x18}}, 0x0) [ 2957.925400][ T4230] loop2: p1 < > p2 < > p4 [ 2957.930732][ T4230] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2957.945106][T30010] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 2957.963997][T30020] loop4: p1 < > p2 < > p4 17:12:25 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000c00000000000000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001d0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000009000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x1abe82) write$evdev(r0, 0x0, 0x0) [ 2957.977166][T30020] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2957.987049][T30018] loop1: p1 < > p2 < > p4 [ 2957.991476][T30018] loop1: partition table partially beyond EOD, truncated [ 2958.003640][T30018] loop1: p1 start 10 is beyond EOD, truncated [ 2958.009863][T30018] loop1: p2 size 2 extends beyond EOD, truncated 17:12:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x2c}, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000180), 0xc) 17:12:25 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000090000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000f7e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2958.052107][T30027] loop3: detected capacity change from 0 to 131072 [ 2958.057349][T30034] loop5: detected capacity change from 0 to 1 [ 2958.061118][T30018] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2958.065624][T30033] loop2: detected capacity change from 0 to 131072 17:12:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000bc0)={&(0x7f0000000240)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000b40)=[@dstaddrv6={0x1c, 0x84, 0xa, @local={0xfe, 0x80, '\x00', 0x0}}, @dstaddrv4={0x10, 0x84, 0x9, @rand_addr=0x4}, @dstaddrv4={0x10, 0x84, 0x9, @multicast2}], 0x3c}, 0x0) 17:12:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000240)={r2, 0x2, "1c4a"}, &(0x7f0000000140)=0xa) 17:12:25 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) listen(r0, 0x1000) [ 2958.113999][T30039] loop4: detected capacity change from 0 to 131072 [ 2958.134822][T30034] loop5: p1 < > p2 < > p4 [ 2958.139274][T30034] loop5: partition table partially beyond EOD, truncated [ 2958.147295][T30027] loop3: p1 < > p2 < > p4 [ 2958.152124][T30033] loop2: p1 < > p2 < > p4 [ 2958.160641][T30039] loop4: p1 < > p2 < > p4 [ 2958.166852][T30033] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2958.168077][T30047] loop1: detected capacity change from 0 to 1 [ 2958.197232][T30027] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2958.197692][T30039] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:25 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001e0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040), &(0x7f0000000100)=0x98) [ 2958.206471][T30034] loop5: p1 start 10 is beyond EOD, truncated [ 2958.217213][T30034] loop5: p2 size 2 extends beyond EOD, truncated [ 2958.231916][T30034] loop5: p4 start 589824 is beyond EOD, truncated [ 2958.249248][T30055] loop2: detected capacity change from 0 to 131072 17:12:25 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000ec0000000000000000200055aa", 0x40, 0x1c0}]) [ 2958.264551][ T4457] loop1: p1 < > p2 < > p4 [ 2958.268985][ T4457] loop1: partition table partially beyond EOD, truncated [ 2958.276157][ T4457] loop1: p1 start 10 is beyond EOD, truncated [ 2958.282261][ T4457] loop1: p2 size 2 extends beyond EOD, truncated [ 2958.293202][ T4457] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2958.300432][T30055] loop2: p1 < > p2 < > p4 [ 2958.308010][ T1437] loop1: p1 < > p2 < > p4 17:12:25 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000000a000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 0: syz_mount_image$iso9660(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, 0x0, &(0x7f0000001d40), 0x0, &(0x7f0000001e40)={[{@iocharset={'iocharset', 0x3d, 'euc-jp'}}, {@check_strict}, {@sbsector}]}) 17:12:25 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000a0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2958.312445][ T1437] loop1: partition table partially beyond EOD, truncated [ 2958.317805][T30055] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2958.339195][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2958.345417][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2958.350146][T30059] ISOFS: Unable to identify CD-ROM format. [ 2958.356224][T30063] loop5: detected capacity change from 0 to 1 17:12:25 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001f0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2958.364196][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2958.369853][T30065] loop4: detected capacity change from 0 to 131072 [ 2958.375555][T30057] loop3: detected capacity change from 0 to 131072 [ 2958.386734][T30047] loop1: p1 < > p2 < > p4 [ 2958.391140][T30047] loop1: partition table partially beyond EOD, truncated [ 2958.398694][T30047] loop1: p1 start 10 is beyond EOD, truncated [ 2958.404805][T30047] loop1: p2 size 2 extends beyond EOD, truncated 17:12:25 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) shutdown(r0, 0x1) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[{0xc}], 0xc}, 0x0) [ 2958.411597][T30047] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2958.414660][T30063] loop5: p1 < > p2 < > p4 [ 2958.422942][T30063] loop5: partition table partially beyond EOD, truncated [ 2958.433723][T30063] loop5: p1 start 10 is beyond EOD, truncated [ 2958.436168][T30065] loop4: p1 < > p2 < > p4 [ 2958.439811][T30063] loop5: p2 size 2 extends beyond EOD, truncated [ 2958.445474][T30057] loop3: p1 < > p2 < > p4 [ 2958.457206][T30065] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:25 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000f8e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2958.466891][T30067] loop2: detected capacity change from 0 to 131072 [ 2958.468138][T30063] loop5: p4 start 655360 is beyond EOD, truncated [ 2958.484743][T30057] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2958.504969][T30067] loop2: p1 < > p2 < > p4 [ 2958.510068][T30073] loop1: detected capacity change from 0 to 1 17:12:25 executing program 0: syz_emit_ethernet(0x7a, &(0x7f00000000c0)={@random="135424f28754", @empty, @val, {@ipv6}}, 0x0) 17:12:25 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000000b000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000b0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000140), &(0x7f0000000180)=0xc) 17:12:25 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000fe0000000000000000200055aa", 0x40, 0x1c0}]) [ 2958.522414][T30067] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2958.555470][T30077] loop5: detected capacity change from 0 to 1 17:12:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000740)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000840)="bf", 0x1}], 0x1, &(0x7f0000000780)=[@sndrcv={0x2c}, @dstaddrv6={0x1c, 0x84, 0xa, @ipv4={'\x00', '\xff\xff', @rand_addr=0x4}}, @dstaddrv4={0x10, 0x84, 0x9, @loopback}], 0x58}, 0x0) [ 2958.577949][T30081] loop4: detected capacity change from 0 to 131072 [ 2958.585589][T30073] loop1: p1 < > p2 < > p4 [ 2958.590028][T30073] loop1: partition table partially beyond EOD, truncated [ 2958.594298][T30077] loop5: p1 < > p2 < > p4 [ 2958.597954][T30073] loop1: p1 start 10 is beyond EOD, [ 2958.601669][T30077] loop5: partition table partially beyond EOD, truncated [ 2958.603134][T30077] loop5: p1 start 10 is beyond EOD, [ 2958.606982][T30073] truncated 17:12:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0xc3) 17:12:25 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000200000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x34, 0x0}, 0x0) [ 2958.606989][T30073] loop1: p2 size 2 extends beyond EOD, truncated [ 2958.618057][T30084] loop3: detected capacity change from 0 to 131072 [ 2958.619311][T30077] truncated [ 2958.619317][T30077] loop5: p2 size 2 extends beyond EOD, truncated [ 2958.637865][T30073] loop1: p4 size 2097152 extends beyond EOD, [ 2958.641244][T30077] loop5: p4 start 720896 is beyond EOD, [ 2958.644814][T30073] truncated [ 2958.650849][T30077] truncated [ 2958.665604][ T1437] loop4: p1 < > p2 < > p4 17:12:25 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000000c000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) [ 2958.679677][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2958.695008][T30091] loop2: detected capacity change from 0 to 131072 [ 2958.696308][T30081] loop4: p1 < > p2 < > p4 [ 2958.706953][T30084] loop3: p1 < > p2 < > p4 [ 2958.715357][T30091] loop2: p1 < > p2 < > p4 17:12:25 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000f9e525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)=ANY=[@ANYBLOB='D', @ANYRES32=0x0], &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000000)={r4}, &(0x7f0000000040)=0x8) [ 2958.727894][T30091] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2958.730698][T30084] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2958.759881][T30081] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2958.769901][T30099] loop5: detected capacity change from 0 to 1 17:12:25 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000210000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2958.772340][T30102] loop1: detected capacity change from 0 to 1 17:12:25 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000c0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], &(0x7f0000000080)=0x8) sendmsg$inet_sctp(r1, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x0, 0x0, 0x0, r3}}], 0x1c}, 0x0) 17:12:25 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000670100000000000000200055aa", 0x40, 0x1c0}]) [ 2958.815734][T30108] loop2: detected capacity change from 0 to 131072 [ 2958.835418][T30102] loop1: p1 < > p2 < > p4 [ 2958.839918][T30102] loop1: partition table partially beyond EOD, truncated [ 2958.850121][ T1437] loop5: p1 < > p2 < > p4 [ 2958.854548][ T1437] loop5: partition table partially beyond EOD, truncated [ 2958.863328][T30108] loop2: p1 < > p2 < > p4 [ 2958.868239][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2958.874340][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2958.878155][T30111] loop3: detected capacity change from 0 to 131072 [ 2958.882490][T30115] loop4: detected capacity change from 0 to 131072 [ 2958.888795][T30102] loop1: p1 start 10 is beyond EOD, truncated [ 2958.894581][ T1437] loop5: p4 start 786432 is beyond EOD, truncated [ 2958.899997][T30102] loop1: p2 size 2 extends beyond EOD, truncated 17:12:25 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) read(r1, &(0x7f0000000040)=""/82, 0x52) 17:12:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) [ 2958.900188][T30108] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2958.913307][T30102] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2958.927240][ T1437] loop5: p1 < > p2 < > p4 [ 2958.931651][ T1437] loop5: partition table partially beyond EOD, truncated [ 2958.939689][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2958.945776][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2958.951361][T30111] loop3: p1 < > p2 < > p4 [ 2958.952738][ T1437] loop5: p4 start 786432 is beyond EOD, truncated 17:12:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[{0xc}, {0xc}], 0x18}, 0x0) 17:12:26 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000220000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2958.965904][T30099] loop5: p1 < > p2 < > p4 [ 2958.970320][T30099] loop5: partition table partially beyond EOD, truncated [ 2958.978127][T30115] loop4: p1 < > p2 < > p4 [ 2958.983555][T30111] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2958.983725][T30115] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2959.007588][T30099] loop5: p1 start 10 is beyond EOD, truncated [ 2959.013709][T30099] loop5: p2 size 2 extends beyond EOD, truncated [ 2959.025795][T30124] loop2: detected capacity change from 0 to 131072 [ 2959.038059][T30099] loop5: p4 start 786432 is beyond EOD, truncated 17:12:26 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000000d000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000001480), &(0x7f00000000c0)=0x4) 17:12:26 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000fae525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000040200000000000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000d0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2959.075341][T30124] loop2: p1 < > p2 < > p4 [ 2959.080464][T30124] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000000), &(0x7f0000000100)=0x1) [ 2959.119217][T30131] loop1: detected capacity change from 0 to 1 [ 2959.139284][T30138] loop4: detected capacity change from 0 to 131072 [ 2959.144903][T30129] loop5: detected capacity change from 0 to 1 [ 2959.164166][ T4856] loop1: p1 < > p2 < > p4 17:12:26 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000230000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000001c0), &(0x7f0000000280)=0x98) 17:12:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040)={0x0, 0xec}, 0x8) [ 2959.168642][ T4856] loop1: partition table partially beyond EOD, truncated [ 2959.175344][T30144] loop2: detected capacity change from 0 to 131072 [ 2959.181022][T30134] loop3: detected capacity change from 0 to 131072 [ 2959.189324][ T4856] loop1: p1 start 10 is beyond EOD, truncated [ 2959.195493][ T4856] loop1: p2 size 2 extends beyond EOD, truncated [ 2959.203341][ T4856] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2959.210623][ T4457] loop4: p1 < > p2 < > p4 17:12:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000000), &(0x7f00000000c0)=0xb0) 17:12:26 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @random="32c8e1654cc6", @val, {@ipv4}}, 0x0) [ 2959.216492][T30131] loop1: p1 < > p2 < > p4 [ 2959.220906][T30131] loop1: partition table partially beyond EOD, truncated [ 2959.229399][ T1437] loop5: p1 < > p2 < > p4 [ 2959.229775][T30134] loop3: p1 < > p2 < > p4 [ 2959.233838][ T1437] loop5: partition table partially beyond EOD, truncated [ 2959.234108][ T4457] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2959.252729][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2959.258837][ T1437] loop5: p2 size 2 extends beyond EOD, truncated 17:12:26 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) bind(r1, &(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c) [ 2959.266485][T30144] loop2: p1 < > p2 < > p4 [ 2959.266898][T30134] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2959.271878][T30144] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2959.278474][T30131] loop1: p1 start 10 is beyond EOD, truncated [ 2959.290931][T30131] loop1: p2 size 2 extends beyond EOD, truncated [ 2959.292455][ T1437] loop5: p4 start 851968 is beyond EOD, truncated [ 2959.307840][T30138] loop4: p1 < > p2 < > p4 [ 2959.314809][T30138] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2959.319337][T30131] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2959.328692][T30129] loop5: p1 < > p2 < > p4 [ 2959.333117][T30129] loop5: partition table partially beyond EOD, truncated [ 2959.352793][T30129] loop5: p1 start 10 is beyond EOD, truncated [ 2959.358928][T30129] loop5: p2 size 2 extends beyond EOD, truncated [ 2959.368853][T30129] loop5: p4 start 851968 is beyond EOD, truncated 17:12:26 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000000e000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={0x0, @in, 0x0, 0x5, 0x10}, 0x98) 17:12:26 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000e0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000fbe525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000240000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000600200000000000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000000c0)='dctcp\x00', 0x6) [ 2959.440574][T30166] loop1: detected capacity change from 0 to 1 [ 2959.450476][T30164] loop2: detected capacity change from 0 to 131072 [ 2959.462154][T30163] loop4: detected capacity change from 0 to 131072 [ 2959.477734][T30171] loop5: detected capacity change from 0 to 1 17:12:26 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 17:12:26 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x1}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r3 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x24, &(0x7f0000000000)=0x1c00, 0xfe6a) [ 2959.491134][T30169] loop3: detected capacity change from 0 to 131072 [ 2959.504108][T30164] loop2: p1 < > p2 < > p4 [ 2959.508583][T30166] loop1: p1 < > p2 < > p4 [ 2959.513025][T30166] loop1: partition table partially beyond EOD, truncated [ 2959.513936][T30163] loop4: p1 < > p2 < > p4 [ 2959.521496][T30166] loop1: p1 start 10 is beyond EOD, truncated [ 2959.530581][T30166] loop1: p2 size 2 extends beyond EOD, truncated [ 2959.531853][T30164] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2959.539386][T30163] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2959.548464][ T1437] loop5: p1 < > p2 < > p4 [ 2959.554306][T30166] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2959.555144][ T1437] loop5: partition table partially beyond EOD, truncated [ 2959.571433][T30169] loop3: p1 < > p2 < > p4 [ 2959.581916][T30169] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000200), &(0x7f00000002c0)=0x98) 17:12:26 executing program 0: r0 = add_key$keyring(&(0x7f0000000880), &(0x7f00000008c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) [ 2959.587382][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2959.594972][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2959.603032][ T1437] loop5: p4 start 917504 is beyond EOD, truncated [ 2959.610509][ T1437] loop5: p1 < > p2 < > p4 [ 2959.615078][ T1437] loop5: partition table partially beyond EOD, truncated [ 2959.627617][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2959.633733][ T1437] loop5: p2 size 2 extends beyond EOD, truncated 17:12:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43b14ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f711e8ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d042b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad"}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab04d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda17b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f"}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, 0xffffffffffffffff, 0x0) [ 2959.648089][ T1437] loop5: p4 start 917504 is beyond EOD, truncated [ 2959.661884][T30171] loop5: p1 < > p2 < > p4 [ 2959.666340][T30171] loop5: partition table partially beyond EOD, truncated [ 2959.671630][ T24] audit: type=1400 audit(1640106746.697:423): avc: denied { read } for pid=30188 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 17:12:26 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000000f000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000bc0200000000000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000fce525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000250000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2959.677233][T30171] loop5: p1 start 10 is beyond EOD, truncated [ 2959.699210][T30171] loop5: p2 size 2 extends beyond EOD, truncated [ 2959.706386][T30171] loop5: p4 start 917504 is beyond EOD, truncated 17:12:26 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000f0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2959.757910][T30194] loop2: detected capacity change from 0 to 131072 [ 2959.770291][T30198] loop1: detected capacity change from 0 to 1 [ 2959.772460][T30200] loop4: detected capacity change from 0 to 131072 [ 2959.793051][T30202] loop5: detected capacity change from 0 to 1 [ 2959.799365][T30196] loop3: detected capacity change from 0 to 131072 [ 2959.813903][T30194] loop2: p1 < > p2 < > p4 [ 2959.814953][ T1437] loop4: p1 < > p2 < > p4 [ 2959.819711][T30194] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2959.823886][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2959.833951][T30202] loop5: p1 < > p2 < > p4 [ 2959.838382][T30198] loop1: p1 < > p2 < > p4 [ 2959.841028][T30202] loop5: partition table partially beyond EOD, truncated [ 2959.841212][T30202] loop5: p1 start 10 is beyond EOD, [ 2959.845520][T30198] loop1: partition table partially beyond EOD, [ 2959.852518][T30202] truncated [ 2959.852524][T30202] loop5: p2 size 2 extends beyond EOD, [ 2959.857823][T30198] truncated [ 2959.864831][T30198] loop1: p1 start 10 is beyond EOD, [ 2959.867227][T30202] truncated [ 2959.870756][T30202] loop5: p4 start 983040 is beyond EOD, [ 2959.872769][T30198] truncated [ 2959.872774][T30198] loop1: p2 size 2 extends beyond EOD, truncated [ 2959.874270][T30200] loop4: p1 < > p2 < > p4 [ 2959.875915][T30202] truncated [ 2959.882488][T30196] loop3: p1 < > p2 < > p4 17:12:26 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000260000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:26 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000010000000200055aa", 0x40, 0x1c0}]) 17:12:27 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000100000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2959.886332][T30198] loop1: p4 size 2097152 extends beyond EOD, [ 2959.894283][T30196] loop3: p4 size 2097152 extends beyond EOD, [ 2959.899653][T30198] truncated [ 2959.904078][T30196] truncated [ 2959.910191][T30200] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2959.948690][T30206] loop2: detected capacity change from 0 to 131072 17:12:27 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000300000000000000200055aa", 0x40, 0x1c0}]) 17:12:27 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000fde525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2959.978848][T30208] loop5: detected capacity change from 0 to 1 [ 2959.991906][T30210] loop4: detected capacity change from 0 to 131072 [ 2960.015174][T30206] loop2: p1 < > p2 < > p4 [ 2960.019885][T30213] loop1: detected capacity change from 0 to 1 [ 2960.027474][T30206] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2960.036296][T30208] loop5: p1 < > p2 < > p4 [ 2960.037570][T30215] loop3: detected capacity change from 0 to 131072 [ 2960.040724][T30208] loop5: partition table partially beyond EOD, truncated [ 2960.041050][T30208] loop5: p1 start 10 is beyond EOD, [ 2960.047696][ T1437] loop4: p1 < > p2 < > p4 [ 2960.054356][T30208] truncated [ 2960.054361][T30208] loop5: p2 size 2 extends beyond EOD, truncated 17:12:27 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000270000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2960.079251][T30208] loop5: p4 start 1048576 is beyond EOD, truncated [ 2960.085503][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2960.086896][T30213] loop1: p1 < > p2 < > p4 [ 2960.096765][ T1437] loop4: p1 < > p2 < > p4 [ 2960.097117][T30213] loop1: partition table partially beyond EOD, truncated [ 2960.105351][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2960.109380][T30213] loop1: p1 start 10 is beyond EOD, truncated [ 2960.118140][T30215] loop3: p1 < > p2 < > p4 [ 2960.121478][T30213] loop1: p2 size 2 extends beyond EOD, truncated [ 2960.122130][T30213] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2960.134365][T30210] loop4: p1 < > p2 < > p4 [ 2960.150891][T30215] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2960.158613][T30217] loop2: detected capacity change from 0 to 131072 [ 2960.158789][T30210] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2960.211873][T30217] loop2: p1 < > p2 < > p4 [ 2960.221305][T30217] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2960.267693][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 2960.278302][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 2960.288792][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 2960.321283][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 2960.329516][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 2960.331987][ T4634] udevd[4634]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 2960.344448][ T3066] udevd[3066]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 2960.361283][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop5p4, 10) failed: No such file or directory 17:12:27 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @fixed}, 0xe) 17:12:27 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000011000000200055aa", 0x40, 0x1c0}]) 17:12:27 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000110000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:27 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000080300000000000000200055aa", 0x40, 0x1c0}]) 17:12:27 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000fee525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:27 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000280000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2960.529139][T30229] loop1: detected capacity change from 0 to 1 [ 2960.531717][T30225] loop4: detected capacity change from 0 to 131072 [ 2960.542553][T30224] loop5: detected capacity change from 0 to 1 [ 2960.554403][T30226] loop2: detected capacity change from 0 to 131072 17:12:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x328, 0xffffffff, 0xe0, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'team0\x00', 'veth0_macvtap\x00'}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@socket0={{0x20}}, @common=@icmp={{0x28}, {0x0, "291b"}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x198}}, {{@uncond, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'gretap0\x00', 'tunl0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@ttl={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) [ 2960.575357][T30228] loop3: detected capacity change from 0 to 131072 [ 2960.587190][T30225] loop4: p1 < > p2 < > p4 [ 2960.602510][T30234] x_tables: duplicate underflow at hook 2 [ 2960.609328][T30224] loop5: p1 < > p2 < > p4 [ 2960.610822][T30225] loop4: p4 size 2097152 extends beyond EOD, [ 2960.613845][T30224] loop5: partition table partially beyond EOD, [ 2960.613850][T30225] truncated 17:12:27 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000120000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000010c0)={0x14, 0x1, 0x8, 0x101}, 0x14}}, 0x0) [ 2960.629247][T30224] truncated [ 2960.636541][T30229] loop1: p1 < > p2 < > p4 [ 2960.640975][T30229] loop1: partition table partially beyond EOD, truncated [ 2960.641391][T30228] loop3: p1 < > p2 < > p4 [ 2960.648140][ T4230] loop2: p1 < > p2 < > p4 [ 2960.652351][T30229] loop1: p1 start 10 is beyond EOD, truncated [ 2960.663134][T30229] loop1: p2 size 2 extends beyond EOD, truncated [ 2960.670515][ T4230] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:27 executing program 0: sched_rr_get_interval(0x0, 0xfffffffffffffffe) [ 2960.675970][T30224] loop5: p1 start 10 is beyond EOD, truncated [ 2960.682254][T30228] loop3: p4 size 2097152 extends beyond EOD, [ 2960.683585][T30224] loop5: p2 size 2 extends beyond EOD, truncated [ 2960.695073][T30224] loop5: p4 start 1114112 is beyond EOD, truncated [ 2960.696219][T30228] truncated [ 2960.715163][T30226] loop2: p1 < > p2 < > p4 17:12:27 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000000740)=[{{&(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="24000000000000002900000032000000fe800000000000400000fcff000000003775"], 0x28}}], 0x2, 0x0) 17:12:27 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000ffe525000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2960.725996][T30229] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2960.737820][T30238] loop4: detected capacity change from 0 to 131072 [ 2960.745044][T30226] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:27 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x106, 0x6}}, 0x20) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) [ 2960.793169][T30245] loop1: detected capacity change from 0 to 1 [ 2960.805522][T30238] loop4: p1 < > p2 < > p4 17:12:27 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000012000000200055aa", 0x40, 0x1c0}]) 17:12:27 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000290000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2960.835377][T30238] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2960.844948][T30245] loop1: p1 < > p2 < > p4 [ 2960.849471][T30245] loop1: partition table partially beyond EOD, truncated [ 2960.862272][T30245] loop1: p1 start 10 is beyond EOD, truncated [ 2960.868458][T30245] loop1: p2 size 2 extends beyond EOD, truncated [ 2960.877478][T30250] loop2: detected capacity change from 0 to 131072 17:12:27 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000020400000000000000200055aa", 0x40, 0x1c0}]) 17:12:27 executing program 0: pselect6(0x0, 0x0, &(0x7f0000001200), &(0x7f0000001240), 0x0, 0x0) 17:12:27 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2960.881616][T30245] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2960.884242][T30252] loop5: detected capacity change from 0 to 1 17:12:28 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000130000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2960.934149][ T3068] loop2: p1 < > p2 < > p4 [ 2960.943050][ T3068] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2960.951067][T30252] loop5: p1 < > p2 < > p4 [ 2960.955540][T30252] loop5: partition table partially beyond EOD, truncated [ 2960.960489][T30257] loop3: detected capacity change from 0 to 131072 [ 2960.980721][T30260] loop1: detected capacity change from 0 to 1 [ 2960.988671][T30262] loop4: detected capacity change from 0 to 131072 [ 2960.996978][T30250] loop2: p1 < > p2 < > p4 [ 2960.997093][T30252] loop5: p1 start 10 is beyond EOD, truncated [ 2961.005854][T30250] loop2: p4 size 2097152 extends beyond EOD, [ 2961.007503][T30252] loop5: p2 size 2 extends beyond EOD, [ 2961.007509][T30250] truncated [ 2961.007515][T30252] truncated [ 2961.009481][T30252] loop5: p4 start 1179648 is beyond EOD, truncated [ 2961.054980][T30260] loop1: p1 < > p2 < > p4 [ 2961.059440][T30260] loop1: partition table partially beyond EOD, truncated [ 2961.070968][ T4998] loop4: p1 < > p2 < > p4 [ 2961.085064][T30257] loop3: p1 < > p2 < > p4 17:12:28 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000001c000000200055aa", 0x40, 0x1c0}]) 17:12:28 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002a0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2961.099854][ T4998] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2961.117256][T30260] loop1: p1 start 10 is beyond EOD, truncated [ 2961.123363][T30260] loop1: p2 size 2 extends beyond EOD, truncated [ 2961.130104][T30262] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 2961.139574][T30264] loop5: detected capacity change from 0 to 1 17:12:28 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000001e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2961.150400][T30257] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2961.153934][T30260] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2961.164740][T30266] loop2: detected capacity change from 0 to 131072 17:12:28 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000140000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2961.203840][ T1437] loop5: p1 < > p2 < > p4 [ 2961.208285][ T1437] loop5: partition table partially beyond EOD, truncated [ 2961.215427][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2961.221567][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2961.224341][T30266] loop2: p1 < > p2 < > p4 [ 2961.240544][T30266] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2961.242953][T30269] loop1: detected capacity change from 0 to 1 17:12:28 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000060400000000000000200055aa", 0x40, 0x1c0}]) [ 2961.249571][ T1437] loop5: p4 start 1835008 is beyond EOD, truncated [ 2961.256970][T30271] loop4: detected capacity change from 0 to 131072 [ 2961.267726][ T1437] loop5: p1 < > p2 < > p4 [ 2961.272161][ T1437] loop5: partition table partially beyond EOD, truncated [ 2961.280699][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2961.286785][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2961.297544][ T1437] loop5: p4 start 1835008 is beyond EOD, truncated 17:12:28 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002b0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2961.305038][T30269] loop1: p1 < > p2 < > p4 [ 2961.309476][T30269] loop1: partition table partially beyond EOD, truncated [ 2961.318479][T30271] loop4: p1 < > p2 < > p4 [ 2961.323559][T30264] loop5: p1 < > p2 < > p4 [ 2961.324534][T30271] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2961.327993][T30264] loop5: partition table partially beyond EOD, truncated [ 2961.336237][T30269] loop1: p1 start 10 is beyond EOD, truncated [ 2961.346791][T30276] loop2: detected capacity change from 0 to 131072 [ 2961.348014][T30269] loop1: p2 size 2 extends beyond EOD, truncated [ 2961.354783][T30264] loop5: p1 start 10 is beyond EOD, truncated [ 2961.364332][T30269] loop1: p4 size 2097152 extends beyond EOD, [ 2961.366970][T30264] loop5: p2 size 2 extends beyond EOD, [ 2961.366976][T30269] truncated [ 2961.366982][T30264] truncated [ 2961.367539][T30264] loop5: p4 start 1835008 is beyond EOD, truncated [ 2961.396096][T30275] loop3: detected capacity change from 0 to 131072 17:12:28 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000002e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:28 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000150000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2961.396912][ T4998] loop2: p1 < > p2 < > p4 [ 2961.408863][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2961.422398][T30276] loop2: p1 < > p2 < > p4 [ 2961.432037][ T4457] loop3: p1 < > p2 < > p4 [ 2961.437132][T30276] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2961.444495][ T4457] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:28 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000025000000200055aa", 0x40, 0x1c0}]) [ 2961.451216][T30278] loop1: detected capacity change from 0 to 1 [ 2961.470432][T30280] loop4: detected capacity change from 0 to 131072 [ 2961.478075][T30275] loop3: p1 < > p2 < > p4 [ 2961.492822][T30275] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2961.508929][T30283] loop5: detected capacity change from 0 to 1 [ 2961.515607][T30278] loop1: p1 < > p2 < > p4 [ 2961.520043][T30278] loop1: partition table partially beyond EOD, truncated [ 2961.524160][ T1437] loop4: p1 < > p2 < > p4 [ 2961.527929][T30278] loop1: p1 start 10 is beyond EOD, truncated [ 2961.537653][T30278] loop1: p2 size 2 extends beyond EOD, truncated [ 2961.542797][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2961.546207][T30278] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2961.559288][T30280] loop4: p1 < > p2 < > p4 [ 2961.565830][T30280] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2961.584735][ T4856] loop5: p1 < > p2 < > p4 [ 2961.589153][ T4856] loop5: partition table partially beyond EOD, truncated [ 2961.596423][ T4856] loop5: p1 start 10 is beyond EOD, truncated [ 2961.602511][ T4856] loop5: p2 size 2 extends beyond EOD, truncated [ 2961.609361][ T4856] loop5: p4 start 2424832 is beyond EOD, truncated [ 2961.622824][T30283] loop5: p1 < > p2 < > p4 [ 2961.627302][T30283] loop5: partition table partially beyond EOD, truncated [ 2961.634766][T30283] loop5: p1 start 10 is beyond EOD, truncated [ 2961.640856][T30283] loop5: p2 size 2 extends beyond EOD, truncated [ 2961.647761][T30283] loop5: p4 start 2424832 is beyond EOD, truncated 17:12:28 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f00000008c0), &(0x7f0000000900)={0xc8c}, 0x0, 0x0, &(0x7f0000000a00)={0x0}) 17:12:28 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002c0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:28 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000500000000000000200055aa", 0x40, 0x1c0}]) 17:12:28 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000003e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:28 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000160000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:28 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000026000000200055aa", 0x40, 0x1c0}]) 17:12:28 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f0000000000)) [ 2961.771465][T30287] loop2: detected capacity change from 0 to 131072 [ 2961.783263][T30293] loop1: detected capacity change from 0 to 1 [ 2961.788478][T30296] loop5: detected capacity change from 0 to 1 [ 2961.803287][T30292] loop4: detected capacity change from 0 to 131072 17:12:28 executing program 0: r0 = socket(0x26, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}) [ 2961.824815][T30295] loop3: detected capacity change from 0 to 131072 [ 2961.835205][ T4856] loop2: p1 < > p2 < > p4 [ 2961.835388][ T3066] loop1: p1 < > p2 < > p4 [ 2961.840770][ T4856] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2961.844089][ T3066] loop1: partition table partially beyond EOD, truncated [ 2961.858219][ T4998] loop5: p1 < > p2 < > p4 [ 2961.862647][ T4998] loop5: partition table partially beyond EOD, truncated 17:12:28 executing program 0: r0 = socket(0x26, 0x5, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) [ 2961.875436][T30287] loop2: p1 < > p2 < > p4 [ 2961.877645][ T4998] loop5: p1 start 10 is beyond EOD, truncated [ 2961.885985][ T4998] loop5: p2 size 2 extends beyond EOD, truncated [ 2961.891796][T30287] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2961.893168][ T3066] loop1: p1 start 10 is beyond EOD, truncated [ 2961.905304][ T3066] loop1: p2 size 2 extends beyond EOD, truncated [ 2961.911936][ T4998] loop5: p4 start 2490368 is beyond EOD, truncated [ 2961.918751][ T4457] loop4: p1 < > p2 < > p4 [ 2961.931563][T30295] loop3: p1 < > p2 < > p4 [ 2961.950262][ T4457] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2961.960222][T30296] loop5: p1 < > p2 < > p4 [ 2961.962977][T30295] loop3: p4 size 2097152 extends beyond EOD, [ 2961.964695][T30296] loop5: partition table partially beyond EOD, truncated 17:12:29 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002d0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2961.966344][T30296] loop5: p1 start 10 is beyond EOD, [ 2961.970958][T30295] truncated [ 2961.977985][T30296] truncated [ 2961.977990][T30296] loop5: p2 size 2 extends beyond EOD, truncated [ 2961.992229][T30296] loop5: p4 start 2490368 is beyond EOD, truncated [ 2962.005049][ T3066] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2962.014365][T30292] loop4: p1 < > p2 < > p4 [ 2962.020814][T30293] loop1: p1 < > p2 < > p4 17:12:29 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x0, 0x1}) 17:12:29 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000002e000000200055aa", 0x40, 0x1c0}]) 17:12:29 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000170000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2962.025450][T30293] loop1: partition table partially beyond EOD, truncated [ 2962.046496][T30293] loop1: p1 start 10 is beyond EOD, truncated [ 2962.052606][T30293] loop1: p2 size 2 extends beyond EOD, truncated [ 2962.063207][T30292] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:29 executing program 0: getresuid(&(0x7f0000013900), 0x0, 0x0) [ 2962.098433][T30310] loop2: detected capacity change from 0 to 131072 [ 2962.101297][T30293] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2962.138449][T30316] loop5: detected capacity change from 0 to 1 [ 2962.155191][T30318] loop4: detected capacity change from 0 to 131072 [ 2962.176290][T30310] loop2: p1 < > p2 < > p4 [ 2962.182153][T30310] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2962.190243][ T4998] loop5: p1 < > p2 < > p4 [ 2962.194691][ T4998] loop5: partition table partially beyond EOD, truncated 17:12:29 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000009c0500000000000000200055aa", 0x40, 0x1c0}]) 17:12:29 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x30000, 0x0) 17:12:29 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000004e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:29 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002e0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2962.205155][ T4457] loop4: p1 < > p2 < > p4 [ 2962.210545][ T4457] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2962.217836][ T4998] loop5: p1 start 10 is beyond EOD, truncated [ 2962.224063][ T4998] loop5: p2 size 2 extends beyond EOD, truncated [ 2962.236861][T30318] loop4: p1 < > p2 < > p4 [ 2962.256198][T30318] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2962.262871][T30323] loop1: detected capacity change from 0 to 1 [ 2962.266454][ T4998] loop5: p4 start 3014656 is beyond EOD, truncated 17:12:29 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) 17:12:29 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000180000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:29 executing program 0: ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000cc0)={'wg2\x00'}) [ 2962.297073][T30326] loop2: detected capacity change from 0 to 131072 [ 2962.305511][T30316] loop5: p1 < > p2 < > p4 [ 2962.309947][T30316] loop5: partition table partially beyond EOD, truncated [ 2962.330816][T30316] loop5: p1 start 10 is beyond EOD, truncated [ 2962.337007][T30316] loop5: p2 size 2 extends beyond EOD, truncated 17:12:29 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002700), 0x2, 0x0) [ 2962.347464][T30329] loop3: detected capacity change from 0 to 131072 [ 2962.356600][T30316] loop5: p4 start 3014656 is beyond EOD, truncated [ 2962.359228][T30335] loop4: detected capacity change from 0 to 131072 [ 2962.370789][T30323] loop1: p1 < > p2 < > p4 [ 2962.375311][T30323] loop1: partition table partially beyond EOD, truncated [ 2962.390906][T30323] loop1: p1 start 10 is beyond EOD, truncated 17:12:29 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000048000000200055aa", 0x40, 0x1c0}]) 17:12:29 executing program 0: keyctl$join(0x1, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), 0xffffffffffffffff) [ 2962.397051][T30323] loop1: p2 size 2 extends beyond EOD, truncated [ 2962.407424][ T4856] loop2: p1 < > p2 < > p4 [ 2962.413571][T30323] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2962.415803][T30329] loop3: p1 < > p2 < > p4 [ 2962.428260][ T4856] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2962.436926][T30335] loop4: p1 < > p2 < > p4 17:12:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) [ 2962.450709][T30335] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2962.452150][T30329] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2962.467982][T30326] loop2: p1 < > p2 < > p4 [ 2962.481460][T30344] loop5: detected capacity change from 0 to 1 [ 2962.482884][T30326] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:29 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000005e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2962.514842][T30344] loop5: p1 < > p2 < > p4 [ 2962.519310][T30344] loop5: partition table partially beyond EOD, truncated [ 2962.536201][T30344] loop5: p1 start 10 is beyond EOD, truncated [ 2962.542427][T30344] loop5: p2 size 2 extends beyond EOD, truncated [ 2962.550987][T30344] loop5: p4 start 4718592 is beyond EOD, truncated [ 2962.553938][T30349] loop1: detected capacity change from 0 to 1 [ 2962.595598][T30349] loop1: p1 < > p2 < > p4 [ 2962.600104][T30349] loop1: partition table partially beyond EOD, truncated 17:12:29 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000c20500000000000000200055aa", 0x40, 0x1c0}]) 17:12:29 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, 0xfffffffffffffffd, &(0x7f0000000080)) 17:12:29 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000190000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:29 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000004c000000200055aa", 0x40, 0x1c0}]) 17:12:29 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002f0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2962.636225][T30349] loop1: p1 start 10 is beyond EOD, truncated [ 2962.642325][T30349] loop1: p2 size 2 extends beyond EOD, truncated [ 2962.665684][T30353] loop4: detected capacity change from 0 to 131072 [ 2962.677280][T30358] loop5: detected capacity change from 0 to 1 17:12:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001180)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001140)={0x0}}, 0x0) 17:12:29 executing program 0: pselect6(0x40, &(0x7f00000008c0), &(0x7f0000000900), 0x0, &(0x7f0000000980)={0x0, 0x3938700}, 0x0) [ 2962.688692][T30359] loop2: detected capacity change from 0 to 131072 [ 2962.707856][T30349] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:29 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000006e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2962.736192][ T4856] loop5: p1 < > p2 < > p4 [ 2962.740636][ T4856] loop5: partition table partially beyond EOD, truncated [ 2962.741792][T30360] loop3: detected capacity change from 0 to 131072 [ 2962.755446][ T4856] loop5: p1 start 10 is beyond EOD, truncated [ 2962.761545][ T4856] loop5: p2 size 2 extends beyond EOD, truncated [ 2962.773565][ T4998] loop4: p1 < > p2 < > p4 [ 2962.779921][T30359] loop2: p1 < > p2 < > p4 [ 2962.794730][ T4998] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2962.815745][T30360] loop3: p1 < > p2 < > p4 [ 2962.819873][T30359] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2962.830304][ T4856] loop5: p4 start 4980736 is beyond EOD, truncated 17:12:29 executing program 0: socketpair(0x22, 0x2, 0x1, 0x0) [ 2962.843221][T30368] loop1: detected capacity change from 0 to 1 [ 2962.843749][T30353] loop4: p1 < > p2 < > p4 [ 2962.859612][T30353] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2962.861434][T30358] loop5: p1 < > p2 < > p4 [ 2962.870964][T30358] loop5: partition table partially beyond EOD, truncated [ 2962.884889][T30358] loop5: p1 start 10 is beyond EOD, truncated 17:12:29 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000008840)='tasks\x00', 0x2, 0x0) 17:12:29 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001a0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2962.891001][T30358] loop5: p2 size 2 extends beyond EOD, truncated [ 2962.905926][T30360] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2962.918750][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 2962.929756][ T4634] udevd[4634]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory 17:12:30 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000054000000200055aa", 0x40, 0x1c0}]) [ 2962.940380][ T3066] udevd[3066]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 2962.951475][T30358] loop5: p4 start 4980736 is beyond EOD, truncated [ 2962.972224][T30368] loop1: p1 < > p2 < > p4 [ 2962.976685][T30368] loop1: partition table partially beyond EOD, truncated [ 2962.994316][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 2963.001876][T30376] loop4: detected capacity change from 0 to 131072 [ 2963.019640][ T4634] udevd[4634]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 2963.030122][ T3066] udevd[3066]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory 17:12:30 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000600000000000000200055aa", 0x40, 0x1c0}]) 17:12:30 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000300000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:30 executing program 0: r0 = socket(0x25, 0x5, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @loopback}}}}) [ 2963.035573][T30378] loop5: detected capacity change from 0 to 1 [ 2963.042152][T30368] loop1: p1 start 10 is beyond EOD, truncated [ 2963.052464][T30368] loop1: p2 size 2 extends beyond EOD, truncated [ 2963.061739][T30368] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2963.075017][T30376] loop4: p1 < > p2 < > p4 [ 2963.080636][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 2963.106777][ T4998] loop5: p1 < > p2 < > p4 [ 2963.111230][ T4998] loop5: partition table partially beyond EOD, truncated [ 2963.122411][T30376] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2963.124885][T30381] loop2: detected capacity change from 0 to 131072 [ 2963.136527][ T4998] loop5: p1 start 10 is beyond EOD, truncated [ 2963.142616][ T4998] loop5: p2 size 2 extends beyond EOD, truncated 17:12:30 executing program 0: io_setup(0xf5, &(0x7f0000000000)) 17:12:30 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000007e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2963.152586][ T4998] loop5: p4 start 5505024 is beyond EOD, truncated 17:12:30 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001b0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2963.212611][T30378] loop5: p1 < > p2 < > p4 [ 2963.217145][T30378] loop5: partition table partially beyond EOD, truncated [ 2963.226924][T30390] loop1: detected capacity change from 0 to 1 [ 2963.236387][T30381] loop2: p1 < > p2 < > p4 [ 2963.243476][T30385] loop3: detected capacity change from 0 to 131072 [ 2963.250710][T30381] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={0x0}}, 0x0) 17:12:30 executing program 0: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, 0x0) [ 2963.264253][T30378] loop5: p1 start 10 is beyond EOD, truncated [ 2963.270512][T30378] loop5: p2 size 2 extends beyond EOD, truncated [ 2963.283997][T30390] loop1: p1 < > p2 < > p4 [ 2963.288443][T30390] loop1: partition table partially beyond EOD, truncated [ 2963.296541][T30378] loop5: p4 start 5505024 is beyond EOD, truncated [ 2963.304563][T30390] loop1: p1 start 10 is beyond EOD, truncated 17:12:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)={0x38, 0x1, 0x2, 0x3, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}]}]}, 0x38}}, 0x0) 17:12:30 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000055000000200055aa", 0x40, 0x1c0}]) [ 2963.310671][T30390] loop1: p2 size 2 extends beyond EOD, truncated [ 2963.323434][T30395] loop4: detected capacity change from 0 to 131072 [ 2963.332589][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 2963.344647][T30385] loop3: p1 < > p2 < > p4 [ 2963.344973][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop5p2, 10) failed: No such file or directory 17:12:30 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000310000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2963.359485][T30390] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2963.368245][T30385] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2963.371371][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop5p4, 10) failed: No such file or directory 17:12:30 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) io_setup(0xf5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000008c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1}]) [ 2963.405070][ T4856] loop4: p1 < > p2 < > p4 [ 2963.405073][T30403] loop2: detected capacity change from 0 to 131072 [ 2963.423300][T30402] loop5: detected capacity change from 0 to 1 [ 2963.434184][ T4856] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:30 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000040600000000000000200055aa", 0x40, 0x1c0}]) 17:12:30 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000008e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2963.454311][T30403] loop2: p1 < > p2 < > p4 [ 2963.465391][ T4998] loop5: p1 < > p2 < > p4 [ 2963.469819][ T4998] loop5: partition table partially beyond EOD, truncated [ 2963.477415][T30403] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2963.486057][T30395] loop4: p1 < > p2 < > p4 [ 2963.488811][T30411] loop1: detected capacity change from 0 to 1 [ 2963.493350][T30395] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:30 executing program 0: r0 = socket(0x26, 0x5, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0x0) [ 2963.498076][ T4998] loop5: p1 start 10 is beyond EOD, truncated [ 2963.509915][ T4998] loop5: p2 size 2 extends beyond EOD, truncated [ 2963.526255][T30410] loop3: detected capacity change from 0 to 131072 17:12:30 executing program 0: keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x3}) 17:12:30 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001c0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2963.554329][ T4998] loop5: p4 start 5570560 is beyond EOD, truncated [ 2963.561979][T30402] loop5: p1 < > p2 < > p4 [ 2963.566433][T30402] loop5: partition table partially beyond EOD, truncated [ 2963.575290][T30411] loop1: p1 < > p2 < > p4 [ 2963.579720][T30411] loop1: partition table partially beyond EOD, truncated [ 2963.594484][T30410] loop3: p1 < > p2 < > p4 [ 2963.600123][T30402] loop5: p1 start 10 is beyond EOD, truncated 17:12:30 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000320000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000cc0)={'wg2\x00'}) [ 2963.606227][T30402] loop5: p2 size 2 extends beyond EOD, truncated [ 2963.614428][T30411] loop1: p1 start 10 is beyond EOD, truncated [ 2963.620624][T30411] loop1: p2 size 2 extends beyond EOD, truncated [ 2963.630663][T30410] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2963.633282][T30402] loop5: p4 start 5570560 is beyond EOD, truncated [ 2963.647265][T30422] loop2: detected capacity change from 0 to 131072 17:12:30 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000060000000200055aa", 0x40, 0x1c0}]) [ 2963.651645][T30411] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2963.664930][T30417] loop4: detected capacity change from 0 to 131072 17:12:30 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000009e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:30 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000700000000000000200055aa", 0x40, 0x1c0}]) [ 2963.710620][T30422] loop2: p1 < > p2 < > p4 [ 2963.716539][T30417] loop4: p1 < > p2 < > p4 [ 2963.727157][T30427] loop5: detected capacity change from 0 to 1 [ 2963.736575][T30422] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2963.744274][T30417] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2963.755800][T30430] loop1: detected capacity change from 0 to 1 [ 2963.766982][T30432] loop3: detected capacity change from 0 to 131072 [ 2963.795596][ T1437] loop5: p1 < > p2 < > p4 [ 2963.795643][T30432] loop3: p1 < > p2 < > p4 17:12:30 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000002320000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:30 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000181c0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2963.800045][ T1437] loop5: partition table partially beyond EOD, truncated [ 2963.808854][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2963.812251][T30430] loop1: p1 < > p2 < > p4 [ 2963.817842][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2963.822249][T30430] loop1: partition table partially beyond EOD, truncated [ 2963.823217][T30430] loop1: p1 start 10 is beyond EOD, [ 2963.832548][ T1437] loop5: p4 start 6291456 is beyond EOD, [ 2963.835703][T30430] truncated [ 2963.840991][ T1437] truncated [ 2963.847170][T30432] loop3: p4 size 2097152 extends beyond EOD, [ 2963.849838][T30430] loop1: p2 size 2 extends beyond EOD, truncated [ 2963.865719][T30432] truncated [ 2963.870795][ T1437] loop5: p1 < > p2 < > p4 [ 2963.875322][ T1437] loop5: partition table partially beyond EOD, truncated [ 2963.879495][T30435] loop2: detected capacity change from 0 to 131072 [ 2963.882551][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2963.894755][T30438] loop4: detected capacity change from 0 to 131072 [ 2963.895160][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2963.902259][T30430] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2963.916097][ T1437] loop5: p4 start 6291456 is beyond EOD, truncated [ 2963.923193][T30427] loop5: p1 < > p2 < > p4 [ 2963.927692][T30427] loop5: partition table partially beyond EOD, truncated [ 2963.934906][T30427] loop5: p1 start 10 is beyond EOD, truncated [ 2963.941118][T30427] loop5: p2 size 2 extends beyond EOD, truncated [ 2963.947946][T30427] loop5: p4 start 6291456 is beyond EOD, truncated [ 2963.956357][T30435] loop2: p1 < > p2 < > p4 17:12:31 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000063000000200055aa", 0x40, 0x1c0}]) 17:12:31 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000ae625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:31 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000030800000000000000200055aa", 0x40, 0x1c0}]) [ 2963.960934][T30438] loop4: p1 < > p2 < > p4 [ 2963.972817][T30435] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2963.982367][T30438] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2964.003821][T30440] loop1: detected capacity change from 0 to 1 [ 2964.015636][T30443] loop5: detected capacity change from 0 to 1 [ 2964.027662][T30445] loop3: detected capacity change from 0 to 131072 [ 2964.044430][ T1437] loop1: p1 < > p2 < > p4 [ 2964.048877][ T1437] loop1: partition table partially beyond EOD, truncated [ 2964.049536][T30443] loop5: p1 < > p2 < > p4 17:12:31 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001d0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:31 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000330000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2964.060441][T30443] loop5: partition table partially beyond EOD, truncated [ 2964.064905][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2964.073585][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2964.081441][T30443] loop5: p1 start 10 is beyond EOD, truncated [ 2964.085542][T30445] loop3: p1 < > p2 < > p4 [ 2964.087665][T30443] loop5: p2 size 2 extends beyond EOD, truncated [ 2964.088853][T30443] loop5: p4 start 6488064 is beyond EOD, truncated [ 2964.107092][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2964.107955][T30445] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2964.116817][T30447] loop4: detected capacity change from 0 to 131072 [ 2964.124867][T30449] loop2: detected capacity change from 0 to 131072 [ 2964.135609][T30440] loop1: p1 < > p2 < > p4 [ 2964.140090][T30440] loop1: partition table partially beyond EOD, truncated [ 2964.147323][T30440] loop1: p1 start 10 is beyond EOD, truncated [ 2964.153393][T30440] loop1: p2 size 2 extends beyond EOD, truncated 17:12:31 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000068000000200055aa", 0x40, 0x1c0}]) [ 2964.160114][T30440] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2964.174405][T30449] loop2: p1 < > p2 < > p4 [ 2964.174631][T30447] loop4: p1 < > p2 < > p4 [ 2964.181809][T30449] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2964.196491][T30447] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2964.201082][T30452] loop5: detected capacity change from 0 to 1 [ 2964.216959][ T1437] loop2: p1 < > p2 < > p4 [ 2964.222701][ T1437] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2964.244261][T30452] loop5: p1 < > p2 < > p4 [ 2964.248720][T30452] loop5: partition table partially beyond EOD, truncated [ 2964.265964][T30452] loop5: p1 start 10 is beyond EOD, truncated [ 2964.272086][T30452] loop5: p2 size 2 extends beyond EOD, truncated [ 2964.279260][T30452] loop5: p4 start 6815744 is beyond EOD, truncated 17:12:31 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000004c0)={0x0, 0xc, &(0x7f00000007c0)="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"}) 17:12:31 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000900000000000000200055aa", 0x40, 0x1c0}]) 17:12:31 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000be625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:31 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000340000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:31 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001e0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:31 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000006c000000200055aa", 0x40, 0x1c0}]) [ 2964.501415][T30456] loop5: detected capacity change from 0 to 1 [ 2964.514976][T30462] loop1: detected capacity change from 0 to 1 [ 2964.519792][T30464] loop4: detected capacity change from 0 to 131072 [ 2964.540295][T30461] loop2: detected capacity change from 0 to 131072 17:12:31 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000001e40)=[{{&(0x7f0000000000)=@isdn={0x22, 0x0, 0x0, 0x2}, 0x80, 0x0}}], 0x1, 0x0) [ 2964.567788][T30463] loop3: detected capacity change from 0 to 131072 [ 2964.576099][T30462] loop1: p1 < > p2 < > p4 [ 2964.580533][T30462] loop1: partition table partially beyond EOD, truncated [ 2964.590581][T30456] loop5: p1 < > p2 < > p4 [ 2964.595053][T30456] loop5: partition table partially beyond EOD, truncated [ 2964.605386][T30456] loop5: p1 start 10 is beyond EOD, truncated [ 2964.611601][T30456] loop5: p2 size 2 extends beyond EOD, truncated [ 2964.619775][ T4998] loop3: p1 < > p2 < > p4 [ 2964.619819][ T4457] loop2: p1 < > p2 < > p4 [ 2964.621003][ T4457] loop2: p4 size 2097152 extends beyond EOD, [ 2964.624294][T30464] loop4: p1 < > p2 < > p4 [ 2964.628688][ T4457] truncated [ 2964.645521][T30461] loop2: p1 < > p2 < > p4 [ 2964.649112][T30462] loop1: p1 start 10 is beyond EOD, truncated [ 2964.654340][T30456] loop5: p4 start 7077888 is beyond EOD, truncated [ 2964.656128][T30462] loop1: p2 size 2 extends beyond EOD, truncated 17:12:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000009300)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000091c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x2, 0x0) [ 2964.667237][T30461] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2964.669048][ T4998] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2964.697949][T30463] loop3: p1 < > p2 < > p4 [ 2964.701895][T30464] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:31 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000350000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:31 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000072000000200055aa", 0x40, 0x1c0}]) [ 2964.731586][T30463] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2964.735139][T30462] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:31 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000001f0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:31 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000ce625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:31 executing program 0: getegid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8983, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) fork() [ 2964.789311][T30475] loop5: detected capacity change from 0 to 1 [ 2964.805067][T30476] loop2: detected capacity change from 0 to 131072 [ 2964.831623][T30478] loop1: detected capacity change from 0 to 1 [ 2964.845973][T30476] loop2: p1 < > p2 < > p4 [ 2964.851439][T30475] loop5: p1 < > p2 < > p4 [ 2964.852024][T30476] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2964.855908][T30475] loop5: partition table partially beyond EOD, truncated [ 2964.856251][T30475] loop5: p1 start 10 is beyond EOD, truncated [ 2964.876007][T30475] loop5: p2 size 2 extends beyond EOD, truncated [ 2964.890918][T30475] loop5: p4 start 7471104 is beyond EOD, truncated [ 2964.906480][T30480] loop4: detected capacity change from 0 to 131072 17:12:31 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000a00000000000000200055aa", 0x40, 0x1c0}]) 17:12:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000023c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000006bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:12:31 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000360000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2964.933933][T30478] loop1: p1 < > p2 < > p4 [ 2964.938398][T30478] loop1: partition table partially beyond EOD, truncated [ 2964.972481][T30478] loop1: p1 start 10 is beyond EOD, truncated 17:12:32 executing program 0: name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 2964.978659][T30478] loop1: p2 size 2 extends beyond EOD, truncated [ 2964.996082][T30490] loop2: detected capacity change from 0 to 131072 [ 2965.008475][T30480] loop4: p1 < > p2 < > p4 17:12:32 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000074000000200055aa", 0x40, 0x1c0}]) 17:12:32 executing program 0: msgctl$IPC_RMID(0x0, 0x0) msgsnd(0x0, &(0x7f00000022c0)=ANY=[@ANYBLOB="03"], 0x1008, 0x0) [ 2965.036584][T30480] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2965.060069][T30478] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2965.069378][T30491] loop3: detected capacity change from 0 to 131072 17:12:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000023c0)=[{{0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000000040)="12", 0x1}], 0x1}}], 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000006bc0)=[{{0x0, 0x0, &(0x7f0000006a00)=[{&(0x7f0000006480)=""/150, 0x96}], 0x1}}], 0x1, 0x0, 0x0) 17:12:32 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000200000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2965.088169][ T4998] loop2: p1 < > p2 < > p4 [ 2965.094437][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2965.097439][T30498] loop5: detected capacity change from 0 to 1 17:12:32 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000de625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2965.137012][T30498] loop5: p1 < > p2 < > p4 [ 2965.141598][T30498] loop5: partition table partially beyond EOD, truncated [ 2965.150504][T30490] loop2: p1 < > p2 < > p4 [ 2965.156071][T30491] loop3: p1 < > p2 < > p4 [ 2965.159728][T30490] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2965.170553][T30498] loop5: p1 start 10 is beyond EOD, truncated [ 2965.176673][T30498] loop5: p2 size 2 extends beyond EOD, truncated 17:12:32 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x4, @tid=0xffffffffffffffff}) 17:12:32 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) 17:12:32 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000370000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2965.185967][T30491] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2965.189591][T30498] loop5: p4 start 7602176 is beyond EOD, truncated [ 2965.201437][T30505] loop4: detected capacity change from 0 to 131072 [ 2965.209368][T30502] loop1: detected capacity change from 0 to 1 17:12:32 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000b00000000000000200055aa", 0x40, 0x1c0}]) 17:12:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000040)={0x0, 0x42, 0x0}, 0x0) 17:12:32 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000007a000000200055aa", 0x40, 0x1c0}]) [ 2965.290161][T30502] loop1: p1 < > p2 < > p4 [ 2965.294665][T30502] loop1: partition table partially beyond EOD, truncated [ 2965.304221][ T4457] loop4: p1 < > p2 < > p4 [ 2965.311608][ T4457] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2965.312702][T30512] loop2: detected capacity change from 0 to 131072 [ 2965.326671][T30502] loop1: p1 start 10 is beyond EOD, truncated [ 2965.333140][T30502] loop1: p2 size 2 extends beyond EOD, truncated 17:12:32 executing program 0: rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f00000000c0)={0x77359400}, 0x8) 17:12:32 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000ee625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2965.341849][T30502] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2965.351717][T30515] loop5: detected capacity change from 0 to 1 [ 2965.363580][T30505] loop4: p1 < > p2 < > p4 [ 2965.369496][T30512] loop2: p1 < > p2 < > p4 [ 2965.393626][T30505] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2965.415793][T30523] loop1: detected capacity change from 0 to 1 [ 2965.417507][T30512] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2965.424037][T30515] loop5: p1 < > p2 < > p4 [ 2965.433329][T30515] loop5: partition table partially beyond EOD, truncated 17:12:32 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000210000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2965.446402][T30519] loop3: detected capacity change from 0 to 131072 [ 2965.469365][T30515] loop5: p1 start 10 is beyond EOD, truncated [ 2965.475536][T30515] loop5: p2 size 2 extends beyond EOD, truncated [ 2965.485217][T30523] loop1: p1 < > p2 < > p4 [ 2965.489701][T30523] loop1: partition table partially beyond EOD, truncated [ 2965.498604][T30523] loop1: p1 start 10 is beyond EOD, truncated [ 2965.504738][T30523] loop1: p2 size 2 extends beyond EOD, truncated [ 2965.504817][T30519] loop3: p1 < > p2 < > p4 [ 2965.511164][T30515] loop5: p4 start 7995392 is beyond EOD, truncated [ 2965.525222][T30523] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:32 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000380000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:32 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000089000000200055aa", 0x40, 0x1c0}]) 17:12:32 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000fe625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2965.551087][T30526] loop4: detected capacity change from 0 to 131072 [ 2965.576563][T30519] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2965.589234][T30529] loop2: detected capacity change from 0 to 131072 [ 2965.614039][T30532] loop1: detected capacity change from 0 to 1 [ 2965.620051][T30533] loop5: detected capacity change from 0 to 1 [ 2965.634190][ T4457] loop4: p1 < > p2 < > p4 [ 2965.639870][ T4457] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2965.647288][T30529] loop2: p1 < > p2 < > p4 [ 2965.653130][T30529] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2965.661217][T30533] loop5: p1 < > p2 < > p4 [ 2965.665700][T30533] loop5: partition table partially beyond EOD, truncated [ 2965.672978][T30532] loop1: p1 < > p2 < > p4 [ 2965.677546][T30532] loop1: partition table partially beyond EOD, truncated [ 2965.686394][T30533] loop5: p1 start 10 is beyond EOD, truncated [ 2965.692504][T30533] loop5: p2 size 2 extends beyond EOD, truncated [ 2965.699711][T30532] loop1: p1 start 10 is beyond EOD, truncated [ 2965.705820][T30532] loop1: p2 size 2 extends beyond EOD, truncated 17:12:32 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000c00000000000000200055aa", 0x40, 0x1c0}]) 17:12:32 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000390000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:32 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000220000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2965.722966][T30526] loop4: p1 < > p2 < > p4 [ 2965.728877][T30526] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2965.737184][T30532] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2965.752062][T30533] loop5: p4 start 8978432 is beyond EOD, truncated 17:12:32 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000230000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:32 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000010e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2965.812187][T30538] loop2: detected capacity change from 0 to 131072 [ 2965.827632][T30536] loop3: detected capacity change from 0 to 131072 [ 2965.845191][T30538] loop2: p1 < > p2 < > p4 17:12:32 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000090000000200055aa", 0x40, 0x1c0}]) [ 2965.856168][T30538] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2965.865916][T30536] loop3: p1 < > p2 < > p4 [ 2965.881069][T30546] loop4: detected capacity change from 0 to 131072 [ 2965.881806][T30548] loop1: detected capacity change from 0 to 1 [ 2965.887905][T30544] loop5: detected capacity change from 0 to 1 [ 2965.898905][T30536] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2965.947324][T30544] loop5: p1 < > p2 < > p4 [ 2965.951763][T30544] loop5: partition table partially beyond EOD, truncated [ 2965.960407][T30548] loop1: p1 < > p2 < > p4 [ 2965.964958][T30548] loop1: partition table partially beyond EOD, truncated [ 2965.980569][T30548] loop1: p1 start 10 is beyond EOD, truncated [ 2965.980623][T30544] loop5: p1 start 10 is beyond EOD, [ 2965.986717][T30548] loop1: p2 size 2 extends beyond EOD, truncated [ 2965.987048][T30546] loop4: p1 < > p2 < > p4 [ 2965.992033][T30544] truncated [ 2965.992038][T30544] loop5: p2 size 2 extends beyond EOD, [ 2966.001912][T30548] loop1: p4 size 2097152 extends beyond EOD, [ 2966.002842][T30544] truncated [ 2966.004806][T30544] loop5: p4 start 9437184 is beyond EOD, [ 2966.005985][T30548] truncated [ 2966.011491][T30544] truncated [ 2966.040448][T30546] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000003200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmmsg$unix(r1, &(0x7f0000003340)=[{{0xfffffffffffffffe, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:12:33 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003a0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:33 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000d00000000000000200055aa", 0x40, 0x1c0}]) 17:12:33 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000240000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:33 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000098000000200055aa", 0x40, 0x1c0}]) 17:12:33 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000011e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000200)={0x0, 0x0, 0x0, {}, {}, @ramp}) [ 2966.260521][T30554] loop2: detected capacity change from 0 to 131072 [ 2966.272291][T30557] loop5: detected capacity change from 0 to 1 [ 2966.272497][T30558] loop4: detected capacity change from 0 to 131072 [ 2966.287664][T30556] loop1: detected capacity change from 0 to 1 [ 2966.305643][ T4457] loop5: p1 < > p2 < > p4 17:12:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000040), 0x4) [ 2966.310087][ T4457] loop5: partition table partially beyond EOD, truncated [ 2966.317085][T30562] loop3: detected capacity change from 0 to 131072 [ 2966.325091][ T4457] loop5: p1 start 10 is beyond EOD, truncated [ 2966.331200][ T4457] loop5: p2 size 2 extends beyond EOD, truncated [ 2966.339035][ T4457] loop5: p4 start 9961472 is beyond EOD, truncated [ 2966.346452][T30557] loop5: p1 < > p2 < > p4 [ 2966.350911][T30557] loop5: partition table partially beyond EOD, truncated [ 2966.361650][T30556] loop1: p1 < > p2 < > p4 [ 2966.361906][ T4998] loop4: p1 < > p2 < > p4 [ 2966.366120][T30556] loop1: partition table partially beyond EOD, truncated [ 2966.370631][ T4230] loop2: p1 < > p2 < > p4 [ 2966.382391][ T4856] loop3: p1 < > p2 < > p4 [ 2966.388019][ T4998] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2966.395912][ T4856] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:33 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}) [ 2966.405744][ T4230] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2966.413239][T30557] loop5: p1 start 10 is beyond EOD, truncated [ 2966.413487][T30556] loop1: p1 start 10 is beyond EOD, [ 2966.419374][T30557] loop5: p2 size 2 extends beyond EOD, truncated [ 2966.423916][T30557] loop5: p4 start 9961472 is beyond EOD, [ 2966.424700][T30556] truncated [ 2966.431100][T30557] truncated [ 2966.436802][T30556] loop1: p2 size 2 extends beyond EOD, truncated [ 2966.455426][T30558] loop4: p1 < > p2 < > p4 17:12:33 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000002580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002540)={&(0x7f00000001c0)={0x1ec4, 0x14, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x1001, 0x1, "0e873ed527da5c22d3ee2e9197eff28a2bd80ebde00c754317a0cb6b49f7154b45d2f5f48823d631310033182d1719c686c6a3871b84b292d7d738f662c70de2b4bb934b046e5fbc8f6c071476973c4e136fb8157c73324e7a73ad595efaf3a5ea6055aacd8efd3d2b860c074b177407824f793216b3a799ff480821adc5c0323e633c63f1d4af39749fa68df3febfa189636abec66d4403d2867c57c85a861b53c415ee889346316d793adcb1c18e134a4764972d9ff617081588697ca484098aaa9cf84ee04be628db7d4e5336517fe8d6ebc2d3c701934a86e2fff34de7d61d5b8be348a16fd48e1e93ad60430f9601f61bbf84d6de9bd6e826971251e2d1892d58d8304016a2de1b7f0c38e34346e3a444a229505b4b587a5140692ae9efdfb0427281e2aae92ef0555c8a69e12b2671adea6dc3fa1055ac3d3e44573e5c09801694375382e8839a9d5840575293c56f04960cef1571e04ef522c914d53730cd69a7c49bad76bbecedcca119291a025af67b6b3c121fadb7e6a6198a07f40b912a116e827d543297d8b71958333ec8fd39306552df638ce8002aa968fb21a0e654ba30feca5b3dddf666c12b7b4883148bb9acc181f2f2677150c719bb3209c337d96111ee20f739a23b273d43aa60aeedf139970fe4f917bd3ee9d083547c2f46f1d2892bb9d9bc531a1d441f207fe1c2a214333b7f8c5ed70134f47fd711851f789b5d2182cfb5126a346e1b4e3b3ffcedb255ccc8f703361def6663a051c2e461a4719320e7570a5c9b64577f7d0cbdbb71494b579bab8e0d1868ea756138b20d411c666c5026f3a2c4525e40d4db9cc210e3794906b54774a256ba601b03442c716812e8600fdf8c12bc9e01103f8b49b439dec417875837c3b7656eecf84f7f9f426d441fe1d014bd32518dbbae1945952015552b6b8d3a7f263ae7fa5c483e9ec40f6ecf94fc77c2e6b60e9158fbd02e634c44ceeb365461b4d065a9d9be5848a9ffac79ff6fbc683b213e8282f54e8d08abee68ff5b4f00e770820d9d11dec6e8d18383a0a4b13ca9710db8e7ee0c5f168cfe3f55141c75a46072e595d04a365a65a9f8c73b89c3c208c91f761d4d1792742a98581f8e0eb877a6f9d7374acdfd3cf5a37551895440e64b763c84b828a505dea7ca57fea9823a75da09f0055de11eda762f58ef5127feeb6b7df737e41fb73c5477be05f3a724e86d2cb3cc032786576485c18057e69d9d0560a66e7cccb46a63b24f49b7fbac7eb153b10d2c5e230db56de3e3a0a5e28be099e2bc439953c2f05d1f146bfb8f5a0dd2435099180998f0c8c4cd92d1ba0057fff2552db436efbcc5b6c68c981ee6dcfa00c06bdbda0831bcb7d76e8acfd3c09f552a945bc8ad645fa688476f302ccfac9464d00a5cdd8541b774a83326387f47ce7631a64b5d6c84cb4e1a38cb12f30ca11f0b2a72cadb36bcd548f0ece486704e7c0cb74d57106a1702a27ef4118d564f7e5f06b26b633b9446cb5262d854e6c971e2dde2360c61b33b59d795637bbd2d5741545fde9bfbe57442c8a3ba569dab04399960aa394e308ce4d0ff0f708bf5929405a287f266e1f2740ff65f276a1a6622cfef7e5b9ba2b1e7bb86ee5feac14be010ed9cc26e0eebad0e7a298a6e0f225677b6beb8447afc4b8a1a43c493a624d9a906a4e9e4ffe467ca3c6436aa94543412610f4d373d67244c32d6049b2b63be409d96ff9c52c9832a992e256744b5f94aa0f1908af37b8ed3f8bbcb0f1ff46d029fe88e347364bb98fcebdbe9f12a85e55f8749127b369be31b2195c8856d3b40141bf169fc8d34d0465c6befdcd082586e41b5128b1d8a185695bd45c997260c64c6577f267f3dc4bc779483a4dc860af41a6bbf8b942e3bd4707665c58f5ab36066d7b013efe4cbe54d4a69c98d6dce529e34af175a18a33b884f26e8e15f9e42597174d7f34fed9a1e868dd80d2508303be011f4f0abecb5ef375fb4e8635fc593f3ad24f6f1cd06fd2ae4a2e9f0e5ee9567196cb86ee78355327a746c0474512ced1133cc244a7585c1bbca8a4491e55a1ba7eaf38b8bb2aa91ea77977bba6ac6950fb8954dc1e93736aa09a73072ab01484fe509c52fa84b82d67470131c57555e736e9320715fd954aecc628ec0c59046ae49df604bf30abd1f3a8a428e7e4f500de00e0855e37220871db3227130d1e0a82f882552b722566caf48ab5c60a0fd6deaf9a759ec163513705df2eeb9c926fd086eef6ef18c2328e775e7e3e8795b223333c8557454b745dcf635a511cdeba2fe2d27b0ded95aec89d4b7e0992ed5f084604b0587c2f99ea3f599acf653c389767a7144ff2875d50c3713d77394767458c0420ec40ad501d097c54695d1f4a6e87ece873182ba583be43d4fc489914d8eaf8011a2daf3de7ead05651f8b7a1e9e189d235ae610b64e5e90e618d8c1fd995e0381ebd914ab5099676a39c56138c09f50d3af4821f7f5e9b81e0f6d6f563a9218405932ba91f9cbe8c9db1099d96fb91e3ab5236dfad2a50b9464ae754592b0a99caf29b452736e9da49dcc878d74045a3b2ce70e4bebdbf3c0072f6d3271b2b3bf81dd8a9a21a9924c4df02af0e878cda014b7265408dd6092d748fd9962c307ec5acc7515526c5b476b318cd759cf16e476091c3db217364ac10336e83033fe6e0c49c837bc0b2c25214f40600d0f78a29b4507c235c901fe724dd2ea09b43e2ebb93ab19b2924207f1df53020986fc167e3b6f9a902a4a26ac6d820896cd4ab4d57cec83e5a9b290eef838a9a8a652bc9af101dbc0dd4c48be91ff5211ed053741e074e9c37366c122f9e9b6ed454bb8712238c994b4f92cfd2c72862fb26d57d0d92cc3e0e6cfa6b47787db0ea87a9c958cad2ffdfd3f3af6c922cda5930494bf76df37851637f1ef80555f391e3c5b4740132ce9ee28076a33db3f22c1c54372629218f31b4e9fc1507e533c36e25b0b03b4fe0a35c6eaa1ac64988408ea2d796866f2b7969e25221df64779c20ffaf617ecafa095fad997bc3f6ce56224fa5796913af1d589661ca2ab65705685b59162b6787f68688dc51ebc2a5ab46964b9d058771f27b8bbc7984bdb58f8222fbbdebc928f99762b804d028735d2db716b36814c91c6d05bf3980f8135be7d288d2f6875589c894cbec4e8bd09f3abda7e938fa4d15a8a429b821a75cc8332055fb6b68021d64ada55996d417730530fc24724096059fa8efef2d35a05fd399ed98a3267a81e36933045c4158b8fba1c77896a2bdd03635fc571e7c0e642b75e7bd02d2d9616fd4fc9b17defbe3ca027355bec64c6515861cdcc6b9cdf7394758b945a8802ac3a5e0c30a7b8e555773b8ec594aec9f3ffa1fb3b85d452a2439f51e7633998c22b02d3976289f8225fbe24ab695f1e3d3a98a51f4ab3703f9d50e266e27c16e59591958ad51d18231606931bfcd82212b4b67ef00ea5a328557d1cdf25605580b98f03c532ad9f60e47cfc30f40efeeae1e15d0c255b564cb7517b87743464c711915f298040b4332d89725666258185c2aa9bff25f5cd8196471f8555c46dd258fc906e6d24290bb2ed980ad0681363dd3cb9a99b77c87347d14b32e2b533aa80a7fc81fa6a284fb10e1ac50e17105bae258b68ee6cbcdd4c540e78652b09294c21f0c4c3f9aeec7af83ef0b9f0a0fdd71f49b3676b3409f4114a6d248018bf7e568e3f539a4e4cca654fb8583b6fd152eed5940cb66160f10cc73bf492ac092df66b1d082a6856370315301ee94fcfb41b8329f79ca7347ea6ff37d7534d4745a5cb815e6c75368310b3757ed698658456e114dd1154fa7f21094719070de9fd5662e38892ad8d56cfe682d1ddf7f3a5dcacfa0cac6fae5adb94e8e094a4f9c4789d9c780bbe7b460ee80dc26509ed2e2d330a8ff0973ae9beec29cfe68dea1388c9582a7faa36e64f1777fd75ec258e2095db49c61d4c3b6dcc549d6002898e5e8abb30d049a3e5b208cc7f737b0306733f0c032f29a5773f3e833b67b49aa76dea7426f76068b7cae79d1c3685936ce7a40b398f7ce0f1d9aff471dac7ebd82cb8b6f5de9c8719b7596e7684da124e7d48629a589888eba3f081200059a66582339aaa97451b7d68963266d1950f68f26752deee6c1fb4b3d3435eb5ff4d1f7dcc0018b5d8485bb302ec9b9da5a6a91371371d3edf0aac0ea40dfd8082d2c3908788cdc366cb360de69df5e3fb0d8af892e7b7da35f12da8b64abb6a9f22f578740f8304cecf6c7e86fe48ffd2de916a97e750e94a5bcc2875ca89d94a9e7fc4b80828a814ae407cdae901f1f942a09279d7fdcea800b4032f3dd852f5a6b492e5c889e82602c8379ec0639b4ae36beb6baf17861d00f5603a7c00e33a8d95659dbf4cb763562fea95a5a8bded7744436c0f6af379f7afd7503d628909de90fc56112f639b2ece89e4805d853ea52792d6532dbd52e35965ea3b23aa2f5bb94afe42ccc3a74a970569fe99305b08cbf1eb21076675926f8be0fb5d70fbe23058b72a4b8cdae618f3a38d33feb2d66d6831346c4cbecd5aa621266db45c23fc3753c4d16c8aaa70fbc7fc486d52d5c19925943e2e2458d8fe48db2fa1ec2803f6159a111f316df443d8d5330b39533e79a26bab2b384c756cb65e51954618835decf654c620ce6c7f9df3a1223ecef560d8961a7ca293cf4ac4f4f10fdaf6990375016aab5bfecf9b86011bcf459b82618df274f99780dd5c207f5508950f5c0988e4bad602630fdd6dfce10ad169bbc9702db0e4f14c151b13648b36a700000e9b968e15296047c74e4db34fae98fe26d8a0d74dafd69b9bde82e05f0fcd04b14d06247761389562316aae9fad36cff9560172f5681f89d589a4664ecb0275b565111867ce2d5c5728fd32e30467c9d463f0bac86dccc0c8e81568fbe98a03251e261308d4d885b31498ab47c6aba04499ee1d6af5764d607de7fda213b757f433cf2c8449a1c16e30afadc5b1541b6a48f3897e3fe520c886378a335958d10b7aba2083739400775852fcf73bef2bf5950a3434d0ccdc108d9b7423f5025f7de9a5598148d9a1b6e8bad7ec1c65ef2bea2ddca09c89a685e5426bbaf23b14f67010f743c803ff645b687e27e6277af4f1d8cd0532ce8c84a8f7d62ca9502d73d298d5c59232c9ef0415568579479379e599643715dd637605269fa8f5632ae4ee6189fd4f770d3a5b411e2b437ab86f61658d41775699cfde324de92c439c6cb8a2b9d64b980a1e7b326153c51046e1c4cf04925f7e04ac958b863bc1946320e5935455f63b55a548459aa6a1111cd9794ce366ec2e3d6fee3842dba280f59f8766b1c5b48c7cb75e171858aadea943163a35a217b92ca16a8e1fa8a7e1acd3949480646557d9c355ba353d09c6c0023fe607df51ce3a219ec506591a37277fba6777bfde40c8a40dd508c6f8b69b841228d37dd921d7e992175cc315205b04c6fc4d0e0d91cc7f5b194ea40e30b4b6621c3c2f903d70b6c3adfec4406a8566ea469fedd39e4d2a78491915fa9fb10509ec157858617c8ee3f524307b124b087b5044c035e478ea7720f6e54478c4b7d6635a207d2dd42eb9b149b33b9f8441531c3b8fa5873307ccc03d1f52e80c0d996987ab2261b31d8307680954c61ee17853e42ef2a64553fa48da35d3bfbb3cc0bce0032b92d6332729a5a973a5c36ae09ec3459e82906fd99dd7f01171794ba1fa5b1ae53e62055bc565e35b1f940e542fa204cf7310559e9c71230f71b610c44e5ced30261f"}, @INET_DIAG_REQ_BYTECODE={0xe1, 0x1, "2952efdbb8d6814fb9490dcd04bb7cc16dd7d16c362ca0458b0b781b7e50abcf543ead1d1f9a8f07983fdd0d18308aa4f84f7b8cf42d5953b6e54ca7fddf3b2e7083a0b0c490b5c808bfa439b46b5f1a711f7b6fbab0aedac6ec6d0f175a1c9baa636d5e51f9186448bbe141966a3e353658f0e149dc6a5e2ce2dbe820586f35c8cda623247d922f9737d830dab594761a21216d5d320cdcfea3ece6707f5bdea56f2e19deec50b833d98ce251e73f037add8af90b551c4a7a9af1cf99fea4aa9d49ba2f7b39cd32754554e8232c1424d06de03b9b37526ea127870433"}, @INET_DIAG_REQ_BYTECODE={0xdc1, 0x1, "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"}]}, 0x1ec4}}, 0x0) [ 2966.455819][T30554] loop2: p1 < > p2 < > p4 [ 2966.468087][T30562] loop3: p1 < > p2 < > p4 [ 2966.486125][T30558] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:33 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000c0000000200055aa", 0x40, 0x1c0}]) 17:12:33 executing program 0: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x7f) 17:12:33 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000250000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2966.514110][T30554] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2966.514866][T30562] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2966.545549][T30575] loop5: detected capacity change from 0 to 1 [ 2966.561061][T30556] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2966.574679][T30579] loop4: detected capacity change from 0 to 131072 [ 2966.587973][ T1437] loop5: p1 < > p2 < > p4 [ 2966.592406][ T1437] loop5: partition table partially beyond EOD, truncated [ 2966.599970][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2966.606112][ T1437] loop5: p2 size 2 extends beyond EOD, truncated 17:12:33 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003b0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:33 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000e00000000000000200055aa", 0x40, 0x1c0}]) 17:12:33 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000012e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2966.619610][ T1437] loop5: p4 start 12582912 is beyond EOD, truncated [ 2966.630742][ T1437] loop5: p1 < > p2 < > p4 [ 2966.635235][ T1437] loop5: partition table partially beyond EOD, truncated [ 2966.646270][T30579] loop4: p1 < > p2 < > p4 [ 2966.648700][T30583] loop1: detected capacity change from 0 to 1 [ 2966.654279][T30579] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2966.661483][T30584] loop2: detected capacity change from 0 to 131072 17:12:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000000), 0x4) [ 2966.670292][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2966.676425][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2966.683575][ T1437] loop5: p4 start 12582912 is beyond EOD, truncated [ 2966.691145][T30575] loop5: p1 < > p2 < > p4 [ 2966.691150][T30586] loop3: detected capacity change from 0 to 131072 [ 2966.695609][T30575] loop5: partition table partially beyond EOD, truncated [ 2966.697082][T30575] loop5: p1 start 10 is beyond EOD, truncated 17:12:33 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000260000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) [ 2966.715481][T30575] loop5: p2 size 2 extends beyond EOD, truncated [ 2966.725681][T30584] loop2: p1 < > p2 < > p4 [ 2966.726057][T30575] loop5: p4 start 12582912 is beyond EOD, truncated [ 2966.735811][T30584] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2966.744200][T30583] loop1: p1 < > p2 < > p4 [ 2966.748729][T30583] loop1: partition table partially beyond EOD, truncated [ 2966.756471][T30586] loop3: p1 < > p2 < > p4 [ 2966.762305][T30591] loop4: detected capacity change from 0 to 131072 17:12:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 17:12:33 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000ec000000200055aa", 0x40, 0x1c0}]) [ 2966.772903][T30586] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2966.781626][T30583] loop1: p1 start 10 is beyond EOD, truncated [ 2966.787758][T30583] loop1: p2 size 2 extends beyond EOD, truncated [ 2966.802549][T30583] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2966.813030][T30591] loop4: p1 < > p2 < > p4 17:12:33 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000013e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:33 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003c0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@generic={0x3}) 17:12:33 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000f00000000000000200055aa", 0x40, 0x1c0}]) [ 2966.829637][T30599] loop5: detected capacity change from 0 to 1 [ 2966.851822][T30591] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2966.870366][T30604] loop2: detected capacity change from 0 to 131072 17:12:33 executing program 0: openat$incfs(0xffffffffffffffff, 0x0, 0x6004c0, 0x0) 17:12:33 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000270000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2966.884266][T30599] loop5: p1 < > p2 < > p4 [ 2966.888845][T30599] loop5: partition table partially beyond EOD, truncated [ 2966.900971][T30602] loop1: detected capacity change from 0 to 1 [ 2966.912933][T30599] loop5: p1 start 10 is beyond EOD, truncated [ 2966.919047][T30599] loop5: p2 size 2 extends beyond EOD, truncated [ 2966.934347][T30599] loop5: p4 start 15466496 is beyond EOD, truncated [ 2966.953074][T30602] loop1: p1 < > p2 < > p4 [ 2966.957545][T30602] loop1: partition table partially beyond EOD, truncated [ 2966.960471][T30604] loop2: p1 < > p2 < > p4 [ 2966.970165][T30602] loop1: p1 start 10 is beyond EOD, truncated [ 2966.975557][T30609] loop3: detected capacity change from 0 to 131072 17:12:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f0000004a80)=[{&(0x7f0000001f40)=""/4086, 0xffffffffffffff7c}], 0x1, &(0x7f0000004b00)}}], 0x1, 0x0, &(0x7f00000001c0)={0x77359400}) 17:12:34 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000fe000000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom(r0, 0x0, 0x0, 0xc0012002, 0x0, 0x0) 17:12:34 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000119c0), 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) [ 2966.976297][T30602] loop1: p2 size 2 extends beyond EOD, truncated [ 2966.986859][T30604] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2967.000628][T30602] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2967.010311][T30617] loop5: detected capacity change from 0 to 1 17:12:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)={0x3, 'macvlan1\x00'}) [ 2967.035081][T30622] loop4: detected capacity change from 0 to 131072 [ 2967.042303][T30609] loop3: p1 < > p2 < > p4 [ 2967.044883][T30617] loop5: p1 < > p2 < > p4 [ 2967.051147][T30617] loop5: partition table partially beyond EOD, truncated [ 2967.056111][T30609] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2967.064940][T30617] loop5: p1 start 10 is beyond EOD, truncated [ 2967.071143][T30617] loop5: p2 size 2 extends beyond EOD, truncated 17:12:34 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000014e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003d0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2967.080102][T30617] loop5: p4 start 16646144 is beyond EOD, truncated [ 2967.087110][T30622] loop4: p1 < > p2 < > p4 [ 2967.092389][T30622] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)={0x3, 'macvlan1\x00'}) 17:12:34 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000280000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000001100000000000000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)={0x3, 'macvlan1\x00'}) 17:12:34 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000067010000200055aa", 0x40, 0x1c0}]) [ 2967.127580][T30630] loop2: detected capacity change from 0 to 131072 [ 2967.131206][T30631] loop1: detected capacity change from 0 to 1 17:12:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)={0x3, 'macvlan1\x00'}) [ 2967.188430][T30636] loop4: detected capacity change from 0 to 131072 [ 2967.196877][T30630] loop2: p1 < > p2 < > p4 [ 2967.204238][ T1437] loop1: p1 < > p2 < > p4 [ 2967.204604][T30630] loop2: p4 size 2097152 extends beyond EOD, [ 2967.208649][ T1437] loop1: partition table partially beyond EOD, truncated [ 2967.208998][ T1437] loop1: p1 start 10 is beyond EOD, [ 2967.214774][T30630] truncated [ 2967.221795][ T1437] truncated 17:12:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x3c, 0x0, 0x3a) 17:12:34 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000140)={0x0, 0x9, &(0x7f0000000040)="538dee9eefdc622196"}) [ 2967.221801][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2967.249207][T30644] loop5: detected capacity change from 0 to 1 [ 2967.257694][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2967.269402][T30645] loop3: detected capacity change from 0 to 131072 [ 2967.281210][ T1437] loop1: p1 < > p2 < > p4 17:12:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000a40)="640c5e1af3631fb14013b41bb32c63", 0xf}, {0x0}, {&(0x7f0000000c00)=',', 0x1}], 0x3, &(0x7f0000000e40)}, 0x80) 17:12:34 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003e0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2967.285676][ T1437] loop1: partition table partially beyond EOD, truncated [ 2967.293784][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2967.295762][T30636] loop4: p1 < > p2 < > p4 [ 2967.299880][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2967.312117][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2967.314292][T30644] loop5: p1 < > p2 < > p4 [ 2967.323396][T30644] loop5: partition table partially beyond EOD, truncated [ 2967.333044][T30645] loop3: p1 < > p2 < > p4 [ 2967.336888][T30651] loop2: detected capacity change from 0 to 131072 [ 2967.337621][T30631] loop1: p1 < > p2 < > p4 [ 2967.345847][T30644] loop5: p1 start 10 is beyond EOD, [ 2967.348439][T30631] loop1: partition table partially beyond EOD, truncated [ 2967.357340][T30645] loop3: p4 size 2097152 extends beyond EOD, [ 2967.360882][T30644] truncated [ 2967.360888][T30644] loop5: p2 size 2 extends beyond EOD, truncated [ 2967.361388][T30631] loop1: p1 start 10 is beyond EOD, [ 2967.367170][T30645] truncated [ 2967.370165][T30631] truncated 17:12:34 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000015e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000140), 0x4) 17:12:34 executing program 0: add_key$user(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x1}, &(0x7f00000014c0)="df", 0x1, 0xfffffffffffffffe) [ 2967.370170][T30631] loop1: p2 size 2 extends beyond EOD, truncated [ 2967.372544][T30636] loop4: p4 size 2097152 extends beyond EOD, [ 2967.393587][T30631] loop1: p4 size 2097152 extends beyond EOD, [ 2967.394729][T30636] truncated [ 2967.398669][T30644] loop5: p4 start 23527424 is beyond EOD, [ 2967.400791][T30631] truncated [ 2967.419089][T30644] truncated [ 2967.422591][T30651] loop2: p1 < > p2 < > p4 [ 2967.427856][T30651] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:34 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000290000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000003200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) recvmmsg$unix(r1, &(0x7f0000003340)=[{{&(0x7f0000016d80), 0x6e, &(0x7f0000018400)=[{0x0}, {0x0, 0xffffffeb}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0xffffffffffffffaa}}, {{0x0, 0x0, 0x0}}, {{0xfffffffffffffffe, 0x0, &(0x7f0000001440)=[{&(0x7f0000000040)=""/188}, {&(0x7f0000000100)=""/54}, {&(0x7f0000000140)=""/75}, {&(0x7f00000001c0)=""/6}, {&(0x7f0000000200)=""/32}, {&(0x7f0000000240)=""/4096}, {&(0x7f0000001240)=""/39}, {&(0x7f0000001280)=""/83}, {&(0x7f0000001300)=""/180}, {&(0x7f00000013c0)=""/115}], 0x0, &(0x7f0000001500)=[@cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @cred, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @cred]}}, {{&(0x7f0000001640), 0x0, &(0x7f0000001980)=[{&(0x7f00000016c0)=""/78}, {&(0x7f0000001740)=""/74}, {&(0x7f00000017c0)=""/253}, {&(0x7f00000018c0)=""/53}, {&(0x7f0000001900)=""/72}], 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="000016d2010000000000010000000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="00000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="00000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="00000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00']}}, {{&(0x7f0000001b40)=@abs, 0x0, &(0x7f0000003100)=[{&(0x7f0000001bc0)=""/154}, {&(0x7f0000001c80)=""/105}, {&(0x7f0000001d00)=""/56}, {&(0x7f0000001d40)=""/9}, {&(0x7f0000001d80)=""/220}, {&(0x7f0000001e80)=""/4096}, {&(0x7f0000002e80)=""/249}, {&(0x7f0000002f80)=""/153}, {&(0x7f0000003040)=""/137}], 0x0, &(0x7f0000003240)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @cred, @cred]}}], 0x2, 0x2102, 0x0) 17:12:34 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000fa1100000000000000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000004020000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000007f3e0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2967.473265][T30661] loop1: detected capacity change from 0 to 1 [ 2967.500915][T30666] loop4: detected capacity change from 0 to 131072 [ 2967.510285][T30668] loop2: detected capacity change from 0 to 131072 [ 2967.512842][T30671] loop5: detected capacity change from 0 to 1 17:12:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x13, &(0x7f0000000000)=0x8, 0x4) [ 2967.524960][ T1437] loop1: p1 < > p2 < > p4 [ 2967.529449][ T1437] loop1: partition table partially beyond EOD, truncated [ 2967.537601][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2967.543790][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2967.544262][T30666] loop4: p1 < > p2 < > p4 [ 2967.555291][T30668] loop2: p1 < > p2 < > p4 [ 2967.555887][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2967.559902][T30671] loop5: p1 < > p2 < > p4 17:12:34 executing program 0: accept4$unix(0xffffffffffffffff, 0x0, &(0x7f00000002c0), 0x0) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3) [ 2967.571052][T30671] loop5: partition table partially beyond EOD, truncated [ 2967.579131][T30668] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2967.587324][ T1437] loop1: p1 < > p2 < > p4 [ 2967.588789][T30666] loop4: p4 size 2097152 extends beyond EOD, [ 2967.591776][ T1437] loop1: partition table partially beyond EOD, truncated [ 2967.597413][T30673] loop3: detected capacity change from 0 to 131072 [ 2967.597867][T30666] truncated [ 2967.598078][T30671] loop5: p1 start 10 is beyond EOD, [ 2967.607285][ T1437] loop1: p1 start 10 is beyond EOD, 17:12:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000e80)=@buf={0x50, &(0x7f0000000dc0)="24320c239c4ad4ec165f4d21adb4c7b5b8972d5efbebe2fe3d3b3a0ecced30cd755020147c7f7e5f3579bb77b015b7edebe63665866e747f297cc4a9fc363bfb2e53ca1bc1ff9000862b2b81d0114186"}) 17:12:34 executing program 0: epoll_create1(0x4f315033918a3d77) [ 2967.611497][T30671] truncated [ 2967.611503][T30671] loop5: p2 size 2 extends beyond EOD, truncated [ 2967.614652][ T1437] truncated [ 2967.622096][T30671] loop5: p4 start 33816576 is beyond EOD, [ 2967.625177][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2967.648746][ T1437] loop1: p4 size 2097152 extends beyond EOD, [ 2967.650078][T30671] truncated [ 2967.659337][ T1437] truncated [ 2967.678599][T30661] loop1: p1 < > p2 < > p4 [ 2967.683046][T30661] loop1: partition table partially beyond EOD, truncated [ 2967.690739][T30673] loop3: p1 < > p2 < > p4 [ 2967.691769][T30661] loop1: p1 start 10 is beyond EOD, truncated [ 2967.700540][T30673] loop3: p4 size 2097152 extends beyond EOD, [ 2967.701291][T30661] loop1: p2 size 2 extends beyond EOD, truncated [ 2967.701912][T30661] loop1: p4 size 2097152 extends beyond EOD, [ 2967.707612][T30673] truncated [ 2967.713781][T30661] truncated 17:12:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001800)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 17:12:34 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003f0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000016e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002a0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000001200000000000000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000060020000200055aa", 0x40, 0x1c0}]) 17:12:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_mreq(r2, 0x0, 0x20, 0x0, &(0x7f00000001c0)) [ 2967.787468][T30691] loop2: detected capacity change from 0 to 131072 [ 2967.789398][T30692] loop4: detected capacity change from 0 to 131072 [ 2967.807871][T30689] loop5: detected capacity change from 0 to 1 [ 2967.825258][ T1437] loop2: p1 < > p2 < > p4 [ 2967.826693][T30697] loop1: detected capacity change from 0 to 1 17:12:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000080), 0x4) 17:12:34 executing program 0: mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 2967.831324][ T1437] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2967.847724][T30691] loop2: p1 < > p2 < > p4 [ 2967.853101][T30691] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2967.863372][T30694] loop3: detected capacity change from 0 to 131072 [ 2967.864786][ T1437] loop2: p1 < > p2 < > p4 [ 2967.876670][ T1437] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:34 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000400000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2967.884603][T30689] loop5: p1 < > p2 < > p4 [ 2967.889026][T30689] loop5: partition table partially beyond EOD, truncated [ 2967.898014][T30697] loop1: p1 < > p2 < > p4 [ 2967.899218][T30692] loop4: p1 < > p2 < > p4 [ 2967.902451][T30697] loop1: partition table partially beyond EOD, truncated [ 2967.911174][T30692] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2967.914354][T30697] loop1: p1 start 10 is beyond EOD, truncated [ 2967.922749][T30689] loop5: p1 start 10 is beyond EOD, 17:12:34 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x80000001}, 0x8) 17:12:35 executing program 0: utimensat(0xffffffffffffffff, &(0x7f000000bec0)='./file0\x00', &(0x7f000000bf00)={{0x77359400}, {0x0, 0xea60}}, 0x0) 17:12:35 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002b0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2967.926878][T30697] loop1: p2 size 2 extends beyond EOD, truncated [ 2967.938508][T30689] truncated [ 2967.938768][T30694] loop3: p1 < > p2 < > p4 [ 2967.941605][T30689] loop5: p2 size 2 extends beyond EOD, truncated [ 2967.942858][T30689] loop5: p4 start 39845888 is beyond EOD, [ 2967.949769][T30697] loop1: p4 size 2097152 extends beyond EOD, [ 2967.952436][T30689] truncated [ 2967.960682][T30694] loop3: p4 size 2097152 extends beyond EOD, [ 2967.964328][T30697] truncated [ 2967.976991][T30694] truncated 17:12:35 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000bc020000200055aa", 0x40, 0x1c0}]) 17:12:35 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000017e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000002580)=[{{&(0x7f0000000100)=@abs, 0x0, &(0x7f0000000280)=[{&(0x7f00000027c0)=""/241}]}}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/73}], 0x0, &(0x7f0000000380)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}]}}, {{&(0x7f00000003c0)=@abs, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=""/50}, {&(0x7f0000000480)=""/187}], 0x0, &(0x7f0000000580)=[@cred]}}, {{&(0x7f00000005c0)=@abs, 0x0, &(0x7f0000000680)=[{&(0x7f0000000640)=""/27}], 0x0, &(0x7f00000006c0)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}]}}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000740)=""/98}, {&(0x7f00000007c0)=""/35}]}}, {{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000840)=""/24}, {&(0x7f0000000880)=""/192}, {&(0x7f0000000940)=""/71}, {&(0x7f00000009c0)}, {&(0x7f0000000a00)=""/58}], 0x0, &(0x7f0000000ac0)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights]}}, {{&(0x7f0000000b00)=@abs, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000180)=""/88}, {&(0x7f0000000c00)=""/65}], 0x0, &(0x7f0000000cc0)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}]}}, {{&(0x7f0000000dc0)=@abs, 0x0, &(0x7f0000001f00)=[{&(0x7f0000000e40)=""/4096}, {&(0x7f0000001e40)=""/179}], 0x0, &(0x7f00000028c0)=[@cred, @cred, @cred, @cred, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @cred]}}, {{0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f00000020c0)=""/67}, {&(0x7f0000002140)=""/187}, {&(0x7f0000002200)=""/246}, {&(0x7f0000002300)=""/140}], 0x0, &(0x7f0000002400)=[@rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred]}}], 0x2, 0x0, 0x0) [ 2968.010660][T30708] loop2: detected capacity change from 0 to 131072 [ 2968.028303][T30713] loop4: detected capacity change from 0 to 131072 [ 2968.040121][T30716] loop5: detected capacity change from 0 to 1 17:12:35 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000001c00000000000000200055aa", 0x40, 0x1c0}]) [ 2968.059956][T30720] loop1: detected capacity change from 0 to 1 [ 2968.074111][T30713] loop4: p1 < > p2 < > p4 [ 2968.078884][ T1437] loop2: p1 < > p2 < > p4 [ 2968.084229][ T1437] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2968.091269][T30716] loop5: p1 < > p2 < > p4 [ 2968.095281][T30723] loop3: detected capacity change from 0 to 131072 [ 2968.095733][T30716] loop5: partition table partially beyond EOD, truncated [ 2968.096041][T30720] loop1: p1 < > p2 < > p4 [ 2968.102448][T30713] loop4: p4 size 2097152 extends beyond EOD, [ 2968.109285][T30720] loop1: partition table partially beyond EOD, truncated [ 2968.110364][T30716] loop5: p1 start 10 is beyond EOD, [ 2968.113753][T30713] truncated [ 2968.116482][T30720] loop1: p1 start 10 is beyond EOD, [ 2968.119832][T30716] truncated [ 2968.119838][T30716] loop5: p2 size 2 extends beyond EOD, truncated [ 2968.121492][T30716] loop5: p4 start 45875200 is beyond EOD, [ 2968.126897][T30720] truncated 17:12:35 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002c0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2968.126903][T30720] loop1: p2 size 2 extends beyond EOD, [ 2968.132160][T30716] truncated [ 2968.167521][T30720] truncated [ 2968.171336][T30720] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2968.172001][ T1437] loop2: p1 < > p2 < > p4 [ 2968.183364][ T1437] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2968.191174][T30723] loop3: p1 < > p2 < > p4 [ 2968.197308][T30708] loop2: p1 < > p2 < > p4 17:12:35 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000030000200055aa", 0x40, 0x1c0}]) 17:12:35 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000018e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:35 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000800400000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2968.208612][T30708] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2968.218656][T30725] loop4: detected capacity change from 0 to 131072 [ 2968.221409][T30723] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2968.245314][T30728] loop5: detected capacity change from 0 to 1 [ 2968.261684][T30730] loop1: detected capacity change from 0 to 1 [ 2968.263952][T30725] loop4: p1 < > p2 < > p4 [ 2968.272788][T30725] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2968.292627][T30732] loop2: detected capacity change from 0 to 131072 [ 2968.294676][T30730] loop1: p1 < > p2 < > p4 [ 2968.300491][T30728] loop5: p1 < > p2 < > p4 17:12:35 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000002000000000000000200055aa", 0x40, 0x1c0}]) [ 2968.303635][T30730] loop1: partition table partially beyond EOD, truncated [ 2968.308000][T30728] loop5: partition table partially beyond EOD, truncated [ 2968.309382][T30728] loop5: p1 start 10 is beyond EOD, truncated [ 2968.328164][T30728] loop5: p2 size 2 extends beyond EOD, truncated [ 2968.336101][T30730] loop1: p1 start 10 is beyond EOD, truncated [ 2968.339311][T30728] loop5: p4 start 50331648 is beyond EOD, [ 2968.342192][T30730] loop1: p2 size 2 extends beyond EOD, [ 2968.342199][T30728] truncated [ 2968.342205][T30730] truncated 17:12:35 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002d0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:35 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000480000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2968.360133][T30730] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2968.372563][T30735] loop3: detected capacity change from 0 to 131072 [ 2968.384279][T30737] loop4: detected capacity change from 0 to 131072 17:12:35 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000019e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:35 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000002c030000200055aa", 0x40, 0x1c0}]) [ 2968.414530][T30735] loop3: p1 < > p2 < > p4 [ 2968.425761][T30735] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2968.434262][T30737] loop4: p1 < > p2 < > p4 [ 2968.438603][T30740] loop5: detected capacity change from 0 to 1 [ 2968.442224][T30741] loop1: detected capacity change from 0 to 1 [ 2968.451875][T30737] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2968.468838][T30744] loop2: detected capacity change from 0 to 131072 [ 2968.493918][ T4856] loop5: p1 < > p2 < > p4 [ 2968.495688][T30741] loop1: p1 < > p2 < > p4 [ 2968.498375][ T4856] loop5: partition table partially beyond EOD, truncated [ 2968.502775][T30741] loop1: partition table partially beyond EOD, truncated 17:12:35 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000002500000000000000200055aa", 0x40, 0x1c0}]) [ 2968.502981][T30741] loop1: p1 start 10 is beyond EOD, [ 2968.511746][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 2968.516871][T30741] truncated [ 2968.516877][T30741] loop1: p2 size 2 extends beyond EOD, truncated [ 2968.517430][T30741] loop1: p4 size 2097152 extends beyond EOD, [ 2968.524620][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 2968.531945][T30741] truncated [ 2968.549987][ T4856] loop5: p1 start 10 is beyond EOD, truncated [ 2968.566390][ T4856] loop5: p2 size 2 extends beyond EOD, truncated [ 2968.575898][ T4998] loop2: p1 < > p2 < > p4 [ 2968.583895][ T4856] loop5: p4 start 53215232 is beyond EOD, truncated [ 2968.586104][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2968.598297][ T1437] loop5: p1 < > p2 < > p4 [ 2968.602782][ T1437] loop5: partition table partially beyond EOD, truncated [ 2968.607138][T30747] loop3: detected capacity change from 0 to 131072 [ 2968.611190][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2968.618747][T30744] loop2: p1 < > p2 < > p4 [ 2968.622522][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2968.623224][ T1437] loop5: p4 start 53215232 is beyond EOD, [ 2968.629070][T30744] loop2: p4 size 2097152 extends beyond EOD, [ 2968.633394][ T1437] truncated [ 2968.636789][T30740] loop5: p1 < > p2 < > p4 [ 2968.639262][T30744] truncated [ 2968.656021][T30740] loop5: partition table partially beyond EOD, truncated [ 2968.666596][T30747] loop3: p1 < > p2 < > p4 [ 2968.675642][T30740] loop5: p1 start 10 is beyond EOD, truncated [ 2968.679120][T30747] loop3: p4 size 2097152 extends beyond EOD, [ 2968.681733][T30740] loop5: p2 size 2 extends beyond EOD, [ 2968.681739][T30747] truncated [ 2968.687821][T30740] truncated [ 2968.688637][T30740] loop5: p4 start 53215232 is beyond EOD, truncated [ 2968.824446][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 2968.836939][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 2968.837179][ T3066] udevd[3066]: inotify_add_watch(7, /dev/loop5p4, 10) failed: No such file or directory [ 2968.848059][ T4634] udevd[4634]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory 17:12:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:12:35 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002e0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:35 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000004c0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:35 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000001ae625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:35 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000002600000000000000200055aa", 0x40, 0x1c0}]) 17:12:35 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000002040000200055aa", 0x40, 0x1c0}]) [ 2968.861710][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop5p2, 10) failed: No such file or directory [ 2968.868946][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 2968.879774][ T3055] udevd[3055]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 2968.886866][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory 17:12:36 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@qipcrtr={0x2a, 0x3}, 0x80) [ 2968.927643][T30754] loop1: detected capacity change from 0 to 1 [ 2968.933225][T30758] loop4: detected capacity change from 0 to 131072 [ 2968.946818][T30757] loop2: detected capacity change from 0 to 131072 [ 2968.956456][T30756] loop5: detected capacity change from 0 to 1 [ 2968.967226][T30750] loop3: detected capacity change from 0 to 131072 [ 2968.984184][T30754] loop1: p1 < > p2 < > p4 [ 2968.988631][T30754] loop1: partition table partially beyond EOD, truncated [ 2969.005533][T30756] loop5: p1 < > p2 < > p4 [ 2969.005553][T30757] loop2: p1 < > p2 < > p4 [ 2969.010025][T30756] loop5: partition table partially beyond EOD, truncated [ 2969.015489][T30758] loop4: p1 < > p2 < > p4 [ 2969.027595][T30750] loop3: p1 < > p2 < > p4 17:12:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x28}}, 0x0) [ 2969.031331][T30754] loop1: p1 start 10 is beyond EOD, truncated [ 2969.038215][T30754] loop1: p2 size 2 extends beyond EOD, truncated [ 2969.045829][T30758] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2969.054537][T30757] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2969.055343][T30756] loop5: p1 start 10 is beyond EOD, truncated [ 2969.067550][T30756] loop5: p2 size 2 extends beyond EOD, truncated [ 2969.076686][T30750] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:36 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000002f0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:36 executing program 0: add_key$user(&(0x7f0000000100), &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="f5", 0x1, 0xfffffffffffffffd) r0 = add_key$user(&(0x7f0000000100), &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="f5", 0x1, 0xfffffffffffffffd) add_key$user(&(0x7f00000000c0), 0x0, 0x0, 0x0, r0) 17:12:36 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000002e00000000000000200055aa", 0x40, 0x1c0}]) 17:12:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000a40)="640c5e1af3631fb14013b41bb32c635c88e8ca2753507ea8d293570ff7d26ad5c21cedfa3d875ee2b7b802ac3553ca70642587be3ee6fdd7193a437e8ed9", 0x3e}, {0x0}], 0x2, &(0x7f0000000e40)}, 0x80) 17:12:36 executing program 0: pselect6(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x40}, 0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={[0x3]}, 0x8}) [ 2969.086441][T30756] loop5: p4 start 67239936 is beyond EOD, truncated [ 2969.106491][T30754] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:36 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000001be625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:36 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000006040000200055aa", 0x40, 0x1c0}]) 17:12:36 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000540000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:36 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) openat$cgroup_pressure(r0, &(0x7f0000000140)='io.pressure\x00', 0x2, 0x0) [ 2969.167276][T30771] loop4: detected capacity change from 0 to 131072 [ 2969.203112][T30779] loop5: detected capacity change from 0 to 1 [ 2969.211070][T30783] loop1: detected capacity change from 0 to 1 17:12:36 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_debug_messages', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000300), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x213, 0x0, 0x0) 17:12:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80002001) fallocate(r1, 0x100000011, 0x604, 0x80019c) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000002c0)=0x95) [ 2969.227492][T30786] loop2: detected capacity change from 0 to 131072 [ 2969.238033][T30777] loop3: detected capacity change from 0 to 131072 [ 2969.264194][ T1437] loop1: p1 < > p2 < > p4 [ 2969.264819][T30779] loop5: p1 < > p2 < > p4 [ 2969.268638][ T1437] loop1: partition table partially beyond EOD, truncated [ 2969.273036][T30779] loop5: partition table partially beyond EOD, truncated [ 2969.280901][T30771] loop4: p1 < > p2 < > p4 [ 2969.288435][T30779] loop5: p1 start 10 is beyond EOD, truncated [ 2969.292686][T30771] loop4: p4 size 2097152 extends beyond EOD, [ 2969.297715][T30779] loop5: p2 size 2 extends beyond EOD, truncated [ 2969.298598][ T1437] loop1: p1 start 10 is beyond EOD, [ 2969.303867][T30771] truncated [ 2969.306053][T30779] loop5: p4 start 67502080 is beyond EOD, [ 2969.310182][ T1437] truncated [ 2969.310187][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2969.310386][T30786] loop2: p1 < > p2 < > p4 [ 2969.315492][T30779] truncated [ 2969.316465][T30777] loop3: p1 < > p2 < > p4 [ 2969.324352][ T1437] loop1: p4 size 2097152 extends beyond EOD, [ 2969.326764][T30786] loop2: p4 size 2097152 extends beyond EOD, [ 2969.327762][ T1437] truncated [ 2969.334086][T30786] truncated [ 2969.340809][T30777] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:36 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000300000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:36 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000050000200055aa", 0x40, 0x1c0}]) [ 2969.375718][ T1437] loop1: p1 < > p2 < > p4 [ 2969.380181][ T1437] loop1: partition table partially beyond EOD, truncated [ 2969.387441][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2969.393555][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2969.405644][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2969.419382][T30783] loop1: p1 < > p2 < > p4 17:12:36 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000550000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2969.423863][T30783] loop1: partition table partially beyond EOD, truncated [ 2969.428995][T30796] loop5: detected capacity change from 0 to 1 [ 2969.437419][T30783] loop1: p1 start 10 is beyond EOD, truncated [ 2969.443587][T30783] loop1: p2 size 2 extends beyond EOD, truncated [ 2969.458406][T30801] loop2: detected capacity change from 0 to 131072 [ 2969.462600][T30800] loop4: detected capacity change from 0 to 131072 [ 2969.467780][T30783] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:36 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000003f00000000000000200055aa", 0x40, 0x1c0}]) [ 2969.478686][T30796] loop5: p1 < > p2 < > p4 [ 2969.483123][T30796] loop5: partition table partially beyond EOD, truncated [ 2969.489142][ T1437] loop2: p1 < > p2 < > p4 [ 2969.496553][ T1437] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2969.497472][T30796] loop5: p1 start 10 is beyond EOD, truncated [ 2969.509546][T30796] loop5: p2 size 2 extends beyond EOD, truncated [ 2969.519456][T30801] loop2: p1 < > p2 < > p4 17:12:36 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000600000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:36 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000001ce625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2969.525461][T30801] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2969.533165][T30796] loop5: p4 start 83886080 is beyond EOD, truncated [ 2969.534919][T30803] loop3: detected capacity change from 0 to 131072 [ 2969.550354][T30800] loop4: p1 < > p2 < > p4 [ 2969.557757][T30800] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:36 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000310000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2969.583100][T30805] loop1: detected capacity change from 0 to 1 [ 2969.595134][T30803] loop3: p1 < > p2 < > p4 [ 2969.605415][T30803] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2969.608579][T30805] loop1: p1 < > p2 < > p4 [ 2969.616927][T30805] loop1: partition table partially beyond EOD, truncated [ 2969.619641][T30807] loop2: detected capacity change from 0 to 131072 17:12:36 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000009c050000200055aa", 0x40, 0x1c0}]) 17:12:36 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000004000000000000000200055aa", 0x40, 0x1c0}]) [ 2969.642571][T30805] loop1: p1 start 10 is beyond EOD, truncated [ 2969.648709][T30805] loop1: p2 size 2 extends beyond EOD, truncated [ 2969.656480][T30805] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2969.667859][T30807] loop2: p1 < > p2 < > p4 [ 2969.669791][T30812] loop5: detected capacity change from 0 to 1 [ 2969.674940][T30810] loop4: detected capacity change from 0 to 131072 [ 2969.680661][T30807] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2969.714817][T30812] loop5: p1 < > p2 < > p4 [ 2969.719246][T30812] loop5: partition table partially beyond EOD, truncated [ 2969.729716][T30812] loop5: p1 start 10 is beyond EOD, truncated [ 2969.735836][T30812] loop5: p2 size 2 extends beyond EOD, truncated [ 2969.744620][T30810] loop4: p1 < > p2 < > p4 17:12:36 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000001de625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:36 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80002001) fallocate(r1, 0x100000011, 0x604, 0x80019c) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000002c0)=0x95) 17:12:36 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000002600000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2969.765431][T30810] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2969.779275][T30812] loop5: p4 start 94109696 is beyond EOD, truncated [ 2969.790644][T30817] loop1: detected capacity change from 0 to 1 [ 2969.797235][T30821] loop2: detected capacity change from 0 to 131072 [ 2969.801249][T30815] loop3: detected capacity change from 0 to 131072 [ 2969.824880][T30817] loop1: p1 < > p2 < > p4 [ 2969.829328][T30817] loop1: partition table partially beyond EOD, truncated [ 2969.830234][T30821] loop2: p1 < > p2 < > p4 [ 2969.836444][T30817] loop1: p1 start 10 is beyond EOD, truncated [ 2969.846931][T30817] loop1: p2 size 2 extends beyond EOD, truncated [ 2969.854020][T30817] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2969.855069][T30815] loop3: p1 < > p2 < > p4 [ 2969.863138][T30821] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:36 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000c2050000200055aa", 0x40, 0x1c0}]) 17:12:36 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000320000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:36 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000001ee625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2969.879483][ T1437] loop2: p1 < > p2 < > p4 [ 2969.886247][T30815] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2969.887470][ T1437] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2969.913887][T30826] loop5: detected capacity change from 0 to 1 17:12:37 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000630000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2969.927997][T30828] loop4: detected capacity change from 0 to 131072 [ 2969.941041][T30830] loop1: detected capacity change from 0 to 1 [ 2969.954778][T30826] loop5: p1 < > p2 < > p4 [ 2969.959201][T30826] loop5: partition table partially beyond EOD, truncated [ 2969.968898][T30828] loop4: p1 < > p2 < > p4 17:12:37 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000004800000000000000200055aa", 0x40, 0x1c0}]) [ 2969.983571][T30828] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2969.988968][T30832] loop2: detected capacity change from 0 to 131072 [ 2969.997152][ T1437] loop1: p1 < > p2 < > p4 [ 2969.999539][T30826] loop5: p1 start 10 is beyond EOD, [ 2970.001577][ T1437] loop1: partition table partially beyond EOD, truncated [ 2970.005750][ T1437] loop1: p1 start 10 is beyond EOD, [ 2970.006943][T30826] truncated [ 2970.013956][ T1437] truncated [ 2970.019216][T30826] loop5: p2 size 2 extends beyond EOD, [ 2970.022309][ T1437] loop1: p2 size 2 extends beyond EOD, [ 2970.025462][T30826] truncated [ 2970.034432][T30826] loop5: p4 start 96600064 is beyond EOD, [ 2970.036542][ T1437] truncated [ 2970.048711][T30826] truncated [ 2970.055707][T30834] loop3: detected capacity change from 0 to 131072 [ 2970.056816][T30832] loop2: p1 < > p2 < > p4 [ 2970.064193][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2970.075748][T30830] loop1: p1 < > p2 < > p4 17:12:37 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000330000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2970.078174][T30832] loop2: p4 size 2097152 extends beyond EOD, [ 2970.080208][T30830] loop1: partition table partially beyond EOD, truncated [ 2970.080444][T30830] loop1: p1 start 10 is beyond EOD, [ 2970.086403][T30832] truncated [ 2970.093974][T30834] loop3: p1 < > p2 < > p4 [ 2970.098738][T30830] truncated [ 2970.098744][T30830] loop1: p2 size 2 extends beyond EOD, truncated [ 2970.101405][T30830] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2970.119804][T30837] loop4: detected capacity change from 0 to 131072 17:12:37 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000060000200055aa", 0x40, 0x1c0}]) 17:12:37 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000001670000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:37 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000001fe625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2970.129784][T30834] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2970.149468][T30840] loop5: detected capacity change from 0 to 1 [ 2970.166121][T30837] loop4: p1 < > p2 < > p4 [ 2970.168894][T30843] loop2: detected capacity change from 0 to 131072 [ 2970.179420][T30837] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2970.204303][T30840] loop5: p1 < > p2 < > p4 [ 2970.208742][T30840] loop5: partition table partially beyond EOD, truncated [ 2970.216632][ T1437] loop2: p1 < > p2 < > p4 [ 2970.223124][T30840] loop5: p1 start 10 is beyond EOD, truncated 17:12:37 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000340000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:37 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80002001) fallocate(r1, 0x100000011, 0x604, 0x80019c) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000002c0)=0x95) 17:12:37 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000004c00000000000000200055aa", 0x40, 0x1c0}]) [ 2970.225601][T30845] loop1: detected capacity change from 0 to 1 [ 2970.229259][T30840] loop5: p2 size 2 extends beyond EOD, truncated [ 2970.242737][T30840] loop5: p4 start 100663296 is beyond EOD, truncated [ 2970.250540][ T1437] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2970.266613][T30843] loop2: p1 < > p2 < > p4 [ 2970.271595][T30847] loop4: detected capacity change from 0 to 131072 [ 2970.272357][T30843] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:37 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000020e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:37 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000004060000200055aa", 0x40, 0x1c0}]) [ 2970.304379][ T1437] loop1: p1 < > p2 < > p4 [ 2970.308889][ T1437] loop1: partition table partially beyond EOD, truncated [ 2970.309013][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2970.309027][ T1437] loop1: p2 size 2 extends beyond EOD, truncated 17:12:37 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000680000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:37 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000350000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2970.320015][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2970.321686][ T1437] loop1: p1 < > p2 < > p4 [ 2970.321693][ T1437] loop1: partition table partially beyond EOD, truncated [ 2970.321835][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2970.321848][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2970.322510][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2970.325221][T30845] loop1: p1 < > p2 < > p4 [ 2970.325230][T30845] loop1: partition table partially beyond EOD, truncated [ 2970.325308][T30845] loop1: p1 start 10 is beyond EOD, truncated [ 2970.325322][T30845] loop1: p2 size 2 extends beyond EOD, truncated [ 2970.325667][T30845] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2970.325830][T30847] loop4: p1 < > p2 < > p4 17:12:37 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000005400000000000000200055aa", 0x40, 0x1c0}]) [ 2970.326808][T30847] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2970.335768][T30849] loop3: detected capacity change from 0 to 131072 [ 2970.372627][T30849] loop3: p1 < > p2 < > p4 [ 2970.378946][T30849] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2970.381836][T30858] loop2: detected capacity change from 0 to 131072 [ 2970.387492][T30860] loop1: detected capacity change from 0 to 1 [ 2970.387768][T30857] loop5: detected capacity change from 0 to 1 [ 2970.412382][T30862] loop4: detected capacity change from 0 to 131072 [ 2970.425760][T30860] loop1: p1 < > p2 < > p4 [ 2970.459827][T30858] loop2: p1 < > p2 < > p4 [ 2970.462134][T30860] loop1: partition table partially beyond EOD, truncated [ 2970.463410][T30860] loop1: p1 start 10 is beyond EOD, [ 2970.469059][ T1437] loop5: p1 < > p2 < > p4 [ 2970.473121][T30860] truncated [ 2970.473126][T30860] loop1: p2 size 2 extends beyond EOD, truncated [ 2970.474160][T30860] loop1: p4 size 2097152 extends beyond EOD, [ 2970.480004][ T1437] loop5: partition table partially beyond EOD, [ 2970.486606][T30860] truncated [ 2970.487291][T30862] loop4: p1 < > p2 < > p4 [ 2970.492658][ T1437] truncated [ 2970.493173][ T1437] loop5: p1 start 10 is beyond EOD, [ 2970.503338][T30858] loop2: p4 size 2097152 extends beyond EOD, [ 2970.505277][ T1437] truncated [ 2970.505282][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2970.513588][T30862] loop4: p4 size 2097152 extends beyond EOD, [ 2970.514148][T30858] truncated [ 2970.521136][T30862] truncated [ 2970.539403][ T1437] loop5: p4 start 100925440 is beyond EOD, 17:12:37 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000021e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:37 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000360000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2970.560683][T30866] loop3: detected capacity change from 0 to 131072 [ 2970.563724][ T1437] truncated [ 2970.617006][T30857] loop5: p1 < > p2 < > p4 [ 2970.621443][T30857] loop5: partition table partially beyond EOD, truncated [ 2970.635059][T30866] loop3: p1 < > p2 < > p4 [ 2970.638173][T30857] loop5: p1 start 10 is beyond EOD, truncated [ 2970.645679][T30857] loop5: p2 size 2 extends beyond EOD, truncated 17:12:37 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000006c0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2970.650621][T30866] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2970.664815][T30871] loop1: detected capacity change from 0 to 1 [ 2970.666320][T30869] loop4: detected capacity change from 0 to 131072 [ 2970.682534][T30857] loop5: p4 start 100925440 is beyond EOD, truncated [ 2970.693754][T30871] loop1: p1 < > p2 < > p4 [ 2970.698273][T30871] loop1: partition table partially beyond EOD, truncated 17:12:37 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000005500000000000000200055aa", 0x40, 0x1c0}]) [ 2970.701067][T30873] loop2: detected capacity change from 0 to 131072 [ 2970.706018][T30871] loop1: p1 start 10 is beyond EOD, truncated [ 2970.714049][T30869] loop4: p1 < > p2 < > p4 [ 2970.717936][T30871] loop1: p2 size 2 extends beyond EOD, truncated [ 2970.724949][T30869] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2970.730776][T30871] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:37 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000070000200055aa", 0x40, 0x1c0}]) [ 2970.764097][ T4457] loop2: p1 < > p2 < > p4 [ 2970.770114][ T4457] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2970.803704][T30873] loop2: p1 < > p2 < > p4 [ 2970.806345][T30876] loop3: detected capacity change from 0 to 131072 17:12:37 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1c5b42, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80002001) fallocate(r1, 0x100000011, 0x604, 0x80019c) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000002c0)=0x95) 17:12:37 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000022e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:37 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000370000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:37 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000740000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2970.827386][T30873] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2970.827750][T30878] loop5: detected capacity change from 0 to 1 [ 2970.865940][ T1437] loop3: p1 < > p2 < > p4 [ 2970.866312][T30880] loop1: detected capacity change from 0 to 1 [ 2970.874707][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2970.877388][T30883] loop4: detected capacity change from 0 to 131072 [ 2970.891596][ T1437] loop3: p1 < > p2 < > p4 [ 2970.891595][T30878] loop5: p1 < > p2 < > p4 [ 2970.892535][ T1437] loop3: p4 size 2097152 extends beyond EOD, [ 2970.896066][T30878] loop5: partition table partially beyond EOD, truncated [ 2970.896244][T30878] loop5: p1 start 10 is beyond EOD, [ 2970.900476][ T1437] truncated [ 2970.914050][T30880] loop1: p1 < > p2 < > p4 [ 2970.918892][T30878] truncated [ 2970.918960][T30878] loop5: p2 size 2 extends beyond EOD, [ 2970.922067][T30880] loop1: partition table partially beyond EOD, [ 2970.926473][T30878] truncated [ 2970.932436][T30887] loop2: detected capacity change from 0 to 131072 [ 2970.935133][T30880] truncated [ 2970.937932][T30880] loop1: p1 start 10 is beyond EOD, [ 2970.949039][T30878] loop5: p4 start 117440512 is beyond EOD, [ 2970.951051][T30880] truncated [ 2970.951057][T30880] loop1: p2 size 2 extends beyond EOD, truncated [ 2970.951538][T30883] loop4: p1 < > p2 < > p4 [ 2970.954237][T30878] truncated [ 2970.957131][T30880] loop1: p4 size 2097152 extends beyond EOD, [ 2970.962251][T30883] loop4: p4 size 2097152 extends beyond EOD, [ 2970.965428][T30880] truncated [ 2970.968549][T30883] truncated [ 2970.970637][T30876] loop3: p1 < > p2 < > p4 [ 2970.994035][T30887] loop2: p1 < > p2 < > p4 [ 2971.001223][T30876] loop3: p4 size 2097152 extends beyond EOD, [ 2971.002950][T30887] loop2: p4 size 2097152 extends beyond EOD, [ 2971.006100][T30876] truncated 17:12:38 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000023e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000380000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000090000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000007a0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2971.010409][T30887] truncated [ 2971.041732][ T1437] loop3: p1 < > p2 < > p4 [ 2971.053695][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:38 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000006000000000000000200055aa", 0x40, 0x1c0}]) [ 2971.103134][T30894] loop1: detected capacity change from 0 to 1 [ 2971.122025][T30896] loop4: detected capacity change from 0 to 131072 [ 2971.123221][T30893] loop5: detected capacity change from 0 to 1 [ 2971.134672][T30899] loop2: detected capacity change from 0 to 131072 [ 2971.156531][T30901] loop3: detected capacity change from 0 to 131072 [ 2971.163958][ T1437] loop1: p1 < > p2 < > p4 [ 2971.168387][ T1437] loop1: partition table partially beyond EOD, truncated [ 2971.174231][T30893] loop5: p1 < > p2 < > p4 [ 2971.175873][ T1437] loop1: p1 start 10 is beyond EOD, [ 2971.179887][T30893] loop5: partition table partially beyond EOD, [ 2971.179885][ T1437] truncated [ 2971.185195][T30893] truncated [ 2971.186677][T30893] loop5: p1 start 10 is beyond EOD, [ 2971.191420][ T1437] loop1: p2 size 2 extends beyond EOD, [ 2971.194577][T30893] truncated [ 2971.197657][ T1437] truncated [ 2971.200127][ T1437] loop1: p4 size 2097152 extends beyond EOD, [ 2971.202918][T30893] loop5: p2 size 2 extends beyond EOD, truncated [ 2971.205274][T30896] loop4: p1 < > p2 < > p4 [ 2971.208482][ T1437] truncated [ 2971.208724][T30899] loop2: p1 < > p2 < > p4 [ 2971.212132][T30901] loop3: p1 < > p2 < > p4 [ 2971.216356][T30899] loop2: p4 size 2097152 extends beyond EOD, [ 2971.227015][T30896] loop4: p4 size 2097152 extends beyond EOD, [ 2971.227379][T30899] truncated [ 2971.231745][T30896] truncated [ 2971.238219][T30901] loop3: p4 size 2097152 extends beyond EOD, [ 2971.245692][T30893] loop5: p4 start 150994944 is beyond EOD, [ 2971.249970][T30901] truncated [ 2971.256032][T30893] truncated [ 2971.281641][ T1437] loop1: p1 < > p2 < > p4 [ 2971.286109][ T1437] loop1: partition table partially beyond EOD, truncated [ 2971.295558][ T1437] loop1: p1 start 10 is beyond EOD, truncated 17:12:38 executing program 0: select(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x10001}, 0x0, 0x0) 17:12:38 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000390000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2971.301658][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2971.319882][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2971.340284][T30894] loop1: p1 < > p2 < > p4 [ 2971.342726][T30905] loop4: detected capacity change from 0 to 131072 17:12:38 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff800000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000000a0000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(0x0, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 17:12:38 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000026000000000000000200055aa", 0x40, 0x1c0}]) [ 2971.344764][T30894] loop1: partition table partially beyond EOD, truncated [ 2971.344915][T30894] loop1: p1 start 10 is beyond EOD, truncated [ 2971.364392][T30894] loop1: p2 size 2 extends beyond EOD, truncated [ 2971.374860][T30894] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2971.386491][T30909] loop2: detected capacity change from 0 to 131072 [ 2971.399152][T30912] loop5: detected capacity change from 0 to 1 17:12:38 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000100)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f00000000c0)=[{&(0x7f0000000040)='c', 0x1}], 0x1}, 0xc0c) 17:12:38 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000024e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0x0) [ 2971.407249][T30905] loop4: p1 < > p2 < > p4 [ 2971.413692][T30905] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2971.441491][T30916] loop3: detected capacity change from 0 to 131072 17:12:38 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/209, 0xd1}], 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001580)=""/4087, 0xfffffeed}, {&(0x7f0000000000)=""/69, 0x45}, {&(0x7f0000000540)=""/88, 0x58}, {&(0x7f0000000180)=""/188, 0xbc}, {&(0x7f0000000480)=""/190, 0xbe}], 0x5) poll(0x0, 0x0, 0x0) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000680)='t', 0x1}], 0x1) 17:12:38 executing program 0: shmget(0x1, 0x3000, 0xd2, &(0x7f0000feb000/0x3000)=nil) [ 2971.454089][T30921] loop1: detected capacity change from 0 to 1 [ 2971.466515][T30912] loop5: p1 < > p2 < > p4 [ 2971.470940][T30912] loop5: partition table partially beyond EOD, truncated [ 2971.478658][T30916] loop3: p1 < > p2 < > p4 [ 2971.488144][T30916] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2971.495386][T30912] loop5: p1 start 10 is beyond EOD, truncated [ 2971.495776][ T1437] loop1: p1 < > p2 < > p4 17:12:38 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003a0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff810000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2971.501450][T30912] loop5: p2 size 2 extends beyond EOD, truncated [ 2971.503218][T30912] loop5: p4 start 167772160 is beyond EOD, [ 2971.505903][ T1437] loop1: partition table partially beyond EOD, truncated [ 2971.506350][ T1437] loop1: p1 start 10 is beyond EOD, [ 2971.512238][T30912] truncated [ 2971.533593][ T1437] truncated [ 2971.536693][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2971.549832][T30932] loop2: detected capacity change from 0 to 131072 17:12:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, 0x0) 17:12:38 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000000b0000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000006300000000000000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x242, 0x0) writev(r0, &(0x7f0000000080)=[{0x0}], 0x1) [ 2971.558912][T30931] loop4: detected capacity change from 0 to 131072 [ 2971.569175][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2971.589564][ T1437] loop1: p1 < > p2 < > p4 [ 2971.594026][ T1437] loop1: partition table partially beyond EOD, truncated 17:12:38 executing program 0: perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8502}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2971.605287][T30937] loop5: detected capacity change from 0 to 1 [ 2971.614480][T30931] loop4: p1 < > p2 < > p4 [ 2971.618060][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2971.623410][T30931] loop4: p4 size 2097152 extends beyond EOD, [ 2971.625029][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2971.637415][T30931] truncated [ 2971.642577][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2971.649764][T30937] loop5: p1 < > p2 < > p4 17:12:38 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x5207, 0x0) [ 2971.654219][T30937] loop5: partition table partially beyond EOD, truncated [ 2971.655068][T30942] loop3: detected capacity change from 0 to 131072 [ 2971.666565][T30937] loop5: p1 start 10 is beyond EOD, truncated [ 2971.674006][T30937] loop5: p2 size 2 extends beyond EOD, truncated [ 2971.676313][T30921] loop1: p1 < > p2 < > p4 [ 2971.684924][T30921] loop1: partition table partially beyond EOD, truncated [ 2971.692531][T30937] loop5: p4 start 184549376 is beyond EOD, truncated [ 2971.700202][T30921] loop1: p1 start 10 is beyond EOD, truncated 17:12:38 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000025e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x5421, &(0x7f0000000280)={0xe25}) 17:12:38 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff820000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003b0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2971.706452][T30921] loop1: p2 size 2 extends beyond EOD, truncated [ 2971.712779][T30942] loop3: p1 < > p2 < > p4 [ 2971.718425][T30921] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2971.727986][T30942] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:38 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) accept$inet(r0, 0x0, 0x0) 17:12:38 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) recvmmsg(r0, &(0x7f0000004000)=[{{0x0, 0x0, &(0x7f00000015c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000380)=""/83, 0x53}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x3f}], 0x1, 0x12040, 0x0) [ 2971.755734][T30953] loop2: detected capacity change from 0 to 131072 [ 2971.766086][T30954] loop4: detected capacity change from 0 to 131072 17:12:38 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000000c0000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000016700000000000000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind(r0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80) [ 2971.797017][T30954] loop4: p1 < > p2 < > p4 [ 2971.800363][T30958] loop1: detected capacity change from 0 to 1 [ 2971.811609][T30954] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2971.818025][T30962] loop5: detected capacity change from 0 to 1 [ 2971.836574][T30958] loop1: p1 < > p2 < > p4 [ 2971.840388][ T1437] loop4: p1 < > p2 < > p4 17:12:38 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff850000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:38 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000003240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 2971.841053][T30958] loop1: partition table partially beyond EOD, truncated [ 2971.851840][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2971.864059][T30962] loop5: p1 < > p2 < > p4 [ 2971.868496][T30962] loop5: partition table partially beyond EOD, truncated [ 2971.885388][T30970] loop2: detected capacity change from 0 to 131072 17:12:38 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003c0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2971.890496][T30958] loop1: p1 start 10 is beyond EOD, truncated [ 2971.896461][T30965] loop3: detected capacity change from 0 to 131072 [ 2971.898043][T30958] loop1: p2 size 2 extends beyond EOD, truncated [ 2971.905224][T30962] loop5: p1 start 10 is beyond EOD, truncated [ 2971.916733][T30958] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2971.917251][T30962] loop5: p2 size 2 extends beyond EOD, truncated [ 2971.931093][T30962] loop5: p4 start 201326592 is beyond EOD, truncated 17:12:39 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000026e625000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:39 executing program 0: r0 = socket$inet(0x2, 0x803, 0x2) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, 0x0) 17:12:39 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000890000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2971.952759][T30974] loop4: detected capacity change from 0 to 131072 [ 2971.964809][T30965] loop3: p1 < > p2 < > p4 [ 2971.982163][T30965] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2971.989779][T30974] loop4: p1 < > p2 < > p4 17:12:39 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000000d0000200055aa", 0x40, 0x1c0}]) 17:12:39 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)) [ 2972.001395][T30974] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x2002099, &(0x7f0000002800)) [ 2972.025405][T30981] loop1: detected capacity change from 0 to 1 [ 2972.033832][T30982] loop5: detected capacity change from 0 to 1 [ 2972.042756][T30987] loop2: detected capacity change from 0 to 131072 [ 2972.053879][T30981] loop1: p1 < > p2 < > p4 [ 2972.058303][T30981] loop1: partition table partially beyond EOD, truncated [ 2972.065794][T30981] loop1: p1 start 10 is beyond EOD, truncated 17:12:39 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0xd000) 17:12:39 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000006800000000000000200055aa", 0x40, 0x1c0}]) 17:12:39 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003d0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2972.071945][T30981] loop1: p2 size 2 extends beyond EOD, truncated [ 2972.080739][T30987] loop2: p1 < > p2 < > p4 [ 2972.081404][T30982] loop5: p1 < > p2 < > p4 [ 2972.089609][T30982] loop5: partition table partially beyond EOD, truncated [ 2972.092152][T30987] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2972.109954][T30982] loop5: p1 start 10 is beyond EOD, truncated [ 2972.116177][T30982] loop5: p2 size 2 extends beyond EOD, truncated 17:12:39 executing program 0: mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000), 0xff, 0x0) 17:12:39 executing program 0: syz_io_uring_setup(0x41d7, &(0x7f0000000000), &(0x7f0000ff4000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000080), 0x0) syz_io_uring_setup(0x4425, &(0x7f0000000240), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 17:12:39 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f00000084c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40012103, 0x0) [ 2972.125341][T30981] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2972.140567][T30982] loop5: p4 start 218103808 is beyond EOD, truncated [ 2972.144972][T30996] loop4: detected capacity change from 0 to 131072 [ 2972.157444][T30995] loop3: detected capacity change from 0 to 131072 17:12:39 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000025e6000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000140), r0) recvmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:12:39 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff8c0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:39 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000000e0000200055aa", 0x40, 0x1c0}]) [ 2972.215172][T30996] loop4: p1 < > p2 < > p4 [ 2972.220499][T30995] loop3: p1 < > p2 < > p4 [ 2972.243015][T30996] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2972.248929][T31012] loop2: detected capacity change from 0 to 131072 [ 2972.256327][T31006] loop1: detected capacity change from 0 to 1 [ 2972.257979][T31010] loop5: detected capacity change from 0 to 1 [ 2972.274820][T30995] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2972.296549][T31006] loop1: p1 < > p2 < > p4 [ 2972.301009][T31006] loop1: partition table partially beyond EOD, truncated 17:12:39 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003e0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:39 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000006c00000000000000200055aa", 0x40, 0x1c0}]) [ 2972.326281][T31006] loop1: p1 start 10 is beyond EOD, truncated [ 2972.332394][T31006] loop1: p2 size 2 extends beyond EOD, truncated [ 2972.335914][T31010] loop5: p1 < > p2 < > p4 [ 2972.343176][T31010] loop5: partition table partially beyond EOD, truncated [ 2972.355195][T31010] loop5: p1 start 10 is beyond EOD, truncated [ 2972.361299][T31010] loop5: p2 size 2 extends beyond EOD, truncated 17:12:39 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff970000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2972.370402][T31006] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2972.389958][T31018] loop4: detected capacity change from 0 to 131072 [ 2972.397563][T31010] loop5: p4 start 234881024 is beyond EOD, truncated [ 2972.403962][T31015] loop3: detected capacity change from 0 to 131072 [ 2972.413463][T31020] loop2: detected capacity change from 0 to 131072 17:12:39 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000020000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:39 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000000f0000200055aa", 0x40, 0x1c0}]) 17:12:39 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000059c0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2972.426425][ T4457] loop4: p1 < > p2 < > p4 [ 2972.431926][ T4457] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2972.435518][ T1437] loop3: p1 < > p2 < > p4 [ 2972.458808][T31018] loop4: p1 < > p2 < > p4 [ 2972.468720][T31023] loop1: detected capacity change from 0 to 1 17:12:39 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffa10000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2972.473467][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2972.477792][T31018] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2972.492341][ T1437] loop3: p1 < > p2 < > p4 [ 2972.514822][T31026] loop5: detected capacity change from 0 to 1 17:12:39 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000003f0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:39 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffa50000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2972.523843][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2972.544847][T31023] loop1: p1 < > p2 < p5 > p3 p4 [ 2972.548098][T31015] loop3: p1 < > p2 < > p4 [ 2972.549836][T31023] loop1: partition table partially beyond EOD, truncated [ 2972.550052][T31023] loop1: p1 start 10 is beyond EOD, [ 2972.561114][T31032] loop4: detected capacity change from 0 to 131072 [ 2972.561335][T31023] truncated [ 2972.576234][T31023] loop1: p2 size 2 extends beyond EOD, truncated [ 2972.577092][T31034] loop2: detected capacity change from 0 to 131072 [ 2972.587443][T31026] loop5: p1 < > p2 < > p4 [ 2972.592186][T31015] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2972.593594][T31026] loop5: partition table partially beyond EOD, truncated [ 2972.600694][T31026] loop5: p1 start 10 is beyond EOD, truncated [ 2972.613631][T31026] loop5: p2 size 2 extends beyond EOD, truncated [ 2972.620762][T31023] loop1: p3 start 512 is beyond EOD, truncated [ 2972.626727][T31026] loop5: p4 start 251658240 is beyond EOD, truncated [ 2972.626980][T31023] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2972.635272][ T1437] loop3: p1 < > p2 < > p4 [ 2972.641165][T31023] loop1: p5 start 512 is beyond EOD, truncated [ 2972.647435][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2972.659028][T31032] loop4: p1 < > p2 < > p4 [ 2972.664968][T31032] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000003580)={0x0, 0x0, &(0x7f0000003540)={&(0x7f0000003480)=ANY=[], 0x9c}, 0x300}, 0x0) 17:12:40 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000030000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:40 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000110000200055aa", 0x40, 0x1c0}]) 17:12:40 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffa60000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:40 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000400000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:40 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000007400000000000000200055aa", 0x40, 0x1c0}]) [ 2973.100411][T31043] loop1: detected capacity change from 0 to 1 [ 2973.103949][T31039] loop5: detected capacity change from 0 to 1 [ 2973.111260][T31046] loop2: detected capacity change from 0 to 131072 17:12:40 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f00000084c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 2973.140816][T31042] loop3: detected capacity change from 0 to 131072 [ 2973.157143][T31044] loop4: detected capacity change from 0 to 131072 [ 2973.164197][ T4230] loop5: p1 < > p2 < > p4 [ 2973.168704][ T4230] loop5: partition table partially beyond EOD, truncated [ 2973.184055][ T4856] loop1: p1 < > p2 < p5 > p3 p4 [ 2973.189019][ T4856] loop1: partition table partially beyond EOD, truncated [ 2973.193472][ T4230] loop5: p1 start 10 is beyond EOD, truncated [ 2973.202169][ T4230] loop5: p2 size 2 extends beyond EOD, truncated [ 2973.204762][ T4856] loop1: p1 start 10 is beyond EOD, truncated [ 2973.214675][ T4856] loop1: p2 size 2 extends beyond EOD, truncated [ 2973.224399][T31042] loop3: p1 < > p2 < > p4 17:12:40 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffa90000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2973.242276][T31042] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2973.257727][T31044] loop4: p1 < > p2 < > p4 [ 2973.262354][ T4230] loop5: p4 start 285212672 is beyond EOD, truncated [ 2973.269635][ T4856] loop1: p3 start 768 is beyond EOD, truncated [ 2973.275841][ T4856] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2973.284186][T31044] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2973.293937][T31039] loop5: p1 < > p2 < > p4 [ 2973.298384][T31039] loop5: partition table partially beyond EOD, truncated [ 2973.306810][T31054] loop2: detected capacity change from 0 to 131072 [ 2973.308087][ T4856] loop1: p5 start 768 is beyond EOD, truncated [ 2973.329488][T31039] loop5: p1 start 10 is beyond EOD, truncated [ 2973.335631][T31039] loop5: p2 size 2 extends beyond EOD, truncated 17:12:40 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000002bc0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:40 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000e0110000200055aa", 0x40, 0x1c0}]) [ 2973.348890][T31043] loop1: p1 < > p2 < p5 > p3 p4 [ 2973.353662][T31039] loop5: p4 start 285212672 is beyond EOD, truncated [ 2973.353922][T31043] loop1: partition table partially beyond EOD, truncated [ 2973.368197][T31043] loop1: p1 start 10 is beyond EOD, truncated [ 2973.374409][T31043] loop1: p2 size 2 extends beyond EOD, truncated 17:12:40 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000800400000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:40 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000007a00000000000000200055aa", 0x40, 0x1c0}]) [ 2973.402575][T31056] loop2: detected capacity change from 0 to 131072 [ 2973.419784][T31058] loop5: detected capacity change from 0 to 1 [ 2973.439234][T31061] loop4: detected capacity change from 0 to 131072 [ 2973.440095][T31043] loop1: p3 start 768 is beyond EOD, truncated [ 2973.452084][T31043] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2973.461859][ T4998] loop2: p1 < > p2 < > p4 [ 2973.474549][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2973.485489][T31056] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 2973.505410][T31058] loop5: p1 < > p2 < > p4 [ 2973.509861][T31058] loop5: partition table partially beyond EOD, truncated [ 2973.520781][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 2973.529482][T31063] loop3: detected capacity change from 0 to 131072 [ 2973.536543][T31058] loop5: p1 start 10 is beyond EOD, truncated [ 2973.537748][T31043] loop1: p5 start 768 is beyond EOD, truncated [ 2973.543202][T31058] loop5: p2 size 2 extends beyond EOD, truncated 17:12:40 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000480000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:40 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000040000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:40 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffbf0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2973.587617][T31065] loop4: detected capacity change from 0 to 131072 [ 2973.588844][T31058] loop5: p4 start 299892736 is beyond EOD, truncated [ 2973.602591][T31063] loop3: p1 < > p2 < > p4 [ 2973.624282][T31069] loop1: detected capacity change from 0 to 1 [ 2973.626651][T31070] loop2: detected capacity change from 0 to 131072 [ 2973.638722][T31063] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2973.647980][T31065] loop4: p1 < > p2 < > p4 [ 2973.653258][T31065] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2973.660321][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop5p2, 10) failed: No such file or directory [ 2973.660458][ T4457] loop1: p1 < > p2 < p5 > p3 p4 [ 2973.675126][ T4457] loop1: partition table partially beyond EOD, truncated 17:12:40 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000120000200055aa", 0x40, 0x1c0}]) 17:12:40 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000004c0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:40 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000001c00000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2973.683233][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop5p4, 10) failed: No such file or directory [ 2973.700848][ T4457] loop1: p1 start 10 is beyond EOD, truncated [ 2973.706563][T31073] loop5: detected capacity change from 0 to 1 [ 2973.707059][ T4457] loop1: p2 size 2 extends beyond EOD, truncated [ 2973.720456][ T4457] loop1: p3 start 1024 is beyond EOD, truncated [ 2973.726752][ T4457] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2973.774739][ T4457] loop1: p5 start 1024 is beyond EOD, truncated [ 2973.777997][T31076] loop4: detected capacity change from 0 to 131072 [ 2973.791502][ T4998] loop5: p1 < > p2 < > p4 [ 2973.792147][T31069] loop1: p1 < > p2 < p5 > p3 p4 [ 2973.795948][ T4998] loop5: partition table partially beyond EOD, truncated [ 2973.800884][T31069] loop1: partition table partially beyond EOD, truncated [ 2973.811001][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 2973.820507][T31077] loop2: detected capacity change from 0 to 131072 [ 2973.825983][T31069] loop1: p1 start 10 is beyond EOD, truncated [ 2973.837313][T31069] loop1: p2 size 2 extends beyond EOD, truncated [ 2973.837345][ T4998] loop5: p1 start 10 is beyond EOD, truncated [ 2973.849797][ T4998] loop5: p2 size 2 extends beyond EOD, truncated [ 2973.874031][ T4998] loop5: p4 start 301989888 is beyond EOD, truncated [ 2973.874166][ T3068] loop2: p1 < > p2 < > p4 [ 2973.886821][ T4856] loop4: p1 < > p2 < > p4 [ 2973.891710][T31073] loop5: p1 < > p2 < > p4 [ 2973.896184][T31073] loop5: partition table partially beyond EOD, truncated [ 2973.907429][ T4856] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2973.916748][ T3068] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2973.926403][T31073] loop5: p1 start 10 is beyond EOD, truncated [ 2973.932527][T31073] loop5: p2 size 2 extends beyond EOD, truncated [ 2973.940785][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 2973.944134][T31069] loop1: p3 start 1024 is beyond EOD, truncated [ 2973.955965][T31073] loop5: p4 start 301989888 is beyond EOD, truncated [ 2973.956825][T31069] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:41 executing program 0: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ff9000/0x4000)=nil) 17:12:41 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000008900000000000000200055aa", 0x40, 0x1c0}]) 17:12:41 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000001c0000200055aa", 0x40, 0x1c0}]) 17:12:41 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)='H', 0x1}], 0x1, &(0x7f0000000140)=[{0x18, 0x0, 0x0, "83"}, {0xd0, 0x0, 0x0, "161aca34483e7538c202a1d31b9c30b878722699da54a3db50e960e5fea8685085533ebdc50bc91a7da4dfc4299ccb0dc9f5c5cb78b124fb374f772a57e5e77db41c3de33f262bfeeb77f04e6b7e55751d90a6d24a46e89abe9d3bce045c14c527660ce930b5fa9d2cff1820c810ed673e73e906cb88745cb9f492ec86825a0e3e69e81ec2ebc0c4fcab326882da4b515dfdfd4ac603daa6e464a02fa45ea02b1f57dff3d22cdfb1359db202c217bd39c8e64b7a9019cbc8cb"}], 0xe8}, 0x0) 17:12:41 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000540000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2973.975600][T31076] loop4: p1 < > p2 < > p4 [ 2973.981501][T31077] loop2: p1 < > p2 < > p4 [ 2973.992107][T31076] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2974.003417][T31077] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:41 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000005c20000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) write(r1, 0x0, 0x0) [ 2974.059381][T31080] loop3: detected capacity change from 0 to 131072 [ 2974.062607][T31069] loop1: p5 start 1024 is beyond EOD, truncated [ 2974.088528][T31089] loop5: detected capacity change from 0 to 1 17:12:41 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000050000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000080)="09229fc582d424f13ed0c05a781db2a75a85e6a610abf22db0a4a780e3fca836b77e6958369ed3d4e127d049797ff01028ecb6e4d00dc3da99b3b99d1bbced92ab4041f42064c31ecdf64389f6fa3ce3a818f54490e96bf7fe9e4b72f8d889922baf9d1693d1169a44190e8a298344c710d306269ef1ca462fd1e0d75511b945f29835b8106a24e6c728958679f5c3683b39dddada52bd6f5adf74b515cf5b0868139c05b762fb9e758001a119a7eb55cf832265198b751a993d052d7949338da754a3b14ed4f5faebe383f9da116c3a623beb2c3d38d832823d5d122abe70701aba91d377b6799a502ef3284121354fc8", 0xf1}, {&(0x7f0000000180)="af6be171ab7acfc912f8a601659ed1457459ac2e8efd942c5429cc5bd7c78acb5dc7ca6cacc001c5f082e13df2678910fb7ad4503f8e736142738535e1d2a15a9c1883687c009d22db1242c573c6b0cb64df61a834b323bb8a0163cb3299593d847e2db68d270831ff111a9403ad8b58f9718b8326862e6ad2d7c78ed64e1cfe3a7d2353420174c81de6580cc4e11746ac7ddcc918643ed076014ca9fb6de926ad5d17c5398c164125a1bb7742887330c5b6abe6fb2028f9c5c87eaba290d1c252e826fe19f58daa58df950a", 0xcc}, {&(0x7f0000000280)="ef72a9913561d218c5ced473125c9735c998262e53f763f68de65c7c8a86edb8134fc28198b33f6b8c9029d2335b8c1d1b2ea6bdfdb72ad8ee267ad47fd5549d37d35a141c67b8df1e659174861d612ecdca64af3768944465047202ca050b74dc2eeae181d68afef53f76c8ce348dbe5609ec4a8ab73ed13ba156f933accbb6cdb713b89259e86b2e184a7ca96ba39306a8dc", 0x93}, {&(0x7f0000000340)="73ce6fa5b0f26cedd25edc12a8706c874d82814fb1b87419ea549b04eb9f3b27cd0711677a0e7e0c40a7539d0d52057a134aee470ef681f87bc5e7536f57757cd2015a8d6494f8e93c61098b717be4bb7c150d3c6185639037cc031a31aeaa84479321d24f5aa95a40a7659369826a182780b62d9da7a6de35c232e13cefc00642aa6dd7871966aa91504634bd0cf57c8de96f83aac5b8c363c792660d31db7727f5805cec323b47f892d57e2a45337eb9ccf19612cfa402f8b9b7c24975ad596ce55967991e1bdbc0127ca1c05e9a1aec8e1e7771ad6405f137b115061c64be339d29b4b0e7e288c5", 0xe9}, {&(0x7f0000000440)="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", 0xc4b}], 0x5}, 0x0) [ 2974.107468][T31087] loop4: detected capacity change from 0 to 131072 [ 2974.125215][T31080] loop3: p1 < > p2 < > p4 [ 2974.132140][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 2974.139154][T31096] loop1: detected capacity change from 0 to 1 [ 2974.143773][T31089] loop5: p1 < > p2 < > p4 [ 2974.151414][T31094] loop2: detected capacity change from 0 to 131072 17:12:41 executing program 0: r0 = socket(0x2, 0x8001, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000040)=0x100000, 0x4) connect$unix(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="82022e2f4a"], 0x10) shutdown(r0, 0x1) [ 2974.152410][T31089] loop5: partition table partially beyond EOD, truncated [ 2974.164769][T31080] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2974.174253][T31087] loop4: p1 < > p2 < > p4 [ 2974.180801][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 2974.194556][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 2974.197610][T31089] loop5: p1 start 10 is beyond EOD, truncated [ 2974.210365][T31089] loop5: p2 size 2 extends beyond EOD, truncated [ 2974.220774][T31087] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2974.228190][ T4998] loop2: p1 < > p2 < > p4 [ 2974.237359][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2974.247198][T31096] loop1: p1 < > p2 < p5 > p3 p4 [ 2974.252255][T31096] loop1: partition table partially beyond EOD, truncated 17:12:41 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000001740)=""/4096, 0x1000) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r3, 0x4, 0x80) pwritev(r3, &(0x7f00000003c0), 0x273, 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x0) write(r1, &(0x7f0000000100)='~', 0x1) readv(r0, &(0x7f0000000000)=[{0x0}], 0x1) [ 2974.253089][T31089] loop5: p4 start 469762048 is beyond EOD, truncated [ 2974.266368][T31096] loop1: p1 start 10 is beyond EOD, truncated [ 2974.272521][T31096] loop1: p2 size 2 extends beyond EOD, truncated [ 2974.283762][T31096] loop1: p3 start 1280 is beyond EOD, truncated [ 2974.290044][T31096] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2974.299216][T31096] loop1: p5 start 1280 is beyond EOD, truncated [ 2974.299772][T31094] loop2: p1 < > p2 < > p4 17:12:41 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000009000000000000000200055aa", 0x40, 0x1c0}]) 17:12:41 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000001740)=""/4096, 0x1000) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r3, 0x4, 0x80) pwritev(r3, &(0x7f00000003c0), 0x273, 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x0) write(r1, &(0x7f0000000100)='~', 0x1) readv(r0, &(0x7f0000000000)=[{0x0}], 0x1) 17:12:41 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000200000200055aa", 0x40, 0x1c0}]) 17:12:41 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000550000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2974.307509][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory 17:12:41 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000060000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2974.356822][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 2974.370391][T31094] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2974.389755][T31113] loop5: detected capacity change from 0 to 1 [ 2974.398989][T31108] loop4: detected capacity change from 0 to 131072 17:12:41 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffc90000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2974.414100][T31111] loop3: detected capacity change from 0 to 131072 [ 2974.425040][T31113] loop5: p1 < > p2 < > p4 [ 2974.429578][T31113] loop5: partition table partially beyond EOD, truncated [ 2974.430334][T31117] loop1: detected capacity change from 0 to 1 [ 2974.444572][T31113] loop5: p1 start 10 is beyond EOD, truncated [ 2974.450667][T31113] loop5: p2 size 2 extends beyond EOD, truncated 17:12:41 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000001740)=""/4096, 0x1000) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r3, 0x4, 0x80) pwritev(r3, &(0x7f00000003c0), 0x273, 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x0) write(r1, &(0x7f0000000100)='~', 0x1) readv(r0, &(0x7f0000000000)=[{0x0}], 0x1) [ 2974.470918][T31113] loop5: p4 start 536870912 is beyond EOD, truncated [ 2974.478976][ T4230] loop4: p1 < > p2 < > p4 [ 2974.484438][ T4230] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2974.484717][T31111] loop3: p1 < > p2 < > p4 [ 2974.501128][T31108] loop4: p1 < > p2 < > p4 [ 2974.508284][T31108] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:41 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000250000200055aa", 0x40, 0x1c0}]) 17:12:41 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000001740)=""/4096, 0x1000) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r3, 0x4, 0x80) pwritev(r3, &(0x7f00000003c0), 0x273, 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x0) write(r1, &(0x7f0000000100)='~', 0x1) readv(r0, &(0x7f0000000000)=[{0x0}], 0x1) 17:12:41 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000600000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2974.518851][T31111] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2974.531912][ T4457] loop1: p1 < > p2 < p5 > p3 p4 [ 2974.536941][ T4457] loop1: partition table partially beyond EOD, truncated [ 2974.539601][T31126] loop5: detected capacity change from 0 to 1 [ 2974.551539][T31121] loop2: detected capacity change from 0 to 131072 [ 2974.560502][ T4457] loop1: p1 start 10 is beyond EOD, truncated [ 2974.566617][ T4457] loop1: p2 size 2 extends beyond EOD, truncated [ 2974.573898][ T4457] loop1: p3 start 1536 is beyond EOD, truncated [ 2974.580220][ T4457] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2974.584853][T31126] loop5: p1 < > p2 < > p4 [ 2974.591706][T31126] loop5: partition table partially beyond EOD, truncated [ 2974.593983][T31131] loop4: detected capacity change from 0 to 131072 [ 2974.599321][T31126] loop5: p1 start 10 is beyond EOD, truncated [ 2974.611401][T31126] loop5: p2 size 2 extends beyond EOD, truncated 17:12:41 executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r1, r0) 17:12:41 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000059c00000000000000200055aa", 0x40, 0x1c0}]) [ 2974.611787][ T4457] loop1: p5 start 1536 is beyond EOD, truncated [ 2974.619744][T31126] loop5: p4 start 620756992 is beyond EOD, truncated [ 2974.632126][T31117] loop1: p1 < > p2 < p5 > p3 p4 [ 2974.637142][T31117] loop1: partition table partially beyond EOD, truncated [ 2974.652191][T31117] loop1: p1 start 10 is beyond EOD, truncated [ 2974.658321][T31117] loop1: p2 size 2 extends beyond EOD, truncated [ 2974.665906][T31117] loop1: p3 start 1536 is beyond EOD, truncated 17:12:41 executing program 0: symlinkat(&(0x7f0000000180)='.\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00') r0 = open$dir(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file1\x00', 0x0) 17:12:41 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000dc0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:41 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000260000200055aa", 0x40, 0x1c0}]) 17:12:41 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, 0x0, 0x0) [ 2974.672235][T31117] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2974.681904][T31117] loop1: p5 start 1536 is beyond EOD, truncated [ 2974.696007][ T4856] loop4: p1 < > p2 < > p4 17:12:41 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000070000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2974.727314][T31134] loop3: detected capacity change from 0 to 131072 [ 2974.728244][ T4856] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2974.743254][T31143] loop5: detected capacity change from 0 to 1 [ 2974.754496][T31131] loop4: p1 < > p2 < > p4 [ 2974.760696][T31131] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2974.767416][T31147] loop2: detected capacity change from 0 to 131072 17:12:41 executing program 0: getgroups(0x7, &(0x7f0000000000)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) setregid(r0, 0x0) setgid(0x0) 17:12:41 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000002600000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:41 executing program 0: pwritev(0xffffffffffffffff, &(0x7f0000000ac0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0) [ 2974.770349][T31148] loop1: detected capacity change from 0 to 1 [ 2974.791322][T31134] loop3: p1 < > p2 < > p4 [ 2974.808347][T31143] loop5: p1 < > p2 < > p4 [ 2974.812790][T31143] loop5: partition table partially beyond EOD, truncated [ 2974.821931][T31148] loop1: p1 < > p2 < p5 > p3 p4 17:12:41 executing program 0: syz_emit_ethernet(0x7e, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd6031077100483a00fe8000000000000000000000000000aaff020006"], 0x0) [ 2974.826932][T31148] loop1: partition table partially beyond EOD, truncated [ 2974.828226][T31143] loop5: p1 start 10 is beyond EOD, truncated [ 2974.834039][T31147] loop2: p1 < > p2 < > p4 [ 2974.840044][T31143] loop5: p2 size 2 extends beyond EOD, truncated [ 2974.841923][T31143] loop5: p4 start 637534208 is beyond EOD, [ 2974.845204][T31134] loop3: p4 size 2097152 extends beyond EOD, [ 2974.850789][T31143] truncated [ 2974.866334][T31134] truncated [ 2974.867422][T31148] loop1: p1 start 10 is beyond EOD, truncated 17:12:41 executing program 0: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)=@abs, 0x8) 17:12:41 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffe40000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2974.871420][T31147] loop2: p4 size 2097152 extends beyond EOD, [ 2974.875623][T31148] loop1: p2 size 2 extends beyond EOD, truncated [ 2974.881477][T31148] loop1: p3 start 1792 is beyond EOD, [ 2974.881700][T31147] truncated [ 2974.896881][T31148] truncated [ 2974.899979][T31148] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2974.911490][T31153] loop4: detected capacity change from 0 to 131072 [ 2974.919685][T31148] loop1: p5 start 1792 is beyond EOD, truncated 17:12:41 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000a000000000000000200055aa", 0x40, 0x1c0}]) 17:12:41 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @empty, @val, {@ipv6}}, 0x0) 17:12:41 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000032c0000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) [ 2974.953464][T31163] loop2: detected capacity change from 0 to 131072 [ 2974.967313][ T3068] loop4: p1 < > p2 < > p4 [ 2974.975357][ T3068] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2974.991753][T31153] loop4: p1 < > p2 < > p4 [ 2974.995698][T31167] loop5: detected capacity change from 0 to 1 17:12:42 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000080000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 0: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) 17:12:42 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000ec0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000630000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000100)=@abs={0x0, 0x0, 0x1}, 0xffffffffffffff25, &(0x7f00000002c0)=[{&(0x7f0000000140)="9e0df5f4dabacf1cab82543a4ffab0da59eb66e842fe420fe17b0a3cdefe9825a7cec042c7b27bae7627f58bada30643a573a851f5f3fdb1338dfe019c4e2f8cba4e4247b5eacff236c554eb15594c04e6af6d289ddf1c2a999101385c1eca560c232db69f1c07c267dda879", 0x6c}, {&(0x7f00000001c0)="c9111c39d5a9997211a806a11705c47fcd9b0ca246af6e6aea96a17dd7c53b9d991f157b8d4d97bfb06a4dbde6b73a40689681980e76ec7f58530c8a6abecab88b6b603585ce0f1ab814747b4ea4eb3bc0de43ab94df0fd68f07b83b89d6b2bbae712f65cc18836b8ef0b881", 0x6c}, {&(0x7f0000000240)="5830139fa121b7db45fffb696716cfea6812e62e672d3450409005b5573677c139902d5c4d4af4fda2059f12e5e2b9143e38aa2ff1a09d88535964f221939af8ea6a037319f98e1a", 0x48}], 0x3, &(0x7f0000000300)=[@cred], 0x20}, 0x0) [ 2974.999155][T31153] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2975.038981][T31169] loop3: detected capacity change from 0 to 131072 [ 2975.042301][T31174] loop1: detected capacity change from 0 to 1 17:12:42 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd60c2f6bc00145000fe8000000000000000000000000000aafe"], 0x0) [ 2975.076352][T31179] loop2: detected capacity change from 0 to 131072 [ 2975.083057][ T1437] loop5: p1 < > p2 < > p4 [ 2975.087516][ T1437] loop5: partition table partially beyond EOD, truncated [ 2975.095242][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2975.095467][T31174] loop1: p1 < > p2 < p5 > p3 p4 [ 2975.101358][ T1437] loop5: p2 size 2 extends beyond EOD, [ 2975.106306][T31174] loop1: partition table partially beyond EOD, truncated [ 2975.111846][ T1437] truncated [ 2975.122379][T31179] loop2: p1 < > p2 < > p4 17:12:42 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000700), 0x10981, 0x0) write(r0, &(0x7f0000000000)='7', 0x1) 17:12:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x7, 0xaa, 0x8, 0x9}, {0xffd2}]}) [ 2975.125319][T31169] loop3: p1 < > p2 < > p4 [ 2975.128159][T31185] loop4: detected capacity change from 0 to 131072 [ 2975.140898][T31179] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2975.149169][ T1437] loop5: p4 start 738394112 is beyond EOD, truncated [ 2975.150014][T31169] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2975.164748][T31174] loop1: p1 start 10 is beyond EOD, truncated [ 2975.170864][T31174] loop1: p2 size 2 extends beyond EOD, truncated [ 2975.177332][ T1437] loop5: p1 < > p2 < > p4 [ 2975.181767][ T1437] loop5: partition table partially beyond EOD, truncated [ 2975.189132][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2975.194459][T31174] loop1: p3 start 2048 is beyond EOD, truncated [ 2975.195240][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2975.207867][T31174] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2975.209620][ T1437] loop5: p4 start 738394112 is beyond EOD, truncated [ 2975.217189][T31174] loop1: p5 start 2048 is beyond EOD, truncated 17:12:42 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000002bc00000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 0: socket(0x1d, 0x0, 0x8001) [ 2975.222514][T31185] loop4: p1 < > p2 < > p4 [ 2975.233103][T31185] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2975.242123][T31167] loop5: p1 < > p2 < > p4 [ 2975.246787][T31167] loop5: partition table partially beyond EOD, truncated [ 2975.255020][T31167] loop5: p1 start 10 is beyond EOD, truncated [ 2975.261087][T31167] loop5: p2 size 2 extends beyond EOD, truncated [ 2975.267814][T31167] loop5: p4 start 738394112 is beyond EOD, truncated 17:12:42 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000002e0000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffee0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x13c, 0x10, 0x633, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@dev}, {@in, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, "f9"}}]}, 0x13c}}, 0x0) 17:12:42 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000090000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000001670000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2975.316147][T31195] loop3: detected capacity change from 0 to 131072 [ 2975.350524][T31197] loop2: detected capacity change from 0 to 131072 [ 2975.350973][T31204] loop4: detected capacity change from 0 to 131072 17:12:42 executing program 0: openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x1ad143) 17:12:42 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) lseek(r0, 0x0, 0x2) getdents(r0, &(0x7f00000010c0)=""/4096, 0x1000) sendmsg$unix(r0, &(0x7f0000000100)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa, &(0x7f00000000c0)=[{&(0x7f0000000040)="43acadd699f788e01d962696d096652158c836d701d38c02f9b99b8a7cfa9954e85fb609452ba809f4adc6304a2150c1377b224b6e42508b95", 0x39}], 0x1, 0x0, 0x0, 0x4}, 0x801) syz_emit_ethernet(0x38, &(0x7f0000000080)={@local, @random="d14ade34065c", @val, {@ipv6}}, 0x0) [ 2975.360436][T31207] loop1: detected capacity change from 0 to 1 [ 2975.365574][T31205] loop5: detected capacity change from 0 to 1 [ 2975.376219][ T1437] loop3: p1 < > p2 < > p4 [ 2975.381620][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2975.395222][T31195] loop3: p1 < > p2 < > p4 [ 2975.405468][T31195] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001c00)={0x0, 0x14}}, 0x0) [ 2975.414913][T31205] loop5: p1 < > p2 < > p4 [ 2975.419346][T31205] loop5: partition table partially beyond EOD, truncated [ 2975.426509][T31207] loop1: p1 < > p2 < p5 > p3 p4 [ 2975.431750][T31207] loop1: partition table partially beyond EOD, truncated [ 2975.440062][T31207] loop1: p1 start 10 is beyond EOD, truncated [ 2975.446209][T31207] loop1: p2 size 2 extends beyond EOD, truncated [ 2975.452688][T31204] loop4: p1 < > p2 < > p4 [ 2975.456088][T31205] loop5: p1 start 10 is beyond EOD, truncated 17:12:42 executing program 0: ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) read(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={0x0, 0x800}, 0x8) ftruncate(r2, 0x200002) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 2975.459455][T31204] loop4: p4 size 2097152 extends beyond EOD, [ 2975.463186][T31205] loop5: p2 size 2 extends beyond EOD, truncated [ 2975.475668][T31204] truncated [ 2975.480623][T31205] loop5: p4 start 771751936 is beyond EOD, truncated [ 2975.481063][T31207] loop1: p3 start 2304 is beyond EOD, truncated [ 2975.493640][T31207] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2975.502217][ T1437] loop3: p1 < > p2 < > p4 [ 2975.502396][T31207] loop1: p5 start 2304 is beyond EOD, truncated 17:12:42 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fffffff60000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000c000000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000003f0000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 0: syz_io_uring_setup(0x1772, &(0x7f0000003880)={0x0, 0x0, 0x12}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000640), &(0x7f0000000880)) 17:12:42 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000a0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2975.517791][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2975.535134][T31224] loop2: detected capacity change from 0 to 131072 17:12:42 executing program 0: syz_io_uring_setup(0x2e32, &(0x7f0000000040)={0x0, 0x494b, 0x8}, &(0x7f0000fee000/0x12000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000100)) 17:12:42 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000680000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000180), 0x4) [ 2975.577282][T31229] loop5: detected capacity change from 0 to 1 [ 2975.614268][T31239] loop1: detected capacity change from 0 to 1 [ 2975.615973][T31238] loop4: detected capacity change from 0 to 131072 17:12:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000100)=[{0x3}]}) 17:12:42 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000001fff80000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2975.629310][T31233] loop3: detected capacity change from 0 to 131072 [ 2975.643929][T31239] loop1: p1 < > p2 < p5 > p3 p4 [ 2975.648883][T31239] loop1: partition table partially beyond EOD, truncated [ 2975.656172][T31229] loop5: p1 < > p2 < > p4 [ 2975.660622][T31229] loop5: partition table partially beyond EOD, truncated [ 2975.668307][ T1437] loop4: p1 < > p2 < > p4 [ 2975.673734][T31229] loop5: p1 start 10 is beyond EOD, truncated 17:12:42 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xffffffffffffffe2, 0x0}, 0x38, 0x0) [ 2975.677589][T31246] loop2: detected capacity change from 0 to 131072 [ 2975.679873][T31229] loop5: p2 size 2 extends beyond EOD, truncated [ 2975.693396][T31239] loop1: p1 start 10 is beyond EOD, truncated [ 2975.699547][T31239] loop1: p2 size 2 extends beyond EOD, truncated [ 2975.707304][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2975.707498][T31233] loop3: p1 < > p2 < > p4 [ 2975.719506][T31239] loop1: p3 start 2560 is beyond EOD, truncated 17:12:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x5, &(0x7f0000000040)=@framed={{}, [@btf_id]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc5, &(0x7f00000000c0)=""/197, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:12:42 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x80, 0x4) [ 2975.725832][T31239] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2975.734558][T31229] loop5: p4 start 1056964608 is beyond EOD, truncated [ 2975.740228][T31233] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2975.742572][T31239] loop1: p5 start 2560 is beyond EOD, truncated [ 2975.754554][ T1437] loop4: p1 < > p2 < > p4 [ 2975.757925][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:42 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000005c200000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)={0x3, 'vlan0\x00'}) 17:12:42 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fffffffb0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000400000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000b0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:42 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000006c0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2975.765917][ T24] audit: type=1400 audit(1640106762.777:424): avc: denied { setopt } for pid=31252 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 2975.787654][T31238] loop4: p1 < > p2 < > p4 [ 2975.792793][T31238] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:42 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)=""/113, 0x71}], 0x1090}, 0x38, 0x0) [ 2975.848527][ T24] audit: type=1400 audit(1640106762.867:425): avc: denied { ioctl } for pid=31256 comm="syz-executor.0" path="socket:[481812]" dev="sockfs" ino=481812 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 2975.858778][T31261] loop5: detected capacity change from 0 to 1 [ 2975.877113][T31257] loop2: detected capacity change from 0 to 131072 [ 2975.889963][T31262] loop1: detected capacity change from 0 to 1 17:12:42 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) [ 2975.910956][T31261] loop5: p1 < > p2 < > p4 [ 2975.915446][T31261] loop5: partition table partially beyond EOD, truncated [ 2975.925509][T31269] loop4: detected capacity change from 0 to 131072 [ 2975.933201][T31265] loop3: detected capacity change from 0 to 131072 [ 2975.936256][T31261] loop5: p1 start 10 is beyond EOD, truncated [ 2975.945992][T31261] loop5: p2 size 2 extends beyond EOD, truncated [ 2975.946137][T31262] loop1: p1 < > p2 < p5 > p3 p4 17:12:43 executing program 0: socket(0xa, 0x0, 0x81) 17:12:43 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fffffdfd0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2975.954670][T31261] loop5: p4 start 1073741824 is beyond EOD, truncated [ 2975.957451][T31262] loop1: partition table partially beyond EOD, truncated [ 2975.971445][T31262] loop1: p1 start 10 is beyond EOD, truncated [ 2975.977548][T31262] loop1: p2 size 2 extends beyond EOD, truncated [ 2975.985344][T31262] loop1: p3 start 2816 is beyond EOD, truncated [ 2975.991604][T31262] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2975.998026][T31269] loop4: p1 < > p2 < > p4 [ 2976.007039][T31265] loop3: p1 < > p2 < > p4 17:12:43 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000480000200055aa", 0x40, 0x1c0}]) [ 2976.007485][T31262] loop1: p5 start 2816 is beyond EOD, truncated [ 2976.015132][T31269] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2976.029467][T31265] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2976.035043][T31278] loop2: detected capacity change from 0 to 131072 [ 2976.053418][ T1437] loop3: p1 < > p2 < > p4 17:12:43 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000ec00000000000000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 0: open(&(0x7f0000000480)='./file0\x00', 0x140, 0x88) 17:12:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) futimesat(r0, 0x0, &(0x7f0000000100)={{0x77359400}}) [ 2976.060238][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2976.062802][T31281] loop5: detected capacity change from 0 to 1 17:12:43 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fffffffd0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000c0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000740000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2976.104555][T31281] loop5: p1 < > p2 < > p4 [ 2976.109001][T31281] loop5: partition table partially beyond EOD, truncated [ 2976.140404][T31286] loop3: detected capacity change from 0 to 131072 [ 2976.151692][T31289] loop1: detected capacity change from 0 to 1 [ 2976.159246][T31281] loop5: p1 start 10 is beyond EOD, truncated [ 2976.165365][T31281] loop5: p2 size 2 extends beyond EOD, truncated [ 2976.170489][T31293] loop2: detected capacity change from 0 to 131072 [ 2976.171832][ T24] audit: type=1400 audit(1640106763.187:426): avc: denied { setattr } for pid=31288 comm="syz-executor.0" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:null_device_t tclass=chr_file permissive=1 17:12:43 executing program 0: keyctl$reject(0x13, 0x0, 0x0, 0x8, 0x0) 17:12:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000100)=[{}, {0xa8}]}) [ 2976.181923][T31295] loop4: detected capacity change from 0 to 131072 [ 2976.207422][T31281] loop5: p4 start 1207959552 is beyond EOD, truncated [ 2976.224707][T31289] loop1: p1 < > p2 < p5 > p3 p4 [ 2976.229663][T31289] loop1: partition table partially beyond EOD, truncated [ 2976.236852][T31286] loop3: p1 < > p2 < > p4 [ 2976.238184][T31289] loop1: p1 start 10 is beyond EOD, truncated [ 2976.247480][T31289] loop1: p2 size 2 extends beyond EOD, truncated 17:12:43 executing program 0: syz_io_uring_setup(0x1772, &(0x7f0000003880)={0x0, 0x0, 0x12}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000640), 0x0) 17:12:43 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fffffffe0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000004c0000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001c00)={&(0x7f0000001b80)=ANY=[], 0x14}}, 0x0) [ 2976.256397][T31286] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2976.261185][T31289] loop1: p3 start 3072 is beyond EOD, truncated [ 2976.269690][T31289] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2976.282368][T31289] loop1: p5 start 3072 is beyond EOD, truncated [ 2976.295764][T31295] loop4: p1 < > p2 < > p4 17:12:43 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000011fa00000000000000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000062c0)) 17:12:43 executing program 0: open$dir(&(0x7f00000001c0)='./file0\x00', 0x40, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) 17:12:43 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000d0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2976.312152][T31295] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2976.314828][T31308] loop5: detected capacity change from 0 to 1 [ 2976.325657][T31307] loop2: detected capacity change from 0 to 131072 17:12:43 executing program 0: open$dir(&(0x7f00000001c0)='./file0\x00', 0x40, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, 0x0, 0x2) 17:12:43 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000007a0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2976.377209][ T1437] loop5: p1 < > p2 < > p4 [ 2976.381686][ T1437] loop5: partition table partially beyond EOD, truncated [ 2976.391301][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2976.397420][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2976.410336][T31320] loop1: detected capacity change from 0 to 1 [ 2976.411722][T31315] loop3: detected capacity change from 0 to 131072 17:12:43 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, 0x0) 17:12:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) timerfd_gettime(r0, 0x0) 17:12:43 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000003ff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2976.427183][T31325] loop4: detected capacity change from 0 to 131072 [ 2976.434453][ T1437] loop5: p4 start 1275068416 is beyond EOD, truncated [ 2976.451522][ T1437] loop5: p1 < > p2 < > p4 [ 2976.456032][ T1437] loop5: partition table partially beyond EOD, truncated [ 2976.463363][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2976.465625][T31320] loop1: p1 < > p2 < p5 > p3 p4 17:12:43 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/power_supply', 0x5d1c81, 0x0) [ 2976.469543][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2976.474475][T31320] loop1: partition table partially beyond EOD, truncated [ 2976.487154][T31315] loop3: p1 < > p2 < > p4 [ 2976.488614][T31325] loop4: p1 < > p2 < > p4 [ 2976.500154][T31320] loop1: p1 start 10 is beyond EOD, truncated [ 2976.502896][T31325] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2976.506287][T31320] loop1: p2 size 2 extends beyond EOD, truncated [ 2976.522094][T31320] loop1: p3 start 3328 is beyond EOD, truncated [ 2976.525510][T31315] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2976.528415][T31320] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2976.536188][T31320] loop1: p5 start 3328 is beyond EOD, truncated [ 2976.543918][T31332] loop2: detected capacity change from 0 to 131072 [ 2976.549619][ T1437] loop5: p4 start 1275068416 is beyond EOD, truncated [ 2976.564093][T31308] loop5: p1 < > p2 < > p4 [ 2976.568514][T31308] loop5: partition table partially beyond EOD, truncated 17:12:43 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000540000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 0: add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) 17:12:43 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff800000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000fffe00000000000000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000e0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 0: pipe2$9p(&(0x7f0000000300), 0x800) [ 2976.576874][T31308] loop5: p1 start 10 is beyond EOD, truncated [ 2976.582948][T31308] loop5: p2 size 2 extends beyond EOD, truncated [ 2976.590432][T31308] loop5: p4 start 1275068416 is beyond EOD, truncated [ 2976.603674][T31332] loop2: p1 < > p2 < > p4 [ 2976.609449][T31332] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) inotify_rm_watch(r0, 0x0) 17:12:43 executing program 0: open(&(0x7f0000000180)='./file0\x00', 0xa40, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x3) 17:12:43 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000fff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2976.651999][T31342] loop1: detected capacity change from 0 to 1 [ 2976.663314][T31338] loop5: detected capacity change from 0 to 1 [ 2976.680572][T31345] loop4: detected capacity change from 0 to 131072 17:12:43 executing program 0: r0 = semget$private(0x0, 0x2, 0x0) semctl$GETVAL(r0, 0x1, 0xc, &(0x7f0000000100)=""/155) [ 2976.714739][T31338] loop5: p1 < > p2 < > p4 [ 2976.719191][T31338] loop5: partition table partially beyond EOD, truncated [ 2976.721734][T31348] loop3: detected capacity change from 0 to 131072 [ 2976.736213][T31338] loop5: p1 start 10 is beyond EOD, truncated [ 2976.740534][T31342] loop1: p1 < > p2 < p5 > p3 p4 [ 2976.742339][T31338] loop5: p2 size 2 extends beyond EOD, truncated [ 2976.747302][T31342] loop1: partition table partially beyond EOD, truncated 17:12:43 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) [ 2976.754673][T31338] loop5: p4 start 1409286144 is beyond EOD, truncated [ 2976.764426][T31342] loop1: p1 start 10 is beyond EOD, truncated [ 2976.773564][T31342] loop1: p2 size 2 extends beyond EOD, truncated [ 2976.783389][ T1437] loop5: p1 < > p2 < > p4 [ 2976.785168][T31355] loop2: detected capacity change from 0 to 131072 [ 2976.787857][ T1437] loop5: partition table partially beyond EOD, truncated [ 2976.802040][T31342] loop1: p3 start 3584 is beyond EOD, truncated [ 2976.806203][ T1437] loop5: p1 start 10 is beyond EOD, truncated 17:12:43 executing program 0: r0 = socket$inet6(0x2, 0xa, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x84, 0x32, 0x0, 0x0) [ 2976.808347][T31342] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2976.814415][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2976.822818][T31342] loop1: p5 start 3584 is beyond EOD, truncated [ 2976.834951][T31348] loop3: p1 < > p2 < > p4 [ 2976.845585][T31355] loop2: p1 < > p2 < > p4 [ 2976.845781][T31348] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2976.851937][T31355] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:43 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000550000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff810000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000a80), 0x0, 0x0, 0x0) 17:12:43 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000003ff00000000000000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000f0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:43 executing program 0: keyctl$reject(0x13, 0x0, 0x0, 0x8000, 0x0) 17:12:43 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffefff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2976.870954][ T1437] loop5: p4 start 1409286144 is beyond EOD, truncated [ 2976.901012][T31366] loop4: detected capacity change from 0 to 131072 17:12:44 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000100)='./file0\x00', 0x0) 17:12:44 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff820000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000004140)='./file0\x00', 0x2, 0x20) [ 2976.948169][T31374] loop1: detected capacity change from 0 to 1 [ 2976.951529][T31369] loop5: detected capacity change from 0 to 1 [ 2976.976674][T31373] loop2: detected capacity change from 0 to 131072 17:12:44 executing program 0: symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000000)='./file0/file0\x00') [ 2976.994651][T31378] loop3: detected capacity change from 0 to 131072 [ 2977.009091][T31385] loop4: detected capacity change from 0 to 131072 [ 2977.016343][T31374] loop1: p1 < > p2 < p5 > p3 p4 [ 2977.021298][T31374] loop1: partition table partially beyond EOD, truncated [ 2977.023496][ T1437] loop5: p1 < > p2 < > p4 [ 2977.029871][T31374] loop1: p1 start 10 is beyond EOD, [ 2977.032874][ T1437] loop5: partition table partially beyond EOD, truncated 17:12:44 executing program 0: r0 = socket$inet6(0x2, 0x5, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x84, 0x72, 0x0, 0x0) [ 2977.033066][ T1437] loop5: p1 start 10 is beyond EOD, [ 2977.038199][T31374] truncated [ 2977.038205][T31374] loop1: p2 size 2 extends beyond EOD, truncated [ 2977.041750][T31374] loop1: p3 start 3840 is beyond EOD, [ 2977.045257][ T1437] truncated [ 2977.045264][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2977.050547][T31374] truncated [ 2977.050552][T31374] loop1: p4 size 2097152 extends beyond EOD, [ 2977.058728][ T1437] loop5: p4 start 1426063360 is beyond EOD, [ 2977.059977][T31374] truncated [ 2977.069658][T31374] loop1: p5 start 3840 is beyond EOD, [ 2977.074881][ T1437] truncated [ 2977.086060][T31378] loop3: p1 < > p2 < > p4 [ 2977.090121][T31374] truncated [ 2977.101444][ T1437] loop5: p1 < > p2 < > p4 [ 2977.107931][T31378] loop3: p4 size 2097152 extends beyond EOD, [ 2977.109668][ T1437] loop5: partition table partially beyond EOD, truncated [ 2977.110261][ T1437] loop5: p1 start 10 is beyond EOD, [ 2977.114170][T31378] truncated [ 2977.120303][ T1437] truncated [ 2977.120308][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2977.122949][ T1437] loop5: p4 start 1426063360 is beyond EOD, truncated [ 2977.154450][T31369] loop5: p1 < > p2 < > p4 [ 2977.158884][T31369] loop5: partition table partially beyond EOD, truncated [ 2977.170591][T31369] loop5: p1 start 10 is beyond EOD, truncated [ 2977.176728][T31369] loop5: p2 size 2 extends beyond EOD, truncated [ 2977.183805][T31369] loop5: p4 start 1426063360 is beyond EOD, truncated 17:12:44 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000600000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x8922, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @loopback}}) 17:12:44 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000001ffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff850000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000100000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000fff00000000000000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80d00, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000000002000019000020600100000f2d0000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f00000000c0)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000001c0)=ANY=[]) [ 2977.240977][T31396] sit0: mtu greater than device maximum [ 2977.251488][T31400] loop2: detected capacity change from 0 to 131072 [ 2977.255823][T31401] loop1: detected capacity change from 0 to 1 [ 2977.270332][T31397] loop4: detected capacity change from 0 to 131072 17:12:44 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000890000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2977.292207][T31405] loop5: detected capacity change from 0 to 1 [ 2977.296373][T31402] loop3: detected capacity change from 0 to 131072 [ 2977.308854][T31407] loop0: detected capacity change from 0 to 1030 [ 2977.317082][T31401] loop1: p1 < > p2 < p5 > p3 p4 [ 2977.322098][T31401] loop1: partition table partially beyond EOD, truncated 17:12:44 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000003ffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2977.334618][T31407] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 2977.340839][T31402] loop3: p1 < > p2 < > p4 [ 2977.346269][T31405] loop5: p1 < > p2 < > p4 [ 2977.352996][T31405] loop5: partition table partially beyond EOD, truncated [ 2977.379539][T31402] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2977.384839][T31405] loop5: p1 start 10 is beyond EOD, truncated [ 2977.392563][T31405] loop5: p2 size 2 extends beyond EOD, truncated [ 2977.397192][T31401] loop1: p1 start 10 is beyond EOD, truncated [ 2977.399363][T31407] EXT4-fs (loop0): orphan cleanup on readonly fs [ 2977.405032][T31401] loop1: p2 size 2 extends beyond EOD, truncated [ 2977.411544][T31407] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 33554432 [ 2977.429017][T31405] loop5: p4 start 1610612736 is beyond EOD, truncated 17:12:44 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000feff00000000000000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff8c0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000110000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2977.447291][T31407] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 2977.468844][T31401] loop1: p3 start 4096 is beyond EOD, truncated [ 2977.475137][T31401] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2977.482599][T31401] loop1: p5 start 4096 is beyond EOD, truncated [ 2977.484007][T31415] loop2: detected capacity change from 0 to 131072 17:12:44 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000002600000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890c, &(0x7f0000000040)={0x0, @nl=@unspec={0x7}, @generic={0x0, "1f828c016401e98399c713053ee9"}, @l2tp={0x2, 0x0, @remote, 0x0, 0x700}, 0x0, 0x0, 0x0, 0x3f000000}) [ 2977.528272][T31417] loop3: detected capacity change from 0 to 131072 [ 2977.533221][T31419] loop4: detected capacity change from 0 to 131072 17:12:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x5508, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000400)='ext4_mballoc_prealloc\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 17:12:44 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000080ffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffff970000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2977.574422][T31423] loop1: detected capacity change from 0 to 1 [ 2977.587644][ T3066] loop3: p1 < > p2 < > p4 [ 2977.596958][T31426] loop5: detected capacity change from 0 to 1 [ 2977.607392][ T3066] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2977.624535][ T4856] loop1: p1 < > p2 < p5 > p3 p4 [ 2977.629492][ T4856] loop1: partition table partially beyond EOD, truncated [ 2977.638270][T31426] loop5: p1 < > p2 < > p4 [ 2977.642787][T31426] loop5: partition table partially beyond EOD, truncated [ 2977.646051][T31417] loop3: p1 < > p2 < > p4 [ 2977.659531][ T4856] loop1: p1 start 10 is beyond EOD, truncated [ 2977.662685][T31431] loop2: detected capacity change from 0 to 131072 [ 2977.665638][ T4856] loop1: p2 size 2 extends beyond EOD, truncated [ 2977.672896][ T4856] loop1: p3 start 4352 is beyond EOD, truncated [ 2977.684782][ T4856] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2977.699340][T31426] loop5: p1 start 10 is beyond EOD, truncated [ 2977.700358][T31417] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2977.705598][T31426] loop5: p2 size 2 extends beyond EOD, truncated [ 2977.722446][T31434] loop4: detected capacity change from 0 to 131072 [ 2977.733892][ T4856] loop1: p5 start 4352 is beyond EOD, truncated [ 2977.747869][T31423] loop1: p1 < > p2 < p5 > p3 p4 [ 2977.752825][T31423] loop1: partition table partially beyond EOD, truncated 17:12:44 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000059c0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2977.776837][T31426] loop5: p4 start 1610743808 is beyond EOD, truncated [ 2977.783997][T31423] loop1: p1 start 10 is beyond EOD, truncated [ 2977.790124][T31423] loop1: p2 size 2 extends beyond EOD, truncated [ 2977.809934][T31431] loop2: p1 < > p2 < > p4 [ 2977.812340][T31423] loop1: p3 start 4352 is beyond EOD, truncated 17:12:44 executing program 0: r0 = socket$inet6(0x2, 0x5, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x84, 0x11, 0x0, 0x0) [ 2977.820631][T31423] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2977.832323][T31431] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:44 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000630000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffefffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000f8ff01000000000000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000120000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:44 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x202042, 0x0) clone(0x1040100, 0x0, 0x0, 0x0, 0x0) 17:12:44 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffa10000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2977.887473][T31423] loop1: p5 start 4352 is beyond EOD, truncated [ 2977.911584][T31440] loop5: detected capacity change from 0 to 1 17:12:44 executing program 0: semctl$IPC_SET(0x0, 0x0, 0xf, 0x0) [ 2977.954708][T31443] loop1: detected capacity change from 0 to 1 [ 2977.973424][T31451] loop4: detected capacity change from 0 to 131072 [ 2977.979971][T31454] loop2: detected capacity change from 0 to 131072 [ 2977.988204][T31443] loop1: p1 < > p2 < p5 > p3 p4 [ 2977.988391][ T1437] loop5: p1 < > p2 < > p4 [ 2977.993142][T31443] loop1: partition table partially beyond EOD, truncated 17:12:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x2}, 0xfffffffffffffffb) [ 2977.997616][ T1437] loop5: partition table partially beyond EOD, truncated [ 2978.014065][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2978.017271][T31446] loop3: detected capacity change from 0 to 131072 [ 2978.020242][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2978.023183][T31443] loop1: p1 start 10 is beyond EOD, truncated [ 2978.033266][ T1437] loop5: p4 start 1660944384 is beyond EOD, [ 2978.039264][T31443] loop1: p2 size 2 extends beyond EOD, truncated [ 2978.045266][ T1437] truncated 17:12:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5452, &(0x7f0000000180)={'tunl0\x00', 0x0}) 17:12:45 executing program 0: r0 = socket$inet6(0x2, 0x5, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x84, 0x7, 0x0, 0x0) [ 2978.052362][T31440] loop5: p1 < > p2 < > p4 [ 2978.059255][T31440] loop5: partition table partially beyond EOD, truncated [ 2978.064613][T31443] loop1: p3 start 4608 is beyond EOD, truncated [ 2978.072576][T31443] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2978.074743][T31440] loop5: p1 start 10 is beyond EOD, truncated [ 2978.085555][T31440] loop5: p2 size 2 extends beyond EOD, truncated [ 2978.089333][T31443] loop1: p5 start 4608 is beyond EOD, truncated 17:12:45 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffa50000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 0: delete_module(&(0x7f00000005c0)='\x1d\x88i\xc3\x17\x85!-\xee\b\'\xc3\x8d\xd5\xf6\x18T,\xb9\xc0\xd5\xa6b\x03\xbc~\x82\xed;\x0f\x9fz\x19\xd1\xd1\x14Mm5\xe2\x9e\x9c\x17\xf2-\xc4\xb5O\xdcE\xc7\xc4\vh\xa1\xfao.\v\xb8\xe0\xc7t\xad\x98v0\xcc\xe9\x0e\x8c\x1eh^\xae\xe9\xefN\xe8\xa9\x00\x93\xc3\xe6\xc12\xc0GP/\xd4\xfc\v\xbc\xc5\xdbAV\xbeO\xbd\xc0\xaa\xc0\xd0`p\v\xb2i\xe7\\wr\xa2a\xe7\xbc\f\xa3]P\xa1xo7w\x8b,1', 0x0) [ 2978.099750][T31440] loop5: p4 start 1660944384 is beyond EOD, truncated [ 2978.107801][T31446] loop3: p1 < > p2 < > p4 [ 2978.116719][ T1437] loop5: p1 < > p2 < > p4 [ 2978.121044][T31446] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2978.121193][ T1437] loop5: partition table partially beyond EOD, truncated [ 2978.139092][T31465] loop4: detected capacity change from 0 to 131072 [ 2978.139716][ T1437] loop5: p1 start 10 is beyond EOD, truncated 17:12:45 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000001670000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 0: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0xa0403) [ 2978.151736][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2978.158782][ T1437] loop5: p4 start 1660944384 is beyond EOD, truncated 17:12:45 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fdfdffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000001c0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000ffff01000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 0: setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x84, 0x5, 0x0, 0xfffffffffffffd9b) 17:12:45 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffa60000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg(r0, &(0x7f0000002f80)=[{{&(0x7f0000000180)=@in={0x2, 0x4e23, @broadcast}, 0x80, 0x0, 0x0, &(0x7f00000005c0)=[{0x18, 0x0, 0x7, "db"}], 0x18}}], 0x1, 0x0) [ 2978.229793][T31476] loop1: detected capacity change from 0 to 1 [ 2978.252468][T31471] loop2: detected capacity change from 0 to 131072 [ 2978.255482][T31479] loop5: detected capacity change from 0 to 1 17:12:45 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, 0x0) 17:12:45 executing program 0: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x0, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff}}) [ 2978.286614][T31484] loop4: detected capacity change from 0 to 131072 [ 2978.287224][T31480] loop3: detected capacity change from 0 to 131072 [ 2978.314919][ T1437] loop1: p1 < > p2 < p5 > p3 p4 [ 2978.319871][ T1437] loop1: partition table partially beyond EOD, truncated [ 2978.325539][T31480] loop3: p1 < > p2 < > p4 [ 2978.327487][T31479] loop5: p1 < > p2 < > p4 17:12:45 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000007fffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) sendmmsg(r0, &(0x7f0000005640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x10, 0x0, 0x0, "9153713a0ff241eff00f9ff288d3b193fa5df19ef5d9fce61c10cc4eaba960a268d0e52f4135a057"}, {0x10}], 0x20}}], 0x2b, 0x0) [ 2978.335883][T31479] loop5: partition table partially beyond EOD, truncated [ 2978.336145][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2978.346913][T31480] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2978.349111][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2978.350257][T31479] loop5: p1 start 10 is beyond EOD, truncated [ 2978.368499][T31479] loop5: p2 size 2 extends beyond EOD, truncated [ 2978.375105][ T1437] loop1: p3 start 7168 is beyond EOD, truncated [ 2978.381363][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2978.388972][ T1437] loop1: p5 start 7168 is beyond EOD, truncated [ 2978.397947][T31476] loop1: p1 < > p2 < p5 > p3 p4 [ 2978.401574][T31479] loop5: p4 start 1728118784 is beyond EOD, [ 2978.402891][T31476] loop1: partition table partially beyond EOD, truncated [ 2978.410999][T31495] loop2: detected capacity change from 0 to 131072 [ 2978.415907][T31479] truncated [ 2978.428607][T31476] loop1: p1 start 10 is beyond EOD, truncated 17:12:45 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000680000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) sendmmsg(r0, &(0x7f0000005640)=[{{&(0x7f00000020c0)=@qipcrtr, 0x80, &(0x7f0000003540)=[{&(0x7f0000002140)="11", 0x1}], 0x1, &(0x7f00000021c0)=[{0x10}, {0x10}], 0x20}}], 0x1, 0x0) 17:12:45 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffa90000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2978.434744][T31476] loop1: p2 size 2 extends beyond EOD, truncated [ 2978.441762][T31476] loop1: p3 start 7168 is beyond EOD, truncated [ 2978.448260][T31476] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2978.465268][T31476] loop1: p5 start 7168 is beyond EOD, truncated 17:12:45 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000250000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000002000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x88, 0x4, 0x0, 0x0) 17:12:45 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000080ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 0: getrandom(&(0x7f00000000c0)=""/4096, 0x1000, 0x0) [ 2978.492999][T31500] loop4: detected capacity change from 0 to 131072 [ 2978.499415][T31503] loop5: detected capacity change from 0 to 1 17:12:45 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000002bc0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000001400)="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"/3584, 0xe00) sendfile(r0, r1, 0x0, 0x11f08) [ 2978.555791][ T4230] loop5: p1 < > p2 < > p4 [ 2978.560289][ T4230] loop5: partition table partially beyond EOD, truncated [ 2978.569320][T31514] loop1: detected capacity change from 0 to 1 [ 2978.578260][T31512] loop2: detected capacity change from 0 to 131072 [ 2978.578440][T31509] loop3: detected capacity change from 0 to 131072 [ 2978.592169][ T4230] loop5: p1 start 10 is beyond EOD, truncated [ 2978.598313][ T4230] loop5: p2 size 2 extends beyond EOD, truncated [ 2978.605869][ T4230] loop5: p4 start 1744830464 is beyond EOD, truncated [ 2978.610254][T31518] loop4: detected capacity change from 0 to 131072 [ 2978.620139][ T1437] loop5: p1 < > p2 < > p4 [ 2978.624581][ T1437] loop5: partition table partially beyond EOD, truncated [ 2978.631629][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2978.637803][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2978.645951][T31514] loop1: p1 < > p2 < p5 > p3 p4 [ 2978.646086][ T1437] loop5: p4 start 1744830464 is beyond EOD, [ 2978.650925][T31514] loop1: partition table partially beyond EOD, truncated [ 2978.656991][ T1437] truncated [ 2978.664881][T31514] loop1: p1 start 10 is beyond EOD, truncated [ 2978.669365][T31518] loop4: p1 < > p2 < > p4 [ 2978.673178][T31514] loop1: p2 size 2 extends beyond EOD, truncated [ 2978.673332][T31509] loop3: p1 < > p2 < > p4 [ 2978.680047][T31518] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2978.689247][T31514] loop1: p3 start 9472 is beyond EOD, truncated [ 2978.696832][T31503] loop5: p1 < > p2 < > p4 [ 2978.701887][T31514] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2978.706995][T31514] loop1: p5 start 9472 is beyond EOD, [ 2978.713174][T31503] loop5: partition table partially beyond EOD, truncated [ 2978.713406][T31503] loop5: p1 start 10 is beyond EOD, [ 2978.718697][T31514] truncated [ 2978.721818][T31509] loop3: p4 size 2097152 extends beyond EOD, [ 2978.725736][T31503] truncated [ 2978.725742][T31503] loop5: p2 size 2 extends beyond EOD, truncated [ 2978.726476][T31503] loop5: p4 start 1744830464 is beyond EOD, 17:12:45 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000081ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffbf0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2978.731256][T31509] truncated [ 2978.734375][T31503] truncated 17:12:45 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000006c0000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x541b, 0x0) 17:12:45 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000260000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000004000000000000200055aa", 0x40, 0x1c0}]) [ 2978.801146][T31522] loop2: detected capacity change from 0 to 131072 [ 2978.812785][T31525] loop4: detected capacity change from 0 to 131072 17:12:45 executing program 0: r0 = socket$inet6(0x2, 0x5, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x84, 0x22, 0x0, 0x0) [ 2978.841410][T31530] loop1: detected capacity change from 0 to 1 [ 2978.852289][T31533] loop5: detected capacity change from 0 to 1 [ 2978.865913][T31530] loop1: p1 < > p2 < p5 > p3 p4 [ 2978.870863][T31530] loop1: partition table partially beyond EOD, truncated [ 2978.873502][T31535] loop3: detected capacity change from 0 to 131072 [ 2978.884466][T31530] loop1: p1 start 10 is beyond EOD, truncated 17:12:45 executing program 0: r0 = socket$inet6(0x2, 0x3, 0xeb) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 17:12:45 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x40305828, 0xffffffffffffffff) [ 2978.890673][T31530] loop1: p2 size 2 extends beyond EOD, truncated [ 2978.898319][T31530] loop1: p3 start 9728 is beyond EOD, truncated [ 2978.904611][T31530] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2978.924446][T31533] loop5: p1 < > p2 < > p4 [ 2978.929041][T31533] loop5: partition table partially beyond EOD, truncated 17:12:45 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000001c00000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:45 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000082ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 0: r0 = socket$inet6(0x2, 0x5, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x84, 0x6e, 0x0, 0x0) [ 2978.935262][T31530] loop1: p5 start 9728 is beyond EOD, truncated [ 2978.937901][T31535] loop3: p1 < > p2 < > p4 [ 2978.943412][T31533] loop5: p1 start 10 is beyond EOD, truncated [ 2978.952210][T31543] loop2: detected capacity change from 0 to 131072 [ 2978.953006][T31533] loop5: p2 size 2 extends beyond EOD, truncated [ 2978.978532][T31547] loop4: detected capacity change from 0 to 131072 17:12:46 executing program 0: io_uring_setup(0x2a14, &(0x7f0000000100)) clone(0x1040100, 0x0, 0x0, 0x0, 0x0) 17:12:46 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000002e0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2978.988876][T31535] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2979.008835][T31533] loop5: p4 start 1811939328 is beyond EOD, truncated [ 2979.017420][ T1437] loop5: p1 < > p2 < > p4 [ 2979.020489][T31555] loop1: detected capacity change from 0 to 1 [ 2979.021833][ T1437] loop5: partition table partially beyond EOD, truncated [ 2979.021887][ T1437] loop5: p1 start 10 is beyond EOD, truncated [ 2979.035348][T31547] loop4: p1 < > p2 < > p4 [ 2979.041089][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2979.042482][ T1437] loop5: p4 start 1811939328 is beyond EOD, [ 2979.049145][T31555] loop1: p1 < > p2 < p5 > p3 p4 [ 2979.051928][ T1437] truncated [ 2979.065716][T31547] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2979.065968][T31555] loop1: partition table partially beyond EOD, truncated 17:12:46 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000720000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x20000014) 17:12:46 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000085ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000008000000000000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 0: semctl$IPC_SET(0x0, 0x0, 0x2, &(0x7f0000000340)={{0x0, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff}}) [ 2979.088105][T31555] loop1: p1 start 10 is beyond EOD, truncated [ 2979.094244][T31555] loop1: p2 size 2 extends beyond EOD, truncated [ 2979.100944][T31555] loop1: p3 start 11776 is beyond EOD, truncated [ 2979.107289][T31555] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2979.115527][T31555] loop1: p5 start 11776 is beyond EOD, truncated 17:12:46 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000005c20000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000480000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2979.150849][T31559] loop2: detected capacity change from 0 to 131072 [ 2979.168209][T31565] loop5: detected capacity change from 0 to 1 17:12:46 executing program 0: clone(0x41240500, 0x0, 0x0, 0x0, 0x0) 17:12:46 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000008cffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2979.191711][T31569] loop4: detected capacity change from 0 to 131072 [ 2979.200889][T31561] loop3: detected capacity change from 0 to 131072 [ 2979.207240][T31572] loop1: detected capacity change from 0 to 1 [ 2979.227126][T31565] loop5: p1 < > p2 < > p4 [ 2979.231572][T31565] loop5: partition table partially beyond EOD, truncated 17:12:46 executing program 0: semctl$IPC_SET(0x0, 0x0, 0x11, &(0x7f0000000340)={{0x0, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff}}) [ 2979.240091][T31565] loop5: p1 start 10 is beyond EOD, truncated [ 2979.246451][T31565] loop5: p2 size 2 extends beyond EOD, truncated [ 2979.248262][T31561] loop3: p1 < > p2 < > p4 [ 2979.253415][T31565] loop5: p4 start 1912602624 is beyond EOD, truncated [ 2979.264168][T31569] loop4: p1 < > p2 < > p4 [ 2979.268089][T31561] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2979.277918][T31572] loop1: p1 < > p2 < p5 > p3 p4 [ 2979.282869][T31572] loop1: partition table partially beyond EOD, truncated 17:12:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg$unix(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x10001) [ 2979.286690][T31569] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2979.292725][T31572] loop1: p1 start 10 is beyond EOD, truncated [ 2979.302971][T31572] loop1: p2 size 2 extends beyond EOD, truncated [ 2979.312253][T31580] loop2: detected capacity change from 0 to 131072 [ 2979.331051][ T1437] loop4: p1 < > p2 < > p4 [ 2979.335552][T31572] loop1: p3 start 18432 is beyond EOD, truncated 17:12:46 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000740000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 0: clone(0x390a2100, 0x0, 0x0, 0x0, 0x0) 17:12:46 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000400008000000000000200055aa", 0x40, 0x1c0}]) [ 2979.341895][T31572] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2979.351043][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2979.355923][T31572] loop1: p5 start 18432 is beyond EOD, truncated [ 2979.360725][ T24] audit: type=1400 audit(1640106766.377:427): avc: denied { sys_admin } for pid=31584 comm="syz-executor.0" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 17:12:46 executing program 0: semctl$IPC_SET(0x0, 0x0, 0xb, 0x0) 17:12:46 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffc90000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 0: semctl$IPC_SET(0x0, 0x0, 0x14, &(0x7f0000000340)={{0x0, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff}}) 17:12:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f00000037c0)={&(0x7f0000003700), 0x7, &(0x7f0000003780)={&(0x7f0000003740)={0x28, 0x3, 0x3, 0x0, 0x0, 0x0, {}, [@NFQA_MARK={0x8}, @NFQA_VERDICT_HDR={0xc}]}, 0x28}}, 0x0) [ 2979.394889][T31587] loop5: detected capacity change from 0 to 1 [ 2979.431220][T31591] loop3: detected capacity change from 0 to 131072 17:12:46 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000004c0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 0: r0 = socket$inet6(0x2, 0x5, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x84, 0x82, 0x0, 0x0) 17:12:46 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000097ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2979.451218][T31587] loop5: p1 < > p2 < > p4 [ 2979.455703][T31587] loop5: partition table partially beyond EOD, truncated [ 2979.465572][T31591] loop3: p1 < > p2 < > p4 [ 2979.469148][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 2979.483061][T31587] loop5: p1 start 10 is beyond EOD, truncated [ 2979.489188][T31587] loop5: p2 size 2 extends beyond EOD, truncated 17:12:46 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x80, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x5460, 0xffffffffffffffff) 17:12:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) bind$packet(r0, &(0x7f0000000140)={0x11, 0x11, 0x0, 0x1, 0x0, 0x6, @random="84cb34146b32"}, 0x14) 17:12:46 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000007a0000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) bind$packet(r0, &(0x7f0000000140)={0x11, 0x11, 0x0, 0x1, 0x0, 0x6, @random="84cb34146b32"}, 0x14) 17:12:46 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000010000000000000200055aa", 0x40, 0x1c0}]) [ 2979.503295][T31587] loop5: p4 start 1946157056 is beyond EOD, [ 2979.503312][T31607] loop2: detected capacity change from 0 to 131072 [ 2979.509848][T31599] loop4: detected capacity change from 0 to 131072 [ 2979.515934][T31587] truncated [ 2979.522421][T31606] loop1: detected capacity change from 0 to 1 [ 2979.536290][T31591] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) bind$packet(r0, &(0x7f0000000140)={0x11, 0x11, 0x0, 0x1, 0x0, 0x6, @random="84cb34146b32"}, 0x14) [ 2979.595056][T31606] loop1: p1 < > p2 < p5 > p3 p4 [ 2979.597171][T31619] loop5: detected capacity change from 0 to 1 [ 2979.600001][T31606] loop1: partition table partially beyond EOD, truncated [ 2979.622192][T31606] loop1: p1 start 10 is beyond EOD, truncated [ 2979.628298][T31606] loop1: p2 size 2 extends beyond EOD, truncated [ 2979.643223][T31606] loop1: p3 start 19456 is beyond EOD, truncated [ 2979.646454][T31617] loop3: detected capacity change from 0 to 131072 [ 2979.649677][T31606] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2979.650678][T31606] loop1: p5 start 19456 is beyond EOD, truncated [ 2979.663968][T31619] loop5: p1 < > p2 < > p4 [ 2979.673984][T31619] loop5: partition table partially beyond EOD, truncated [ 2979.681103][T31619] loop5: p1 start 10 is beyond EOD, truncated [ 2979.687220][T31619] loop5: p2 size 2 extends beyond EOD, truncated 17:12:46 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000dc0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000a1ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) bind$packet(r0, &(0x7f0000000140)={0x11, 0x11, 0x0, 0x1, 0x0, 0x6, @random="84cb34146b32"}, 0x14) 17:12:46 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000540000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2979.697073][T31619] loop5: p4 start 2046820352 is beyond EOD, truncated [ 2979.723804][T31617] loop3: p1 < > p2 < > p4 [ 2979.732420][T31624] loop2: detected capacity change from 0 to 131072 17:12:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 2979.746613][T31629] loop4: detected capacity change from 0 to 131072 [ 2979.749678][T31617] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:46 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000a5ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000890000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 0: bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 2979.792232][T31629] loop4: p1 < > p2 < > p4 [ 2979.802436][T31629] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2979.820900][T31631] loop1: detected capacity change from 0 to 1 17:12:46 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffe40000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:46 executing program 0: bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 2979.856090][T31635] loop2: detected capacity change from 0 to 131072 [ 2979.879921][T31639] loop5: detected capacity change from 0 to 1 [ 2979.890952][ T4457] loop1: p1 < > p2 < p5 > p3 p4 [ 2979.895981][ T4457] loop1: partition table partially beyond EOD, truncated [ 2979.909428][ T4457] loop1: p1 start 10 is beyond EOD, truncated [ 2979.915617][ T4457] loop1: p2 size 2 extends beyond EOD, truncated [ 2979.943939][T31639] loop5: p1 < > p2 < > p4 [ 2979.945540][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 2979.948387][T31639] loop5: partition table partially beyond EOD, truncated [ 2979.966589][T31645] loop4: detected capacity change from 0 to 131072 [ 2979.975495][T31639] loop5: p1 start 10 is beyond EOD, truncated [ 2979.981588][T31639] loop5: p2 size 2 extends beyond EOD, truncated [ 2979.988919][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 2980.000526][ T4457] loop1: p3 start 21504 is beyond EOD, truncated 17:12:47 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000020000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000a6ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 0: bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 17:12:47 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000001e60000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000550000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2980.006903][ T4457] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2980.015043][ T4457] loop1: p5 start 21504 is beyond EOD, truncated [ 2980.018481][T31639] loop5: p4 start 2298478592 is beyond EOD, truncated [ 2980.031135][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 2980.031719][T31631] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 17:12:47 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 17:12:47 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000900000200055aa", 0x40, 0x1c0}]) [ 2980.091427][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 2980.092479][T31653] loop4: detected capacity change from 0 to 131072 [ 2980.109178][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 2980.117174][T31650] loop2: detected capacity change from 0 to 131072 17:12:47 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 17:12:47 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 2980.146235][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory [ 2980.146467][T31658] loop1: detected capacity change from 0 to 1 [ 2980.170286][T31661] loop5: detected capacity change from 0 to 1 [ 2980.173411][T31654] loop3: detected capacity change from 0 to 131072 17:12:47 executing program 0: socket$packet(0x11, 0x2, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 2980.193887][T31661] loop5: p1 < > p2 < > p4 [ 2980.198340][T31661] loop5: partition table partially beyond EOD, truncated [ 2980.201440][T31658] loop1: p1 < > p2 < p5 > p3 p4 [ 2980.205538][T31661] loop5: p1 start 10 is beyond EOD, [ 2980.210335][T31658] loop1: partition table partially beyond EOD, truncated [ 2980.211091][T31658] loop1: p1 start 10 is beyond EOD, [ 2980.215670][T31661] truncated [ 2980.215676][T31661] loop5: p2 size 2 extends beyond EOD, [ 2980.222672][T31658] truncated [ 2980.222678][T31658] loop1: p2 size 2 extends beyond EOD, truncated 17:12:47 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000a9ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 0: socket$packet(0x11, 0x2, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 2980.227967][T31661] truncated [ 2980.229520][ T1437] loop4: p1 < > p2 < > p4 [ 2980.234555][T31654] loop3: p1 < > p2 < > p4 [ 2980.238109][ T1437] loop4: p4 size 2097152 extends beyond EOD, [ 2980.254224][T31654] loop3: p4 size 2097152 extends beyond EOD, [ 2980.258071][ T1437] truncated [ 2980.273774][T31654] truncated [ 2980.278700][T31661] loop5: p4 start 2415919104 is beyond EOD, truncated [ 2980.288245][T31658] loop1: p3 start 21760 is beyond EOD, truncated [ 2980.294620][T31658] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2980.304352][ T1437] loop4: p1 < > p2 < > p4 [ 2980.305988][T31670] loop2: detected capacity change from 0 to 131072 [ 2980.310529][ T1437] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2980.317303][T31658] loop1: p5 start 21760 is beyond EOD, truncated [ 2980.337527][T31653] loop4: p1 < > p2 < > p4 [ 2980.342879][T31653] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:47 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000040000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 0: socket$packet(0x11, 0x2, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x16, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 17:12:47 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000980000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000ec0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000600000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000bfffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, 0x0, 0x0) 17:12:47 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, 0x0, 0x0) [ 2980.406288][T31680] loop5: detected capacity change from 0 to 1 [ 2980.411044][T31681] loop1: detected capacity change from 0 to 1 [ 2980.424087][T31678] loop4: detected capacity change from 0 to 131072 [ 2980.439932][T31686] loop2: detected capacity change from 0 to 131072 17:12:47 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, 0x0, 0x0) 17:12:47 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 2980.457394][T31683] loop3: detected capacity change from 0 to 131072 [ 2980.474927][T31681] loop1: p1 < > p2 < p5 > p3 p4 [ 2980.475108][ T1437] loop5: p1 < > p2 < > p4 [ 2980.479882][T31681] loop1: partition table partially beyond EOD, truncated [ 2980.484365][ T1437] loop5: partition table partially beyond EOD, truncated [ 2980.491614][T31681] loop1: p1 start 10 is beyond EOD, truncated 17:12:47 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 2980.501775][ T1437] loop5: p1 start 10 is beyond EOD, [ 2980.504527][T31681] loop1: p2 size 2 extends beyond EOD, truncated [ 2980.507528][T31681] loop1: p3 start 24576 is beyond EOD, [ 2980.509810][ T1437] truncated [ 2980.509816][ T1437] loop5: p2 size 2 extends beyond EOD, [ 2980.516176][T31681] truncated [ 2980.521681][ T1437] truncated [ 2980.523965][T31678] loop4: p1 < > p2 < > p4 [ 2980.524988][T31681] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2980.533405][T31683] loop3: p1 < > p2 < > p4 17:12:47 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 2980.545933][T31681] loop1: p5 start 24576 is beyond EOD, [ 2980.550947][ T1437] loop5: p4 start 2550136832 is beyond EOD, [ 2980.553057][T31681] truncated [ 2980.556516][T31678] loop4: p4 size 2097152 extends beyond EOD, [ 2980.558618][ T1437] truncated [ 2980.564611][T31678] truncated [ 2980.582356][T31683] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2980.589668][ T1437] loop5: p1 < > p2 < > p4 [ 2980.594122][ T1437] loop5: partition table partially beyond EOD, truncated [ 2980.601350][ T1437] loop5: p1 start 10 is beyond EOD, truncated 17:12:47 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000ffff80000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000c9ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2980.607457][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2980.615615][ T1437] loop5: p4 start 2550136832 is beyond EOD, truncated [ 2980.626725][T31680] loop5: p1 < > p2 < > p4 [ 2980.631159][T31680] loop5: partition table partially beyond EOD, truncated [ 2980.638723][T31680] loop5: p1 start 10 is beyond EOD, truncated [ 2980.644878][T31680] loop5: p2 size 2 extends beyond EOD, truncated 17:12:47 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000059c0000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 0: r0 = socket$inet6(0x2, 0x5, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x84, 0x32, 0x0, 0x700) 17:12:47 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000630000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffee0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000e4ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2980.665215][T31680] loop5: p4 start 2550136832 is beyond EOD, truncated [ 2980.677338][T31703] loop2: detected capacity change from 0 to 131072 [ 2980.694254][T31705] loop3: detected capacity change from 0 to 131072 17:12:47 executing program 0: r0 = socket$inet6(0x2, 0x5, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) [ 2980.726388][T31705] loop3: p1 < > p2 < > p4 [ 2980.728454][T31710] loop1: detected capacity change from 0 to 1 [ 2980.736823][T31705] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2980.747299][T31711] loop4: detected capacity change from 0 to 131072 [ 2980.766319][T31714] loop5: detected capacity change from 0 to 1 17:12:47 executing program 0: fork() r0 = getpgid(0x0) wait4(r0, 0x0, 0x0, 0x0) 17:12:47 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, 0xfffffffffffffff8) [ 2980.770622][T31717] loop2: detected capacity change from 0 to 131072 [ 2980.785603][T31710] loop1: p1 < > p2 < p5 > p3 p4 [ 2980.790565][T31710] loop1: partition table partially beyond EOD, truncated [ 2980.802659][T31710] loop1: p1 start 10 is beyond EOD, truncated [ 2980.808948][T31710] loop1: p2 size 2 extends beyond EOD, truncated [ 2980.816746][ T1437] loop5: p1 < > p2 < > p4 [ 2980.819700][T31710] loop1: p3 start 25344 is beyond EOD, 17:12:47 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) io_setup(0x1, &(0x7f0000000000)) 17:12:47 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000090000000000000200055aa", 0x40, 0x1c0}]) [ 2980.821181][ T1437] loop5: partition table partially beyond EOD, truncated [ 2980.824831][ T1437] loop5: p1 start 10 is beyond EOD, [ 2980.826749][T31710] truncated [ 2980.833750][ T1437] truncated [ 2980.833755][ T1437] loop5: p2 size 2 extends beyond EOD, [ 2980.839012][T31710] loop1: p4 size 2097152 extends beyond EOD, [ 2980.842101][ T1437] truncated [ 2980.859904][T31710] truncated [ 2980.866368][ T1437] loop5: p4 start 2617573376 is beyond EOD, truncated 17:12:47 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fffffff60000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:47 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000eeffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2980.866394][T31710] loop1: p5 start 25344 is beyond EOD, truncated [ 2980.882397][T31714] loop5: p1 < > p2 < > p4 [ 2980.886981][T31714] loop5: partition table partially beyond EOD, truncated [ 2980.905362][T31733] loop4: detected capacity change from 0 to 131072 [ 2980.908161][T31730] loop3: detected capacity change from 0 to 131072 [ 2980.912214][T31714] loop5: p1 start 10 is beyond EOD, truncated 17:12:47 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000002bc0000200055aa", 0x40, 0x1c0}]) [ 2980.924577][T31714] loop5: p2 size 2 extends beyond EOD, truncated [ 2980.931554][T31714] loop5: p4 start 2617573376 is beyond EOD, truncated [ 2980.936129][T31735] loop2: detected capacity change from 0 to 131072 [ 2980.940832][T31730] loop3: p1 < > p2 < > p4 [ 2980.950347][ T1437] loop5: p1 < > p2 < > p4 [ 2980.954807][ T1437] loop5: partition table partially beyond EOD, truncated [ 2980.966517][ T1437] loop5: p1 start 10 is beyond EOD, truncated 17:12:48 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x260000c0) 17:12:48 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000680000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:48 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000340)={0x0}) 17:12:48 executing program 0: syz_open_dev$vcsa(&(0x7f00000000c0), 0x0, 0x80280) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x480, 0x0) 17:12:48 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000001fff80000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2980.972614][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2980.980053][T31730] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2980.999853][T31740] loop1: detected capacity change from 0 to 1 [ 2981.003985][ T1437] loop5: p4 start 2617573376 is beyond EOD, truncated 17:12:48 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000f6ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:48 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000c0000000000000200055aa", 0x40, 0x1c0}]) [ 2981.031092][T31740] loop1: p1 < > p2 < p5 > p3 p4 [ 2981.036132][T31740] loop1: partition table partially beyond EOD, truncated [ 2981.057181][T31748] loop2: detected capacity change from 0 to 131072 [ 2981.066634][T31749] loop5: detected capacity change from 0 to 1 [ 2981.070158][T31740] loop1: p1 start 10 is beyond EOD, truncated 17:12:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000200)) [ 2981.074959][T31746] loop4: detected capacity change from 0 to 131072 [ 2981.078899][T31740] loop1: p2 size 2 extends beyond EOD, truncated [ 2981.098740][T31740] loop1: p3 start 26624 is beyond EOD, truncated [ 2981.105122][T31740] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2981.111933][T31754] loop3: detected capacity change from 0 to 131072 [ 2981.115785][T31740] loop1: p5 start 26624 is beyond EOD, truncated [ 2981.125452][T31749] loop5: p1 < > p2 < > p4 17:12:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept(r0, 0x0, 0x0) 17:12:48 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fffffffb0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2981.129862][T31749] loop5: partition table partially beyond EOD, truncated [ 2981.137209][T31749] loop5: p1 start 10 is beyond EOD, truncated [ 2981.143431][T31749] loop5: p2 size 2 extends beyond EOD, truncated [ 2981.150765][T31749] loop5: p4 start 3154247680 is beyond EOD, truncated [ 2981.154702][T31754] loop3: p1 < > p2 < > p4 [ 2981.171809][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory 17:12:48 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x29, 0xffffffffffffffff) 17:12:48 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000c00000200055aa", 0x40, 0x1c0}]) 17:12:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 17:12:48 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000006c0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:48 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fbffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x20}}, 0x0) [ 2981.181376][T31761] loop4: detected capacity change from 0 to 131072 [ 2981.197059][T31754] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2981.205287][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop5p4, 10) failed: No such file or directory 17:12:48 executing program 0: syz_open_dev$vcsa(&(0x7f0000000380), 0xffffffffffffffff, 0x0) 17:12:48 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fffffdfd0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2981.237908][T31768] loop5: detected capacity change from 0 to 1 [ 2981.247782][ T1437] loop3: p1 < > p2 < > p4 [ 2981.254335][T31772] loop1: detected capacity change from 0 to 1 [ 2981.255001][T31770] loop2: detected capacity change from 0 to 131072 [ 2981.261436][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:48 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000010000000000200055aa", 0x40, 0x1c0}]) 17:12:48 executing program 0: getpeername(0xffffffffffffffff, &(0x7f0000000040)=@x25, &(0x7f0000000180)=0xffffffd4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) fork() sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2981.287125][T31772] loop1: p1 < > p2 < p5 > p3 p4 [ 2981.292162][T31772] loop1: partition table partially beyond EOD, truncated [ 2981.300581][T31768] loop5: p1 < > p2 < > p4 [ 2981.305020][T31768] loop5: partition table partially beyond EOD, truncated [ 2981.308921][T31779] loop4: detected capacity change from 0 to 131072 [ 2981.312173][T31768] loop5: p1 start 10 is beyond EOD, truncated [ 2981.324684][T31768] loop5: p2 size 2 extends beyond EOD, truncated [ 2981.325180][T31772] loop1: p1 start 10 is beyond EOD, truncated 17:12:48 executing program 0: r0 = fork() wait4(r0, 0x0, 0x2, 0x0) [ 2981.337129][T31772] loop1: p2 size 2 extends beyond EOD, truncated [ 2981.342097][T31768] loop5: p4 start 3221225472 is beyond EOD, truncated [ 2981.348416][T31772] loop1: p3 start 27648 is beyond EOD, truncated [ 2981.356633][T31772] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2981.366689][T31772] loop1: p5 start 27648 is beyond EOD, truncated 17:12:48 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fdffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2981.385768][T31784] loop3: detected capacity change from 0 to 131072 17:12:48 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fffffffd0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:48 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000005c20000200055aa", 0x40, 0x1c0}]) 17:12:48 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000740000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2981.409689][T31791] loop2: detected capacity change from 0 to 131072 [ 2981.441909][ T1437] loop3: p1 < > p2 < > p4 [ 2981.450117][T31794] loop4: detected capacity change from 0 to 131072 17:12:48 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000feffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2981.454693][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2981.463124][T31798] loop1: detected capacity change from 0 to 1 [ 2981.466469][T31799] loop5: detected capacity change from 0 to 1 [ 2981.479158][T31784] loop3: p1 < > p2 < > p4 [ 2981.488124][T31784] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2981.496364][T31798] loop1: p1 < > p2 < p5 > p3 p4 [ 2981.501320][T31798] loop1: partition table partially beyond EOD, truncated 17:12:48 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000020000000000200055aa", 0x40, 0x1c0}]) [ 2981.510608][T31798] loop1: p1 start 10 is beyond EOD, truncated [ 2981.515062][T31799] loop5: p1 < > p2 < > p4 [ 2981.516773][T31798] loop1: p2 size 2 extends beyond EOD, truncated [ 2981.521132][T31799] loop5: partition table partially beyond EOD, truncated [ 2981.521340][T31799] loop5: p1 start 10 is beyond EOD, [ 2981.531827][T31801] loop2: detected capacity change from 0 to 131072 [ 2981.534515][T31799] truncated [ 2981.534522][T31799] loop5: p2 size 2 extends beyond EOD, truncated [ 2981.536697][T31799] loop5: p4 start 3255107584 is beyond EOD, [ 2981.544565][T31798] loop1: p3 start 29696 is beyond EOD, [ 2981.546367][T31799] truncated [ 2981.549435][T31798] truncated [ 2981.549446][T31798] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2981.596068][ T4998] udevd[4998]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory 17:12:48 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fffffffe0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:48 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000011e00000200055aa", 0x40, 0x1c0}]) [ 2981.604677][T31803] loop3: detected capacity change from 0 to 131072 [ 2981.620194][T31798] loop1: p5 start 29696 is beyond EOD, truncated [ 2981.637156][T31805] loop4: detected capacity change from 0 to 131072 [ 2981.655111][T31808] loop5: detected capacity change from 0 to 1 17:12:48 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000002000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:48 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000007a0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2981.657902][ T1437] loop3: p1 < > p2 < > p4 [ 2981.668011][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2981.683095][T31811] loop2: detected capacity change from 0 to 131072 [ 2981.690353][T31803] loop3: p1 < > p2 < > p4 [ 2981.699747][T31813] loop1: detected capacity change from 0 to 1 17:12:48 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000004020000000000200055aa", 0x40, 0x1c0}]) [ 2981.701510][T31803] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2981.715028][T31808] loop5: p1 < > p2 < > p4 [ 2981.719466][T31808] loop5: partition table partially beyond EOD, truncated [ 2981.726918][T31808] loop5: p1 start 10 is beyond EOD, truncated [ 2981.733001][T31808] loop5: p2 size 2 extends beyond EOD, truncated [ 2981.741254][T31808] loop5: p4 start 3759210496 is beyond EOD, truncated [ 2981.745272][T31813] loop1: p1 < > p2 < p5 > p3 p4 [ 2981.752966][T31813] loop1: partition table partially beyond EOD, truncated [ 2981.761844][T31811] loop2: p1 < > p2 < > p4 [ 2981.766472][T31813] loop1: p1 start 10 is beyond EOD, truncated [ 2981.772608][T31813] loop1: p2 size 2 extends beyond EOD, truncated [ 2981.780063][T31813] loop1: p3 start 31232 is beyond EOD, truncated [ 2981.786454][T31813] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2981.802286][T31811] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2981.806182][T31816] loop3: detected capacity change from 0 to 131072 [ 2981.816165][T31813] loop1: p5 start 31232 is beyond EOD, truncated [ 2981.855073][T31816] loop3: p1 < > p2 < > p4 [ 2981.865453][T31816] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2981.875219][ T1437] loop3: p1 < > p2 < > p4 [ 2981.880485][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2981.971824][ T4457] ================================================================== [ 2981.979929][ T4457] BUG: KCSAN: data-race in shmem_symlink / vfs_getattr_nosec [ 2981.987396][ T4457] [ 2981.989717][ T4457] write to 0xffff888104eb30c8 of 8 bytes by task 4856 on cpu 1: [ 2981.997341][ T4457] shmem_symlink+0x2e4/0x390 [ 2982.001938][ T4457] vfs_symlink+0x241/0x330 [ 2982.006439][ T4457] do_symlinkat+0x104/0x380 [ 2982.010940][ T4457] __x64_sys_symlink+0x52/0x60 [ 2982.015706][ T4457] do_syscall_64+0x44/0xd0 [ 2982.020138][ T4457] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2982.026040][ T4457] [ 2982.028624][ T4457] read to 0xffff888104eb30c8 of 8 bytes by task 4457 on cpu 0: [ 2982.036158][ T4457] vfs_getattr_nosec+0x242/0x2f0 [ 2982.041103][ T4457] vfs_statx+0x138/0x2a0 [ 2982.045347][ T4457] __se_sys_newfstatat+0x63/0x260 [ 2982.050370][ T4457] __x64_sys_newfstatat+0x51/0x60 [ 2982.055396][ T4457] do_syscall_64+0x44/0xd0 [ 2982.059825][ T4457] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2982.065724][ T4457] [ 2982.068039][ T4457] value changed: 0x000000000000030c -> 0x0000000000000320 [ 2982.075136][ T4457] [ 2982.077454][ T4457] Reported by Kernel Concurrency Sanitizer on: [ 2982.083593][ T4457] CPU: 0 PID: 4457 Comm: udevd Not tainted 5.16.0-rc6-syzkaller #0 [ 2982.091484][ T4457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2982.101534][ T4457] ================================================================== 17:12:49 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0xb894}, {}], 0x2) 17:12:49 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000003ff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:49 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000ec0000200055aa", 0x40, 0x1c0}]) 17:12:49 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000890000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:49 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000008000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:49 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000030000000000200055aa", 0x40, 0x1c0}]) [ 2982.249935][T31826] loop2: detected capacity change from 0 to 131072 [ 2982.253789][T31821] loop5: detected capacity change from 0 to 1 [ 2982.261927][T31827] loop1: detected capacity change from 0 to 1 [ 2982.284488][T31829] loop4: detected capacity change from 0 to 131072 [ 2982.293197][T31824] loop3: detected capacity change from 0 to 131072 [ 2982.313979][T31821] loop5: p1 < > p2 < > p4 [ 2982.318422][T31821] loop5: partition table partially beyond EOD, truncated [ 2982.323906][ T4856] loop2: p1 < > p2 < > p4 [ 2982.330039][T31821] loop5: p1 start 10 is beyond EOD, truncated [ 2982.332283][ T4856] loop2: p4 size 2097152 extends beyond EOD, [ 2982.336259][T31821] loop5: p2 size 2 extends beyond EOD, truncated [ 2982.336503][ T4457] loop1: p1 < > p2 < p5 > p3 p4 [ 2982.342339][ T4856] truncated [ 2982.354828][T31826] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 2982.356762][ T4457] loop1: partition table partially beyond EOD, truncated [ 2982.371409][T31824] loop3: p1 < > p2 < > p4 [ 2982.382158][T31829] loop4: p1 < > p2 < > p4 [ 2982.388686][T31821] loop5: p4 start 3959422976 is beyond EOD, truncated [ 2982.397841][T31829] loop4: p4 size 2097152 extends beyond EOD, truncated 17:12:49 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000010000000000000000000200055aa", 0x40, 0x1c0}]) [ 2982.412476][ T4457] loop1: p1 start 10 is beyond EOD, truncated [ 2982.416932][T31824] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2982.418708][ T4457] loop1: p2 size 2 extends beyond EOD, truncated [ 2982.421835][ T4457] loop1: p3 start 35072 is beyond EOD, truncated [ 2982.438513][ T4457] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2982.456447][ T4457] loop1: p5 start 35072 is beyond EOD, truncated 17:12:49 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000fffe0000200055aa", 0x40, 0x1c0}]) 17:12:49 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000fff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:49 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000040000000000200055aa", 0x40, 0x1c0}]) [ 2982.491581][T31831] loop2: detected capacity change from 0 to 131072 [ 2982.500968][T31827] loop1: p1 < > p2 < p5 > p3 p4 [ 2982.506014][T31827] loop1: partition table partially beyond EOD, truncated [ 2982.518528][T31827] loop1: p1 start 10 is beyond EOD, truncated [ 2982.524668][T31827] loop1: p2 size 2 extends beyond EOD, truncated [ 2982.534303][T31834] loop5: detected capacity change from 0 to 1 [ 2982.546315][T31827] loop1: p3 start 35072 is beyond EOD, truncated [ 2982.552745][T31827] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2982.561622][T31827] loop1: p5 start 35072 is beyond EOD, truncated [ 2982.571009][T31838] loop4: detected capacity change from 0 to 131072 [ 2982.585887][T31831] loop2: p1 < > p2 < > p4 [ 2982.596859][T31831] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2982.613975][T31834] loop5: p1 < > p2 < > p4 [ 2982.618430][T31834] loop5: partition table partially beyond EOD, truncated [ 2982.634690][T31838] loop4: p1 < > p2 < > p4 17:12:49 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000900000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:49 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000010000000000000000200055aa", 0x40, 0x1c0}]) [ 2982.647079][T31834] loop5: p1 start 10 is beyond EOD, truncated [ 2982.653224][T31834] loop5: p2 size 2 extends beyond EOD, truncated [ 2982.655774][T31839] loop3: detected capacity change from 0 to 131072 [ 2982.664692][T31838] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2982.693033][T31834] loop5: p4 start 4278124544 is beyond EOD, truncated [ 2982.695909][T31841] loop1: detected capacity change from 0 to 1 [ 2982.710953][ T4230] loop3: p1 < > p2 < > p4 [ 2982.718417][T31843] loop2: detected capacity change from 0 to 131072 [ 2982.733846][ T4230] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2982.754319][T31841] loop1: p1 < > p2 < p5 > p3 p4 [ 2982.759199][T31839] loop3: p1 < > p2 < > p4 [ 2982.759283][T31841] loop1: partition table partially beyond EOD, truncated [ 2982.759501][T31841] loop1: p1 start 10 is beyond EOD, [ 2982.768836][T31839] loop3: p4 size 2097152 extends beyond EOD, [ 2982.770782][T31841] truncated [ 2982.770788][T31841] loop1: p2 size 2 extends beyond EOD, truncated [ 2982.792001][T31839] truncated [ 2982.800955][T31843] loop2: p1 < > p2 < > p4 [ 2982.801423][T31841] loop1: p3 start 36864 is beyond EOD, truncated [ 2982.807997][T31843] loop2: p4 size 2097152 extends beyond EOD, [ 2982.811825][T31841] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2982.824822][T31843] truncated [ 2982.828815][T31841] loop1: p5 start 36864 is beyond EOD, truncated 17:12:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 17:12:50 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffefff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000003ff0000200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000050000000000200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000c00000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000040000000000000000200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0xfffffffffffffffe}}, 0x0) [ 2983.122706][T31853] loop5: detected capacity change from 0 to 1 [ 2983.124543][T31854] loop1: detected capacity change from 0 to 1 [ 2983.135403][T31849] loop2: detected capacity change from 0 to 131072 [ 2983.144662][T31851] loop4: detected capacity change from 0 to 131072 17:12:50 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000000000)=""/251) [ 2983.191274][T31856] loop3: detected capacity change from 0 to 131072 [ 2983.206120][T31853] loop5: p1 < > p2 < > p4 [ 2983.207083][ T4230] loop1: p1 < > p2 < p5 > p3 p4 [ 2983.210629][T31853] loop5: partition table partially beyond EOD, [ 2983.215612][ T4230] loop1: partition table partially beyond EOD, truncated [ 2983.220767][ T4230] loop1: p1 start 10 is beyond EOD, [ 2983.221840][T31853] truncated 17:12:50 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000000000)=""/251) 17:12:50 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000001ffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2983.231892][T31853] loop5: p1 start 10 is beyond EOD, [ 2983.234196][ T4230] truncated [ 2983.234202][ T4230] loop1: p2 size 2 extends beyond EOD, truncated [ 2983.242745][ T4230] loop1: p3 start 49152 is beyond EOD, [ 2983.245720][T31853] truncated [ 2983.245726][T31853] loop5: p2 size 2 extends beyond EOD, truncated [ 2983.267057][ T4230] truncated [ 2983.269537][T31853] loop5: p4 start 4278386688 is beyond EOD, [ 2983.270152][ T4230] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2983.283022][T31853] truncated [ 2983.288873][ T4230] loop1: p5 start 49152 is beyond EOD, truncated [ 2983.289579][ T4634] loop2: p1 < > p2 < > p4 [ 2983.304461][T31856] loop3: p1 < > p2 < > p4 [ 2983.311121][T31854] loop1: p1 < > p2 < p5 > p3 p4 [ 2983.313315][T31867] loop4: detected capacity change from 0 to 131072 [ 2983.316115][T31854] loop1: partition table partially beyond EOD, truncated [ 2983.317228][T31854] loop1: p1 start 10 is beyond EOD, truncated [ 2983.335826][T31854] loop1: p2 size 2 extends beyond EOD, truncated 17:12:50 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000000000)=""/251) 17:12:50 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000003ffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000000fff0000200055aa", 0x40, 0x1c0}]) [ 2983.345946][ T4634] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2983.353502][T31856] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2983.375958][T31849] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) 17:12:50 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000000000)=""/251) 17:12:50 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffffffffffff070000000000000000200055aa", 0x40, 0x1c0}]) [ 2983.397133][T31854] loop1: p3 start 49152 is beyond EOD, truncated [ 2983.403509][T31854] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2983.422436][T31854] loop1: p5 start 49152 is beyond EOD, truncated [ 2983.442120][T31873] loop5: detected capacity change from 0 to 1 [ 2983.457030][T31872] loop4: detected capacity change from 0 to 131072 [ 2983.483878][ T4856] loop5: p1 < > p2 < > p4 [ 2983.488307][ T4856] loop5: partition table partially beyond EOD, truncated 17:12:50 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000060000000000200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 0: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), 0xffffffffffffffff) 17:12:50 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000ec0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000080ffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2983.500023][T31878] loop2: detected capacity change from 0 to 131072 [ 2983.519596][T31884] loop1: detected capacity change from 0 to 1 [ 2983.529073][ T4856] loop5: p1 start 10 is beyond EOD, truncated [ 2983.535195][ T4856] loop5: p2 size 2 extends beyond EOD, truncated 17:12:50 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000003c0)=[{0x0}, {0x0}], 0x2}, 0x2040) 17:12:50 executing program 0: pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x3f}, 0x0, 0x0) [ 2983.550792][ T4856] loop5: p4 start 4279173120 is beyond EOD, truncated [ 2983.560081][T31886] loop3: detected capacity change from 0 to 131072 [ 2983.568173][T31873] loop5: p1 < > p2 < > p4 [ 2983.572606][T31873] loop5: partition table partially beyond EOD, truncated [ 2983.580292][T31884] loop1: p1 < > p2 < p5 > p3 p4 [ 2983.585251][T31884] loop1: partition table partially beyond EOD, truncated [ 2983.592432][T31873] loop5: p1 start 10 is beyond EOD, truncated 17:12:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 17:12:50 executing program 0: io_setup(0x9, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) [ 2983.592550][T31889] loop4: detected capacity change from 0 to 131072 [ 2983.598589][T31873] loop5: p2 size 2 extends beyond EOD, truncated [ 2983.615574][ T1437] loop3: p1 < > p2 < > p4 [ 2983.621022][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2983.626891][T31873] loop5: p4 start 4279173120 is beyond EOD, truncated [ 2983.629845][T31884] loop1: p1 start 10 is beyond EOD, truncated [ 2983.640847][T31884] loop1: p2 size 2 extends beyond EOD, truncated 17:12:50 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000200000000000000000200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000feff0000200055aa", 0x40, 0x1c0}]) [ 2983.649047][T31884] loop1: p3 start 60416 is beyond EOD, truncated [ 2983.650124][ T1437] loop3: p1 < > p2 < > p4 [ 2983.655444][T31884] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2983.661225][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2983.669064][T31884] loop1: p5 start 60416 is beyond EOD, truncated [ 2983.683988][T31889] loop4: p1 < > p2 < > p4 17:12:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x2040) [ 2983.702109][T31889] loop4: p4 size 2097152 extends beyond EOD, truncated [ 2983.709171][T31886] loop3: p1 < > p2 < > p4 [ 2983.712882][T31902] loop5: detected capacity change from 0 to 1 [ 2983.719435][T31900] loop2: detected capacity change from 0 to 131072 [ 2983.729319][T31886] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2983.745730][T31902] loop5: p1 < > p2 < > p4 17:12:50 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000ed0000010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2983.750164][T31902] loop5: partition table partially beyond EOD, truncated [ 2983.760779][T31900] loop2: p1 < > p2 < > p4 [ 2983.772603][T31900] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2983.774334][ T1437] loop3: p1 < > p2 < > p4 [ 2983.783201][T31906] loop1: detected capacity change from 0 to 1 [ 2983.790575][T31902] loop5: p1 start 10 is beyond EOD, truncated [ 2983.796714][T31902] loop5: p2 size 2 extends beyond EOD, truncated [ 2983.799766][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2983.803856][T31902] loop5: p4 start 4294836224 is beyond EOD, truncated [ 2983.825860][ T4634] loop1: p1 < > p2 < p5 > p3 p4 [ 2983.830818][ T4634] loop1: partition table partially beyond EOD, truncated [ 2983.839486][ T4634] loop1: p1 start 10 is beyond EOD, truncated [ 2983.845621][ T4634] loop1: p2 size 2 extends beyond EOD, truncated 17:12:50 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000004060000000000200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 0: sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, 0x0, 0x0) 17:12:50 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000ffefffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000400000000000000000200055aa", 0x40, 0x1c0}]) [ 2983.852658][ T4634] loop1: p3 start 60672 is beyond EOD, truncated [ 2983.859072][ T4634] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2983.866281][ T4634] loop1: p5 start 60672 is beyond EOD, truncated [ 2983.882007][T31911] loop2: detected capacity change from 0 to 131072 17:12:50 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000000400200055aa", 0x40, 0x1c0}]) 17:12:50 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x26501, 0x0) 17:12:50 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000380), 0x3ff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), r0) [ 2983.897908][T31913] loop4: detected capacity change from 0 to 131072 [ 2983.910525][T31906] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 2983.928479][T31918] loop5: detected capacity change from 0 to 1 [ 2983.936945][T31916] loop3: detected capacity change from 0 to 131072 [ 2983.946505][T31911] loop2: p1 < > p2 < > p4 17:12:51 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000380), 0x3ff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), r0) 17:12:51 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000100100010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000380), 0x3ff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), r0) [ 2983.952774][T31911] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2983.966234][T31918] loop5: p1 < > p2 < > p4 [ 2983.970666][T31918] loop5: partition table partially beyond EOD, truncated [ 2983.981060][T31918] loop5: p1 start 10 is beyond EOD, truncated [ 2983.987180][T31918] loop5: p2 size 2 extends beyond EOD, truncated [ 2983.995265][T31918] loop5: p4 size 2097156 extends beyond EOD, truncated 17:12:51 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fdfdffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000ffff800000000000000000200055aa", 0x40, 0x1c0}]) [ 2984.005993][ T4230] loop3: p1 < > p2 < > p4 [ 2984.018199][ T4230] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2984.040720][T31932] loop1: detected capacity change from 0 to 1 [ 2984.049496][T31930] loop4: detected capacity change from 0 to 131072 [ 2984.050418][T31916] loop3: p1 < > p2 < > p4 [ 2984.059874][T31935] loop2: detected capacity change from 0 to 131072 [ 2984.070422][T31916] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2984.085428][T31932] loop1: p1 < > p2 < p5 > p3 p4 [ 2984.090381][T31932] loop1: partition table partially beyond EOD, truncated [ 2984.098301][T31935] loop2: p1 < > p2 < > p4 17:12:51 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000070000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000380), 0x3ff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), r0) 17:12:51 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000000800200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000007fffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2984.107318][T31935] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2984.115264][T31932] loop1: p1 start 10 is beyond EOD, truncated [ 2984.121354][T31932] loop1: p2 size 2 extends beyond EOD, truncated [ 2984.141109][T31932] loop1: p3 start 69632 is beyond EOD, truncated [ 2984.143424][T31940] loop5: detected capacity change from 0 to 1 17:12:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[@ip_ttl={{0x14}}], 0x18}}], 0x1, 0x0) 17:12:51 executing program 0: semop(0x0, &(0x7f0000000000)=[{0x0, 0x5479, 0x1800}], 0x1) 17:12:51 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000900000000000000000200055aa", 0x40, 0x1c0}]) [ 2984.147489][T31932] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2984.166441][T31942] loop4: detected capacity change from 0 to 131072 [ 2984.170220][T31932] loop1: p5 start 69632 is beyond EOD, truncated 17:12:51 executing program 0: semget(0x1, 0x7955a83a464e024a, 0x0) [ 2984.209491][T31946] loop3: detected capacity change from 0 to 131072 [ 2984.216505][T31951] loop2: detected capacity change from 0 to 131072 [ 2984.217608][T31940] loop5: p1 < > p2 < > p4 [ 2984.227488][T31940] loop5: partition table partially beyond EOD, truncated [ 2984.234919][T31940] loop5: p1 start 10 is beyond EOD, truncated [ 2984.241045][T31940] loop5: p2 size 2 extends beyond EOD, truncated [ 2984.251675][T31951] loop2: p1 < > p2 < > p4 17:12:51 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000670100010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000000)='user\x00', 0x0, 0xfffffffffffffff8) 17:12:51 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000080ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 0: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffff8) [ 2984.256542][T31946] loop3: p1 < > p2 < > p4 [ 2984.262953][T31940] loop5: p4 size 2097160 extends beyond EOD, truncated [ 2984.278480][T31951] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2984.297186][T31946] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:51 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000080000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 2984.315797][T31961] loop1: detected capacity change from 0 to 1 [ 2984.328388][T31960] loop4: detected capacity change from 0 to 131072 17:12:51 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000040000800200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000c00000000000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 0: io_setup(0x40, &(0x7f0000000180)) [ 2984.363674][ T24] audit: type=1400 audit(1640106771.377:428): avc: denied { getopt } for pid=31964 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2984.385551][T31961] loop1: p1 < > p2 < p5 > p3 p4 [ 2984.390587][T31961] loop1: partition table partially beyond EOD, truncated [ 2984.406408][T31968] loop2: detected capacity change from 0 to 131072 17:12:51 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000081ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2984.413707][T31961] loop1: p1 start 10 is beyond EOD, truncated [ 2984.416059][T31971] loop5: detected capacity change from 0 to 1 [ 2984.419801][T31961] loop1: p2 size 2 extends beyond EOD, truncated [ 2984.434617][T31961] loop1: p3 start 91904 is beyond EOD, truncated [ 2984.440968][T31961] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2984.453467][T31961] loop1: p5 start 91904 is beyond EOD, truncated [ 2984.461248][ T1437] loop1: p1 < > p2 < p5 > p3 p4 [ 2984.461719][T31975] loop4: detected capacity change from 0 to 131072 [ 2984.466214][ T1437] loop1: partition table partially beyond EOD, truncated [ 2984.466357][ T1437] loop1: p1 start 10 is beyond EOD, [ 2984.476480][ T4856] loop2: p1 < > p2 < > p4 [ 2984.479759][ T1437] truncated [ 2984.487763][ T4856] loop2: p4 size 2097152 extends beyond EOD, [ 2984.489614][ T1437] loop1: p2 size 2 extends beyond EOD, [ 2984.492720][ T4856] truncated [ 2984.497660][ T4634] loop5: p1 < > p2 < > p4 [ 2984.498781][ T1437] truncated [ 2984.514948][ T4634] loop5: partition table partially beyond EOD, truncated [ 2984.522107][T31977] loop3: detected capacity change from 0 to 131072 [ 2984.525273][ T4634] loop5: p1 start 10 is beyond EOD, truncated [ 2984.529241][T31968] loop2: p1 < > p2 < > p4 [ 2984.534776][ T4634] loop5: p2 size 2 extends beyond EOD, truncated [ 2984.542466][T31968] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2984.547677][ T4634] loop5: p4 start 4194304 is beyond EOD, truncated 17:12:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='wg0\x00', 0x10) 17:12:51 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000082ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2984.555389][ T1437] loop1: p3 start 91904 is beyond EOD, truncated [ 2984.565335][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2984.580043][T31977] loop3: p1 < > p2 < > p4 [ 2984.589979][T31971] loop5: p1 < > p2 < > p4 [ 2984.594443][T31971] loop5: partition table partially beyond EOD, truncated [ 2984.604325][T31971] loop5: p1 start 10 is beyond EOD, truncated [ 2984.610414][T31971] loop5: p2 size 2 extends beyond EOD, truncated [ 2984.619488][T31977] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2984.620937][ T1437] loop1: p5 start 91904 is beyond EOD, truncated [ 2984.633062][T31971] loop5: p4 start 4194304 is beyond EOD, truncated [ 2984.640830][T31982] loop4: detected capacity change from 0 to 131072 17:12:51 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000007f0100010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x4000, 0x0) 17:12:51 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000100000000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000085ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000003080000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000001000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 0: r0 = socket(0x18, 0x0, 0x3) accept(r0, 0x0, 0x0) [ 2984.737467][T31985] loop4: detected capacity change from 0 to 131072 [ 2984.739763][T31989] loop2: detected capacity change from 0 to 131072 [ 2984.761461][T31991] loop1: detected capacity change from 0 to 1 17:12:51 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000008cffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2984.786961][T31994] loop5: detected capacity change from 0 to 1 [ 2984.804969][ T4998] loop2: p1 < > p2 < > p4 [ 2984.814119][ T4998] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2984.815289][ T4634] loop1: p1 < > p2 < p5 > p3 p4 [ 2984.825931][ T4634] loop1: partition table partially beyond EOD, truncated 17:12:51 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000097ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2984.836205][T31989] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 2984.839564][ T4634] loop1: p1 start 10 is beyond EOD, truncated [ 2984.850363][ T4634] loop1: p2 size 2 extends beyond EOD, truncated [ 2984.863923][T31994] loop5: p1 < > p2 < > p4 [ 2984.868395][T31994] loop5: partition table partially beyond EOD, truncated [ 2984.877442][T32000] loop3: detected capacity change from 0 to 131072 17:12:51 executing program 0: semctl$SETVAL(0x0, 0x9197c17a8204fda1, 0x10, 0x0) 17:12:51 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000200000000000000200055aa", 0x40, 0x1c0}]) 17:12:51 executing program 0: shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/205) [ 2984.884398][T31994] loop5: p1 start 10 is beyond EOD, truncated [ 2984.890498][T31994] loop5: p2 size 2 extends beyond EOD, truncated [ 2984.902187][T32005] loop4: detected capacity change from 0 to 131072 [ 2984.909079][ T4634] loop1: p3 start 98048 is beyond EOD, truncated [ 2984.915466][ T4634] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2984.922879][T31994] loop5: p4 size 2097168 extends beyond EOD, truncated [ 2984.930308][ T4634] loop1: p5 start 98048 is beyond EOD, truncated [ 2984.939877][ T1437] loop1: p1 < > p2 < p5 > p3 p4 [ 2984.944555][T32000] loop3: p1 < > p2 < > p4 [ 2984.944869][ T1437] loop1: partition table partially beyond EOD, truncated [ 2984.945736][ T1437] loop1: p1 start 10 is beyond EOD, [ 2984.952291][T32012] loop2: detected capacity change from 0 to 131072 [ 2984.956468][ T1437] truncated [ 2984.956474][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2984.962862][T32000] loop3: p4 size 2097152 extends beyond EOD, [ 2984.969665][ T1437] loop1: p3 start 98048 is beyond EOD, [ 2984.971581][T32000] truncated [ 2984.977905][ T1437] truncated [ 2984.977911][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2984.979734][ T1437] loop1: p5 start 98048 is beyond EOD, truncated [ 2985.010148][T31991] loop1: p1 < > p2 < p5 > p3 p4 [ 2985.015128][T31991] loop1: partition table partially beyond EOD, truncated [ 2985.022271][T31991] loop1: p1 start 10 is beyond EOD, truncated [ 2985.028362][T31991] loop1: p2 size 2 extends beyond EOD, truncated [ 2985.033870][T32012] loop2: p1 < > p2 < > p4 17:12:52 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000c00100010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:52 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000400)) pipe(&(0x7f0000000240)) pselect6(0x40, &(0x7f0000000180)={0xbbc}, &(0x7f00000001c0)={0x1}, 0x0, 0x0, 0x0) 17:12:52 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000002000200055aa", 0x40, 0x1c0}]) 17:12:52 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000a1ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:52 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000090000000000200055aa", 0x40, 0x1c0}]) [ 2985.039552][T31991] loop1: p3 start 98048 is beyond EOD, truncated [ 2985.045931][T31991] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2985.048020][T32012] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2985.053469][T31991] loop1: p5 start 98048 is beyond EOD, truncated 17:12:52 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000010200000000000000200055aa", 0x40, 0x1c0}]) 17:12:52 executing program 0: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000240), 0x0, &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300)={[0xf0]}, 0x8}) [ 2985.127403][T32021] loop1: detected capacity change from 0 to 1 [ 2985.139608][T32020] loop5: detected capacity change from 0 to 1 [ 2985.156163][T32022] loop4: detected capacity change from 0 to 131072 [ 2985.167506][T32027] loop2: detected capacity change from 0 to 131072 17:12:52 executing program 0: pipe(&(0x7f0000000240)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pselect6(0x40, &(0x7f0000000100)={0x3f}, 0x0, 0x0, 0x0, 0x0) [ 2985.179857][T32025] loop3: detected capacity change from 0 to 131072 [ 2985.193840][T32021] loop1: p1 < > p2 < p5 > p3 p4 [ 2985.198791][T32021] loop1: partition table partially beyond EOD, truncated [ 2985.203944][T32027] loop2: p1 < > p2 < > p4 [ 2985.206092][T32021] loop1: p1 start 10 is beyond EOD, truncated [ 2985.211707][T32027] loop2: p4 size 2097152 extends beyond EOD, [ 2985.216332][T32021] loop1: p2 size 2 extends beyond EOD, truncated [ 2985.222444][T32020] loop5: p1 < > p2 < > p4 [ 2985.228728][T32027] truncated [ 2985.233109][T32020] loop5: partition table partially beyond EOD, truncated [ 2985.241499][T32021] loop1: p3 start 114688 is beyond EOD, truncated [ 2985.245485][T32025] loop3: p1 < > p2 < > p4 [ 2985.249690][T32021] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2985.250920][T32021] loop1: p5 start 114688 is beyond EOD, [ 2985.256729][T32020] loop5: p1 start 10 is beyond EOD, [ 2985.260998][T32021] truncated [ 2985.266659][T32020] truncated 17:12:52 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000a5ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:52 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000040200000000000000200055aa", 0x40, 0x1c0}]) [ 2985.276955][T32025] loop3: p4 size 2097152 extends beyond EOD, [ 2985.278115][T32020] loop5: p2 size 2 extends beyond EOD, truncated [ 2985.280012][T32020] loop5: p4 size 2097184 extends beyond EOD, [ 2985.284295][T32025] truncated [ 2985.290584][T32020] truncated 17:12:52 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000c10100010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:52 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000000ffff8000200055aa", 0x40, 0x1c0}]) [ 2985.325321][T32035] loop2: detected capacity change from 0 to 131072 [ 2985.338912][T32037] loop1: detected capacity change from 0 to 1 [ 2985.354368][T32039] loop5: detected capacity change from 0 to 1 [ 2985.366932][ T4457] loop2: p1 < > p2 < > p4 17:12:52 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000a0000000000200055aa", 0x40, 0x1c0}]) [ 2985.372416][ T4457] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2985.376356][T32041] loop4: detected capacity change from 0 to 131072 [ 2985.388152][T32035] loop2: p1 < > p2 < > p4 [ 2985.396187][T32039] loop5: p1 < > p2 < > p4 [ 2985.400773][T32039] loop5: partition table partially beyond EOD, truncated [ 2985.408045][ T1437] loop1: p1 < > p2 < p5 > p3 p4 [ 2985.412978][ T1437] loop1: partition table partially beyond EOD, truncated [ 2985.421484][T32035] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2985.424020][T32043] loop3: detected capacity change from 0 to 131072 [ 2985.428676][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2985.436449][T32039] loop5: p1 start 10 is beyond EOD, [ 2985.441046][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2985.452667][T32039] truncated [ 2985.455827][T32039] loop5: p2 size 2 extends beyond EOD, truncated [ 2985.460679][ T1437] loop1: p3 start 114944 is beyond EOD, truncated [ 2985.468688][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:52 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000300000000000000200055aa", 0x40, 0x1c0}]) 17:12:52 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000a6ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:52 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000009000200055aa", 0x40, 0x1c0}]) [ 2985.472725][T32039] loop5: p4 start 4294901760 is beyond EOD, truncated [ 2985.484663][ T1437] loop1: p5 start 114944 is beyond EOD, truncated [ 2985.492149][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 2985.513065][T32043] loop3: p1 < > p2 < > p4 [ 2985.521691][T32037] loop1: p1 < > p2 < p5 > p3 p4 [ 2985.526698][T32037] loop1: partition table partially beyond EOD, truncated [ 2985.527876][T32048] loop4: detected capacity change from 0 to 131072 [ 2985.536344][T32047] loop2: detected capacity change from 0 to 131072 [ 2985.542168][T32037] loop1: p1 start 10 is beyond EOD, truncated [ 2985.552874][T32037] loop1: p2 size 2 extends beyond EOD, truncated [ 2985.553332][T32043] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2985.564282][T32050] loop5: detected capacity change from 0 to 1 [ 2985.573123][T32037] loop1: p3 start 114944 is beyond EOD, truncated [ 2985.579713][T32037] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2985.587618][T32037] loop1: p5 start 114944 is beyond EOD, truncated [ 2985.605568][T32047] loop2: p1 < > p2 < > p4 [ 2985.605698][T32050] loop5: p1 < > p2 < > p4 [ 2985.614552][T32050] loop5: partition table partially beyond EOD, truncated 17:12:52 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000f40100010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:52 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000b0000000000200055aa", 0x40, 0x1c0}]) 17:12:52 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000a9ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2985.623118][T32047] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2985.627071][T32050] loop5: p1 start 10 is beyond EOD, truncated [ 2985.636155][T32050] loop5: p2 size 2 extends beyond EOD, truncated [ 2985.638815][ T4634] udevd[4634]: inotify_add_watch(7, /dev/loop3p1, 10) failed: No such file or directory [ 2985.653512][ T3066] udevd[3066]: inotify_add_watch(7, /dev/loop3p2, 10) failed: No such file or directory [ 2985.665050][T32050] loop5: p4 size 2097296 extends beyond EOD, truncated [ 2985.696374][T32053] loop3: detected capacity change from 0 to 131072 [ 2985.700067][T32055] loop4: detected capacity change from 0 to 131072 [ 2985.714686][T32057] loop1: detected capacity change from 0 to 1 [ 2985.730638][T32053] loop3: p1 < > p2 < > p4 [ 2985.740619][T32053] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2985.745198][ T1437] loop1: p1 < > p2 < p5 > p3 p4 [ 2985.752609][ T1437] loop1: partition table partially beyond EOD, truncated [ 2985.759853][ T1437] loop1: p1 start 10 is beyond EOD, truncated [ 2985.766123][ T1437] loop1: p2 size 2 extends beyond EOD, truncated [ 2985.773086][ T1437] loop1: p3 start 128000 is beyond EOD, truncated [ 2985.779606][ T1437] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2985.788580][ T1437] loop1: p5 start 128000 is beyond EOD, truncated [ 2985.796717][T32057] loop1: p1 < > p2 < p5 > p3 p4 [ 2985.801674][T32057] loop1: partition table partially beyond EOD, truncated [ 2985.809809][T32057] loop1: p1 start 10 is beyond EOD, truncated [ 2985.816007][T32057] loop1: p2 size 2 extends beyond EOD, truncated [ 2985.822684][T32057] loop1: p3 start 128000 is beyond EOD, truncated [ 2985.829105][T32057] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2985.836386][T32057] loop1: p5 start 128000 is beyond EOD, truncated [ 2985.850171][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop5p4, 10) failed: No such file or directory [ 2985.857587][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop3p4, 10) failed: No such file or directory [ 2985.889419][ T3068] udevd[3068]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 2985.893869][ T4457] udevd[4457]: inotify_add_watch(7, /dev/loop2p1, 10) failed: No such file or directory [ 2985.900585][ T4230] udevd[4230]: inotify_add_watch(7, /dev/loop2p2, 10) failed: No such file or directory [ 2985.910030][ T4856] udevd[4856]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 2985.919787][ T3066] udevd[3066]: inotify_add_watch(7, /dev/loop2p4, 10) failed: No such file or directory 17:12:53 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000001280), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000000)=""/220) 17:12:53 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f000000000000008000050000000000420000000000000000000000000000000000000000000000c000200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000bfffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000c0000000000200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000040200010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000400000000000000200055aa", 0x40, 0x1c0}]) [ 2986.047214][T32061] loop4: detected capacity change from 0 to 131072 [ 2986.060767][T32068] loop2: detected capacity change from 0 to 131072 [ 2986.067999][T32066] loop1: detected capacity change from 0 to 1 [ 2986.070232][T32067] loop5: detected capacity change from 0 to 1 17:12:53 executing program 0: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x84241) [ 2986.111597][T32070] loop3: detected capacity change from 0 to 131072 [ 2986.127180][ T24] audit: type=1400 audit(1640106773.147:429): avc: denied { write } for pid=32073 comm="syz-executor.0" name="event0" dev="devtmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2986.152886][ T4998] loop5: p1 < > p2 < > p4 17:12:53 executing program 0: syz_open_dev$evdev(&(0x7f0000001280), 0x0, 0x238101) [ 2986.157343][ T4998] loop5: partition table partially beyond EOD, truncated [ 2986.157660][ T4634] loop2: p1 < > p2 < > p4 [ 2986.168973][ T4856] loop1: p1 < > p2 < p5 > p3 p4 [ 2986.171269][ T3066] loop3: p1 < > p2 < > p4 [ 2986.174008][ T4856] loop1: partition table partially beyond EOD, truncated [ 2986.174214][ T4856] loop1: p1 start 10 is beyond EOD, truncated [ 2986.191718][ T4856] loop1: p2 size 2 extends beyond EOD, truncated [ 2986.194821][ T4634] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2986.205457][ T3066] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:53 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000c9ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2986.223316][ T4998] loop5: p1 start 10 is beyond EOD, truncated [ 2986.229479][ T4998] loop5: p2 size 2 extends beyond EOD, truncated [ 2986.238277][T32070] loop3: p1 < > p2 < > p4 [ 2986.238899][T32068] loop2: p1 < > p2 < > p4 [ 2986.257609][T32070] loop3: p4 size 2097152 extends beyond EOD, truncated 17:12:53 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000001280), 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000080)=""/121) 17:12:53 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000001280), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000e40)=""/44) 17:12:53 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000500000000000000200055aa", 0x40, 0x1c0}]) [ 2986.268901][T32068] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2986.284517][T32079] loop4: detected capacity change from 0 to 131072 [ 2986.285640][ T4998] loop5: p4 size 2097344 extends beyond EOD, truncated [ 2986.307436][ T4856] loop1: p3 start 132096 is beyond EOD, truncated [ 2986.313988][ T4856] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2986.339061][ T4856] loop1: p5 start 132096 is beyond EOD, truncated [ 2986.349636][T32067] loop5: p1 < > p2 < > p4 [ 2986.354096][T32067] loop5: partition table partially beyond EOD, truncated [ 2986.362635][T32066] loop1: p1 < > p2 < p5 > p3 p4 [ 2986.364118][T32067] loop5: p1 start 10 is beyond EOD, truncated [ 2986.367616][T32066] loop1: partition table partially beyond EOD, truncated [ 2986.373701][T32067] loop5: p2 size 2 extends beyond EOD, truncated [ 2986.390808][T32066] loop1: p1 start 10 is beyond EOD, truncated [ 2986.396796][T32067] loop5: p4 size 2097344 extends beyond EOD, truncated [ 2986.396963][T32066] loop1: p2 size 2 extends beyond EOD, truncated [ 2986.425256][T32085] loop2: detected capacity change from 0 to 131072 [ 2986.433853][T32066] loop1: p3 start 132096 is beyond EOD, truncated 17:12:53 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000000001200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000001280), 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000040)=""/81) 17:12:53 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000d0000000000200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000e4ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2986.440285][T32066] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2986.473873][T32085] loop2: p1 < > p2 < > p4 17:12:53 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000001a0200010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000017c0)='/sys/fs/cgroup', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) [ 2986.487580][T32085] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2986.491789][T32094] loop4: detected capacity change from 0 to 131072 [ 2986.497330][T32066] loop1: p5 start 132096 is beyond EOD, truncated [ 2986.512562][T32096] loop5: detected capacity change from 0 to 1 17:12:53 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000eeffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) [ 2986.556163][T32090] loop3: detected capacity change from 0 to 131072 [ 2986.584075][T32096] loop5: p1 < > p2 < > p4 [ 2986.588521][T32096] loop5: partition table partially beyond EOD, truncated [ 2986.599905][T32096] loop5: p1 start 10 is beyond EOD, truncated 17:12:53 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000600000000000000200055aa", 0x40, 0x1c0}]) [ 2986.604502][T32090] loop3: p1 < > p2 < > p4 [ 2986.606053][T32096] loop5: p2 size 2 extends beyond EOD, truncated [ 2986.617738][T32096] loop5: p4 size 2097408 extends beyond EOD, truncated [ 2986.632887][T32105] loop1: detected capacity change from 0 to 1 [ 2986.643221][T32103] loop4: detected capacity change from 0 to 131072 [ 2986.649340][T32107] loop2: detected capacity change from 0 to 131072 17:12:53 executing program 0: clock_gettime(0x2, &(0x7f0000003180)) 17:12:53 executing program 0: timer_create(0x2, &(0x7f00000012c0)={0x0, 0x24, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001300)) 17:12:53 executing program 0: r0 = semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, 0x0) [ 2986.658295][T32090] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2986.694030][ T4998] loop1: p1 < > p2 < p5 > p3 p4 [ 2986.695453][T32107] loop2: p1 < > p2 < > p4 17:12:53 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000000002200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendto(r0, &(0x7f00000007c0)="11", 0x1, 0x0, &(0x7f00000008c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c) dup2(r1, r0) 17:12:53 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000e0000000000200055aa", 0x40, 0x1c0}]) [ 2986.699484][ T4998] loop1: partition table partially beyond EOD, truncated [ 2986.712557][ T4998] loop1: p1 start 10 is beyond EOD, truncated [ 2986.713417][T32107] loop2: p4 size 2097152 extends beyond EOD, truncated [ 2986.718698][ T4998] loop1: p2 size 2 extends beyond EOD, truncated [ 2986.735863][ T4998] loop1: p3 start 137728 is beyond EOD, truncated [ 2986.742287][ T4998] loop1: p4 size 2097152 extends beyond EOD, truncated 17:12:53 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000f6ffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2986.756282][ T4998] loop1: p5 start 137728 is beyond EOD, truncated [ 2986.769088][T32122] loop5: detected capacity change from 0 to 1 [ 2986.776534][T32105] loop1: p1 < > p2 < p5 > p3 p4 [ 2986.781472][T32105] loop1: partition table partially beyond EOD, truncated [ 2986.803813][T32105] loop1: p1 start 10 is beyond EOD, truncated [ 2986.809096][T32125] loop4: detected capacity change from 0 to 131072 [ 2986.809959][T32105] loop1: p2 size 2 extends beyond EOD, truncated [ 2986.810468][T32105] loop1: p3 start 137728 is beyond EOD, truncated [ 2986.827789][T32123] loop3: detected capacity change from 0 to 131072 [ 2986.829287][T32105] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2986.837730][T32105] loop1: p5 start 137728 is beyond EOD, truncated [ 2986.849587][T32122] loop5: p1 < > p2 < > p4 17:12:53 executing program 1: syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000600200010000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 0: pipe2$9p(0x0, 0x9000) 17:12:53 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000040600000000000000200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000017c0)='/sys/fs/cgroup', 0x0, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) [ 2986.854033][T32122] loop5: partition table partially beyond EOD, truncated [ 2986.861200][T32122] loop5: p1 start 10 is beyond EOD, truncated [ 2986.867375][T32122] loop5: p2 size 2 extends beyond EOD, truncated [ 2986.868517][T32123] loop3: p1 < > p2 < > p4 [ 2986.874733][T32122] loop5: p4 size 2097664 extends beyond EOD, truncated [ 2986.897946][T32129] loop2: detected capacity change from 0 to 131072 17:12:53 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fbffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2986.911933][T32132] loop1: detected capacity change from 0 to 1 [ 2986.923295][T32123] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2986.935316][T32129] loop2: p1 < > p2 < > p4 [ 2986.937170][T32137] loop4: detected capacity change from 0 to 131072 [ 2986.944806][ T1437] loop3: p1 < > p2 < > p4 [ 2986.951532][T32129] loop2: p4 size 2097152 extends beyond EOD, truncated 17:12:53 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x1, "2156816c73038c"}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000000000000000000000000000000402200055aa", 0x40, 0x1c0}]) 17:12:53 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc4143, 0x0) 17:12:54 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000017c0)='/sys/fs/cgroup', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) 17:12:54 executing program 0: r0 = semget$private(0x0, 0x2, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/212) [ 2986.961687][ T1437] loop3: p4 size 2097152 extends beyond EOD, truncated [ 2986.972961][T32139] loop5: detected capacity change from 0 to 1 [ 2986.985721][T32132] loop1: p1 < > p2 < p5 > p3 p4 [ 2986.990684][T32132] loop1: partition table partially beyond EOD, truncated [ 2986.998878][T32132] loop1: p1 start 10 is beyond EOD, truncated [ 2987.005008][T32132] loop1: p2 size 2 extends beyond EOD, truncated 17:12:54 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000002f80)={0x77359400}) [ 2987.013719][ T1437] loop5: p1 < > p2 < > p4 [ 2987.018133][ T1437] loop5: partition table partially beyond EOD, truncated [ 2987.021689][T32132] loop1: p3 start 155648 is beyond EOD, truncated [ 2987.028202][ T1437] loop5: p1 start 10 is beyond EOD, [ 2987.031660][T32132] loop1: p4 size 2097152 extends beyond EOD, truncated [ 2987.036961][ T1437] truncated [ 2987.036966][ T1437] loop5: p2 size 2 extends beyond EOD, truncated [ 2987.055401][T32132] loop1: p5 start 155648 is beyond EOD, truncated 17:12:54 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f00000000000000800005000000000042000000000000000000000000000000000000000f0000000000200055aa", 0x40, 0x1c0}]) 17:12:54 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000058c40)={0x1, [], 0x1, "2156816c73038c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f6050202060a000000000380d5000000000f0000000000000080000500000000004200000000000000000000fdffffff0000000000000000000000200055aa", 0x40, 0x1c0}]) [ 2987.067947][ T1437] loop5: p4 size 2097668 extends beyond EOD, truncated [ 2987.079430][T32139] loop5: p1 < > p2 < > p4 [ 2987.083909][T32139] loop5: partition table partially beyond EOD, truncated [ 2987.093489][T32139] loop5: p1 start 10 is beyond EOD, truncated [ 2987.099686][T32139] loop5: p2 size 2 extends beyond EOD, truncated [ 2987.103745][T32150] loop4: detected capacity change from 0 to 131072 17:12:54 executing program 2: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058