[ 2407.341307][ C1] Buffer I/O error on dev loop0, logical block 4223, async page read [ 2407.348426][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2407.364083][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2407.378921][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2407.384491][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2407.409113][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2407.417859][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2407.432957][ C0] Buffer I/O error on dev loop0, logical block 1, async page read [ 2407.441922][T31764] ldm_validate_partition_table(): Disk read failed. [ 2407.453838][T31764] Dev loop0: unable to read RDB block 0 [ 2407.471527][T31764] loop0: unable to read partition table [ 2407.479821][T31764] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:48:34 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000ffff", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:34 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x28000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:34 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x80fe}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:34 executing program 5 (fault-call:4 fault-nth:35): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrf.\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2407.700547][T31798] FAULT_INJECTION: forcing a failure. [ 2407.700547][T31798] name failslab, interval 1, probability 0, space 0, times 0 [ 2407.750146][T31804] device lo entered promiscuous mode [ 2407.752621][T31798] CPU: 0 PID: 31798 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2407.763330][T31798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2407.773382][T31798] Call Trace: [ 2407.776673][T31798] dump_stack+0x1d8/0x2f8 [ 2407.781003][T31798] should_fail+0x608/0x860 [ 2407.785424][T31798] ? setup_fault_attr+0x2b0/0x2b0 [ 2407.790470][T31798] __should_failslab+0x11a/0x160 [ 2407.795416][T31798] should_failslab+0x9/0x20 [ 2407.799918][T31798] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2407.805203][T31798] ? sctp_add_bind_addr+0x8c/0x350 [ 2407.810323][T31798] sctp_add_bind_addr+0x8c/0x350 [ 2407.815260][T31798] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2407.820642][T31798] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2407.826279][T31798] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2407.832361][T31798] sctp_copy_one_addr+0xad/0x610 [ 2407.837310][T31798] sctp_bind_addr_copy+0xc0/0x3c0 [ 2407.842335][T31798] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2407.848565][T31798] __sctp_connect+0x8c9/0x1050 [ 2407.848578][T31798] ? __bfs+0x550/0x550 [ 2407.848602][T31798] ? sctp_v6_destroy_sock+0x20/0x20 [ 2407.848625][T31798] ? kasan_check_write+0x14/0x20 [ 2407.848637][T31798] ? _copy_from_user+0xe0/0x120 [ 2407.848649][T31798] ? security_sctp_bind_connect+0xaa/0xd0 [ 2407.848664][T31798] sctp_setsockopt+0x2bf5/0xf2b0 [ 2407.883015][T31798] ? sctp_shutdown+0x130/0x130 [ 2407.887780][T31798] ? __lock_acquire+0xcf7/0x1a40 [ 2407.892720][T31798] ? __bfs+0x550/0x550 [ 2407.896795][T31798] ? trace_lock_acquire+0x190/0x190 [ 2407.901991][T31798] ? __bfs+0x550/0x550 [ 2407.906050][T31798] ? register_lock_class+0xde/0x1110 [ 2407.911362][T31798] ? __lock_acquire+0xcf7/0x1a40 [ 2407.916343][T31798] ? trace_lock_acquire+0x190/0x190 [ 2407.921540][T31798] ? __might_fault+0xf9/0x160 [ 2407.926207][T31798] ? __bfs+0x550/0x550 [ 2407.930266][T31798] ? kstrtoull+0x3ba/0x4e0 [ 2407.934718][T31798] ? kasan_check_write+0x14/0x20 [ 2407.939651][T31798] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2407.945808][T31798] ? __lock_acquire+0xcf7/0x1a40 [ 2407.950755][T31798] ? trace_lock_acquire+0x190/0x190 [ 2407.955951][T31798] ? trace_lock_acquire+0x190/0x190 [ 2407.961149][T31798] ? __mutex_lock_common+0x56b/0x2fc0 [ 2407.966517][T31798] ? memset+0x31/0x40 [ 2407.970499][T31798] ? fsnotify+0x14b9/0x1580 [ 2407.975013][T31798] ? rcu_lock_release+0xd/0x30 [ 2407.979775][T31798] ? rcu_lock_release+0x26/0x30 [ 2407.984621][T31798] ? __fget+0x4fe/0x540 [ 2407.988782][T31798] ? fget_many+0x30/0x30 [ 2407.993032][T31798] sock_common_setsockopt+0x99/0xb0 06:48:35 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x40000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:35 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x43050000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:35 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x58000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2407.998237][T31798] __sys_setsockopt+0x1e2/0x250 [ 2408.003090][T31798] __x64_sys_setsockopt+0xbf/0xd0 [ 2408.008120][T31798] do_syscall_64+0xfe/0x140 [ 2408.012623][T31798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.018511][T31798] RIP: 0033:0x4597c9 [ 2408.022401][T31798] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2408.041999][T31798] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:35 executing program 5 (fault-call:4 fault-nth:36): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2408.042011][T31798] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2408.042017][T31798] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2408.042024][T31798] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2408.042031][T31798] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2408.042038][T31798] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2408.101518][T31804] device lo left promiscuous mode [ 2408.235573][T31815] ldm_validate_partition_table(): Disk read failed. [ 2408.286917][T31815] Dev loop0: unable to read RDB block 0 [ 2408.294588][T31827] FAULT_INJECTION: forcing a failure. [ 2408.294588][T31827] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.317728][T31815] loop0: unable to read partition table [ 2408.323365][T31827] CPU: 1 PID: 31827 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2408.323374][T31827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2408.323379][T31827] Call Trace: [ 2408.323398][T31827] dump_stack+0x1d8/0x2f8 [ 2408.323417][T31827] should_fail+0x608/0x860 [ 2408.332561][T31815] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2408.341330][T31827] ? setup_fault_attr+0x2b0/0x2b0 [ 2408.341353][T31827] __should_failslab+0x11a/0x160 [ 2408.341367][T31827] should_failslab+0x9/0x20 [ 2408.341378][T31827] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2408.341391][T31827] ? sctp_add_bind_addr+0x8c/0x350 [ 2408.341405][T31827] sctp_add_bind_addr+0x8c/0x350 [ 2408.393677][T31827] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2408.399040][T31827] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2408.404658][T31827] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2408.410721][T31827] sctp_copy_one_addr+0xad/0x610 [ 2408.415645][T31827] sctp_bind_addr_copy+0xc0/0x3c0 [ 2408.420653][T31827] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2408.426878][T31827] __sctp_connect+0x8c9/0x1050 [ 2408.431625][T31827] ? __bfs+0x550/0x550 [ 2408.435690][T31827] ? sctp_v6_destroy_sock+0x20/0x20 [ 2408.440881][T31827] ? kasan_check_write+0x14/0x20 [ 2408.445803][T31827] ? _copy_from_user+0xe0/0x120 [ 2408.450639][T31827] ? security_sctp_bind_connect+0xaa/0xd0 [ 2408.456342][T31827] sctp_setsockopt+0x2bf5/0xf2b0 [ 2408.461268][T31827] ? sctp_shutdown+0x130/0x130 [ 2408.466031][T31827] ? __lock_acquire+0xcf7/0x1a40 [ 2408.470959][T31827] ? __bfs+0x550/0x550 [ 2408.475020][T31827] ? trace_lock_acquire+0x190/0x190 [ 2408.480202][T31827] ? __bfs+0x550/0x550 [ 2408.484251][T31827] ? register_lock_class+0xde/0x1110 [ 2408.489526][T31827] ? __lock_acquire+0xcf7/0x1a40 [ 2408.494460][T31827] ? trace_lock_acquire+0x190/0x190 [ 2408.499636][T31827] ? __might_fault+0xf9/0x160 [ 2408.504302][T31827] ? __bfs+0x550/0x550 [ 2408.508361][T31827] ? kstrtoull+0x3ba/0x4e0 [ 2408.512765][T31827] ? kasan_check_write+0x14/0x20 [ 2408.517685][T31827] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2408.523824][T31827] ? __lock_acquire+0xcf7/0x1a40 [ 2408.528757][T31827] ? trace_lock_acquire+0x190/0x190 [ 2408.533947][T31827] ? trace_lock_acquire+0x190/0x190 [ 2408.539129][T31827] ? __mutex_lock_common+0x56b/0x2fc0 [ 2408.544484][T31827] ? memset+0x31/0x40 [ 2408.548452][T31827] ? fsnotify+0x14b9/0x1580 [ 2408.552948][T31827] ? rcu_lock_release+0xd/0x30 [ 2408.557698][T31827] ? rcu_lock_release+0x26/0x30 [ 2408.562537][T31827] ? __fget+0x4fe/0x540 [ 2408.566710][T31827] ? fget_many+0x30/0x30 [ 2408.570947][T31827] sock_common_setsockopt+0x99/0xb0 [ 2408.576134][T31827] __sys_setsockopt+0x1e2/0x250 [ 2408.580972][T31827] __x64_sys_setsockopt+0xbf/0xd0 [ 2408.585986][T31827] do_syscall_64+0xfe/0x140 [ 2408.590474][T31827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.596358][T31827] RIP: 0033:0x4597c9 [ 2408.600237][T31827] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2408.619825][T31827] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2408.628219][T31827] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2408.636172][T31827] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2408.644139][T31827] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2408.652094][T31827] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2408.660077][T31827] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:36 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000ffff", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:36 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x66000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:36 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xfe80}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrf/\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:36 executing program 5 (fault-call:4 fault-nth:37): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2408.877662][T31815] ldm_validate_partition_table(): Disk read failed. [ 2408.889559][T31815] Dev loop0: unable to read RDB block 0 [ 2408.896133][T31815] loop0: unable to read partition table [ 2408.901854][T31815] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:48:36 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x800e0000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2409.002923][T31850] device lo entered promiscuous mode [ 2409.017289][T31842] FAULT_INJECTION: forcing a failure. [ 2409.017289][T31842] name failslab, interval 1, probability 0, space 0, times 0 [ 2409.059176][T31842] CPU: 0 PID: 31842 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2409.067075][T31842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2409.067082][T31842] Call Trace: [ 2409.067107][T31842] dump_stack+0x1d8/0x2f8 [ 2409.067126][T31842] should_fail+0x608/0x860 [ 2409.067157][T31842] ? setup_fault_attr+0x2b0/0x2b0 [ 2409.067179][T31842] __should_failslab+0x11a/0x160 [ 2409.067193][T31842] should_failslab+0x9/0x20 [ 2409.067224][T31842] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2409.094254][T31842] ? sctp_add_bind_addr+0x8c/0x350 [ 2409.094270][T31842] sctp_add_bind_addr+0x8c/0x350 [ 2409.094282][T31842] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2409.094303][T31842] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2409.094319][T31842] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2409.136110][T31842] sctp_copy_one_addr+0xad/0x610 [ 2409.141047][T31842] sctp_bind_addr_copy+0xc0/0x3c0 [ 2409.146074][T31842] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2409.152324][T31842] __sctp_connect+0x8c9/0x1050 06:48:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:36 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x80350000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2409.157091][T31842] ? __bfs+0x550/0x550 [ 2409.161173][T31842] ? sctp_v6_destroy_sock+0x20/0x20 [ 2409.166388][T31842] ? kasan_check_write+0x14/0x20 [ 2409.171325][T31842] ? _copy_from_user+0xe0/0x120 [ 2409.176173][T31842] ? security_sctp_bind_connect+0xaa/0xd0 [ 2409.181879][T31842] sctp_setsockopt+0x2bf5/0xf2b0 [ 2409.186806][T31842] ? sctp_shutdown+0x130/0x130 [ 2409.191564][T31842] ? __lock_acquire+0xcf7/0x1a40 [ 2409.196508][T31842] ? __bfs+0x550/0x550 [ 2409.200573][T31842] ? trace_lock_acquire+0x190/0x190 [ 2409.205766][T31842] ? __bfs+0x550/0x550 [ 2409.209821][T31842] ? register_lock_class+0xde/0x1110 [ 2409.215080][T31842] ? __lock_acquire+0xcf7/0x1a40 [ 2409.219995][T31842] ? trace_lock_acquire+0x190/0x190 [ 2409.225165][T31842] ? __might_fault+0xf9/0x160 [ 2409.229827][T31842] ? __bfs+0x550/0x550 [ 2409.233904][T31842] ? kstrtoull+0x3ba/0x4e0 [ 2409.238304][T31842] ? kasan_check_write+0x14/0x20 [ 2409.243214][T31842] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2409.249355][T31842] ? __lock_acquire+0xcf7/0x1a40 [ 2409.254281][T31842] ? trace_lock_acquire+0x190/0x190 [ 2409.259456][T31842] ? trace_lock_acquire+0x190/0x190 [ 2409.264890][T31842] ? __mutex_lock_common+0x56b/0x2fc0 [ 2409.270250][T31842] ? memset+0x31/0x40 [ 2409.274218][T31842] ? fsnotify+0x14b9/0x1580 [ 2409.278705][T31842] ? rcu_lock_release+0xd/0x30 [ 2409.283448][T31842] ? rcu_lock_release+0x26/0x30 [ 2409.288284][T31842] ? __fget+0x4fe/0x540 [ 2409.292439][T31842] ? fget_many+0x30/0x30 [ 2409.296661][T31842] sock_common_setsockopt+0x99/0xb0 [ 2409.301850][T31842] __sys_setsockopt+0x1e2/0x250 [ 2409.306705][T31842] __x64_sys_setsockopt+0xbf/0xd0 [ 2409.311716][T31842] do_syscall_64+0xfe/0x140 [ 2409.316211][T31842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.322093][T31842] RIP: 0033:0x4597c9 [ 2409.325974][T31842] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2409.345583][T31842] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:36 executing program 5 (fault-call:4 fault-nth:38): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2409.353983][T31842] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2409.361931][T31842] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2409.369885][T31842] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2409.377833][T31842] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2409.385785][T31842] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2409.417272][T31850] device lo left promiscuous mode 06:48:36 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x1000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2409.505649][T31857] ldm_validate_partition_table(): Disk read failed. [ 2409.547663][T31867] FAULT_INJECTION: forcing a failure. [ 2409.547663][T31867] name failslab, interval 1, probability 0, space 0, times 0 [ 2409.589910][T31857] Dev loop0: unable to read RDB block 0 [ 2409.609333][T31867] CPU: 0 PID: 31867 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2409.617236][T31867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2409.627306][T31867] Call Trace: [ 2409.630595][T31867] dump_stack+0x1d8/0x2f8 [ 2409.634926][T31867] should_fail+0x608/0x860 [ 2409.639340][T31867] ? setup_fault_attr+0x2b0/0x2b0 [ 2409.644364][T31867] __should_failslab+0x11a/0x160 [ 2409.649303][T31867] should_failslab+0x9/0x20 [ 2409.653799][T31867] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2409.659088][T31867] ? sctp_add_bind_addr+0x8c/0x350 [ 2409.664197][T31867] sctp_add_bind_addr+0x8c/0x350 [ 2409.669139][T31867] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2409.674514][T31867] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2409.678353][T31857] loop0: unable to read partition table 06:48:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2409.680141][T31867] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2409.680165][T31867] sctp_copy_one_addr+0xad/0x610 [ 2409.680181][T31867] sctp_bind_addr_copy+0xc0/0x3c0 [ 2409.687944][T31857] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2409.691848][T31867] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2409.691864][T31867] __sctp_connect+0x8c9/0x1050 [ 2409.691876][T31867] ? __bfs+0x550/0x550 [ 2409.691899][T31867] ? sctp_v6_destroy_sock+0x20/0x20 [ 2409.732173][T31867] ? kasan_check_write+0x14/0x20 [ 2409.737108][T31867] ? _copy_from_user+0xe0/0x120 [ 2409.741951][T31867] ? security_sctp_bind_connect+0xaa/0xd0 [ 2409.747664][T31867] sctp_setsockopt+0x2bf5/0xf2b0 [ 2409.752601][T31867] ? sctp_shutdown+0x130/0x130 [ 2409.757347][T31867] ? __lock_acquire+0xcf7/0x1a40 [ 2409.762266][T31867] ? __bfs+0x550/0x550 [ 2409.766320][T31867] ? trace_lock_acquire+0x190/0x190 [ 2409.771492][T31867] ? __bfs+0x550/0x550 [ 2409.775545][T31867] ? register_lock_class+0xde/0x1110 [ 2409.780819][T31867] ? __lock_acquire+0xcf7/0x1a40 [ 2409.785735][T31867] ? trace_lock_acquire+0x190/0x190 [ 2409.790904][T31867] ? __might_fault+0xf9/0x160 [ 2409.795570][T31867] ? __bfs+0x550/0x550 [ 2409.799624][T31867] ? kstrtoull+0x3ba/0x4e0 [ 2409.804033][T31867] ? kasan_check_write+0x14/0x20 [ 2409.808953][T31867] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2409.815083][T31867] ? __lock_acquire+0xcf7/0x1a40 [ 2409.819998][T31867] ? trace_lock_acquire+0x190/0x190 [ 2409.825171][T31867] ? trace_lock_acquire+0x190/0x190 [ 2409.830347][T31867] ? __mutex_lock_common+0x56b/0x2fc0 [ 2409.835703][T31867] ? memset+0x31/0x40 [ 2409.839676][T31867] ? fsnotify+0x14b9/0x1580 [ 2409.844164][T31867] ? rcu_lock_release+0xd/0x30 [ 2409.848908][T31867] ? rcu_lock_release+0x26/0x30 [ 2409.853733][T31867] ? __fget+0x4fe/0x540 [ 2409.857892][T31867] ? fget_many+0x30/0x30 [ 2409.862122][T31867] sock_common_setsockopt+0x99/0xb0 [ 2409.867310][T31867] __sys_setsockopt+0x1e2/0x250 [ 2409.872138][T31867] __x64_sys_setsockopt+0xbf/0xd0 [ 2409.877153][T31867] do_syscall_64+0xfe/0x140 [ 2409.881642][T31867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.887505][T31867] RIP: 0033:0x4597c9 [ 2409.891373][T31867] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2409.910950][T31867] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2409.919336][T31867] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2409.927290][T31867] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2409.935251][T31867] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2409.943210][T31867] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2409.951172][T31867] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2409.965690][T31876] device lo entered promiscuous mode [ 2410.049718][T31876] device lo left promiscuous mode [ 2410.165909][T31857] ldm_validate_partition_table(): Disk read failed. [ 2410.176590][T31857] Dev loop0: unable to read RDB block 0 [ 2410.198393][T31857] loop0: unable to read partition table 06:48:37 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:37 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x81000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrf0\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:37 executing program 5 (fault-call:4 fault-nth:39): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:37 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x2000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2410.206847][T31857] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:48:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2410.307458][T31899] device lo entered promiscuous mode [ 2410.312864][T31896] FAULT_INJECTION: forcing a failure. [ 2410.312864][T31896] name failslab, interval 1, probability 0, space 0, times 0 06:48:37 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x86ddffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2410.375070][T31896] CPU: 0 PID: 31896 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2410.382988][T31896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.393046][T31896] Call Trace: [ 2410.396343][T31896] dump_stack+0x1d8/0x2f8 [ 2410.400669][T31896] should_fail+0x608/0x860 [ 2410.405079][T31896] ? setup_fault_attr+0x2b0/0x2b0 [ 2410.410128][T31896] __should_failslab+0x11a/0x160 [ 2410.415071][T31896] should_failslab+0x9/0x20 [ 2410.419563][T31896] kmem_cache_alloc_trace+0x5d/0x2c0 06:48:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2410.424841][T31896] ? sctp_add_bind_addr+0x8c/0x350 [ 2410.429948][T31896] sctp_add_bind_addr+0x8c/0x350 [ 2410.434894][T31896] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2410.440265][T31896] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2410.445913][T31896] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2410.451979][T31896] sctp_copy_one_addr+0xad/0x610 [ 2410.456895][T31896] sctp_bind_addr_copy+0xc0/0x3c0 [ 2410.461895][T31896] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2410.468124][T31896] __sctp_connect+0x8c9/0x1050 [ 2410.472875][T31896] ? __bfs+0x550/0x550 [ 2410.476925][T31896] ? sctp_v6_destroy_sock+0x20/0x20 [ 2410.482102][T31896] ? kasan_check_write+0x14/0x20 [ 2410.487012][T31896] ? _copy_from_user+0xe0/0x120 [ 2410.491837][T31896] ? security_sctp_bind_connect+0xaa/0xd0 [ 2410.497531][T31896] sctp_setsockopt+0x2bf5/0xf2b0 [ 2410.502446][T31896] ? sctp_shutdown+0x130/0x130 [ 2410.507192][T31896] ? __lock_acquire+0xcf7/0x1a40 [ 2410.512120][T31896] ? __bfs+0x550/0x550 [ 2410.516173][T31896] ? trace_lock_acquire+0x190/0x190 [ 2410.521363][T31896] ? __bfs+0x550/0x550 [ 2410.525409][T31896] ? register_lock_class+0xde/0x1110 [ 2410.530667][T31896] ? __lock_acquire+0xcf7/0x1a40 [ 2410.535586][T31896] ? trace_lock_acquire+0x190/0x190 [ 2410.540774][T31896] ? __might_fault+0xf9/0x160 [ 2410.545439][T31896] ? __bfs+0x550/0x550 [ 2410.549494][T31896] ? kstrtoull+0x3ba/0x4e0 [ 2410.553890][T31896] ? kasan_check_write+0x14/0x20 [ 2410.558804][T31896] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2410.564935][T31896] ? __lock_acquire+0xcf7/0x1a40 [ 2410.569852][T31896] ? trace_lock_acquire+0x190/0x190 [ 2410.575095][T31896] ? trace_lock_acquire+0x190/0x190 [ 2410.580274][T31896] ? __mutex_lock_common+0x56b/0x2fc0 [ 2410.585641][T31896] ? memset+0x31/0x40 [ 2410.589601][T31896] ? fsnotify+0x14b9/0x1580 [ 2410.594086][T31896] ? rcu_lock_release+0xd/0x30 [ 2410.598854][T31896] ? rcu_lock_release+0x26/0x30 [ 2410.603678][T31896] ? __fget+0x4fe/0x540 [ 2410.607814][T31896] ? fget_many+0x30/0x30 [ 2410.612038][T31896] sock_common_setsockopt+0x99/0xb0 [ 2410.617214][T31896] __sys_setsockopt+0x1e2/0x250 [ 2410.622051][T31896] __x64_sys_setsockopt+0xbf/0xd0 [ 2410.627072][T31896] do_syscall_64+0xfe/0x140 [ 2410.631555][T31896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.637423][T31896] RIP: 0033:0x4597c9 [ 2410.641305][T31896] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2410.660909][T31896] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:38 executing program 5 (fault-call:4 fault-nth:40): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2410.669299][T31896] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2410.677271][T31896] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2410.685257][T31896] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2410.693231][T31896] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2410.701178][T31896] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2410.730704][T31899] device lo left promiscuous mode 06:48:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x88470000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:38 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x3000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2410.754249][T31904] ldm_validate_partition_table(): Disk read failed. [ 2410.820838][T31904] Dev loop0: unable to read RDB block 0 [ 2410.837127][T31904] loop0: unable to read partition table [ 2410.868959][T31904] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2410.896082][T31923] device lo entered promiscuous mode [ 2410.912587][T31922] FAULT_INJECTION: forcing a failure. [ 2410.912587][T31922] name failslab, interval 1, probability 0, space 0, times 0 [ 2410.929254][T31922] CPU: 0 PID: 31922 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2410.937163][T31922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.947214][T31922] Call Trace: [ 2410.950504][T31922] dump_stack+0x1d8/0x2f8 [ 2410.954839][T31922] should_fail+0x608/0x860 [ 2410.959261][T31922] ? setup_fault_attr+0x2b0/0x2b0 [ 2410.964309][T31922] __should_failslab+0x11a/0x160 [ 2410.969250][T31922] should_failslab+0x9/0x20 [ 2410.973744][T31922] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2410.979007][T31922] ? sctp_add_bind_addr+0x8c/0x350 [ 2410.984110][T31922] sctp_add_bind_addr+0x8c/0x350 [ 2410.989034][T31922] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2410.994392][T31922] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2411.000002][T31922] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2411.006062][T31922] sctp_copy_one_addr+0xad/0x610 [ 2411.010987][T31922] sctp_bind_addr_copy+0xc0/0x3c0 [ 2411.016014][T31922] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2411.022244][T31922] __sctp_connect+0x8c9/0x1050 [ 2411.026990][T31922] ? __bfs+0x550/0x550 [ 2411.031050][T31922] ? sctp_v6_destroy_sock+0x20/0x20 [ 2411.036230][T31922] ? kasan_check_write+0x14/0x20 [ 2411.041142][T31922] ? _copy_from_user+0xe0/0x120 [ 2411.045980][T31922] ? security_sctp_bind_connect+0xaa/0xd0 [ 2411.051687][T31922] sctp_setsockopt+0x2bf5/0xf2b0 [ 2411.056603][T31922] ? sctp_shutdown+0x130/0x130 [ 2411.061343][T31922] ? __lock_acquire+0xcf7/0x1a40 [ 2411.066260][T31922] ? __bfs+0x550/0x550 [ 2411.070347][T31922] ? trace_lock_acquire+0x190/0x190 [ 2411.075545][T31922] ? __bfs+0x550/0x550 [ 2411.079591][T31922] ? register_lock_class+0xde/0x1110 [ 2411.084858][T31922] ? __lock_acquire+0xcf7/0x1a40 [ 2411.089822][T31922] ? trace_lock_acquire+0x190/0x190 [ 2411.094995][T31922] ? __might_fault+0xf9/0x160 [ 2411.099656][T31922] ? __bfs+0x550/0x550 [ 2411.103712][T31922] ? kstrtoull+0x3ba/0x4e0 [ 2411.108110][T31922] ? kasan_check_write+0x14/0x20 [ 2411.113053][T31922] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2411.119183][T31922] ? __lock_acquire+0xcf7/0x1a40 [ 2411.124100][T31922] ? trace_lock_acquire+0x190/0x190 [ 2411.129272][T31922] ? trace_lock_acquire+0x190/0x190 [ 2411.134451][T31922] ? __mutex_lock_common+0x56b/0x2fc0 [ 2411.139801][T31922] ? memset+0x31/0x40 [ 2411.143773][T31922] ? fsnotify+0x14b9/0x1580 [ 2411.148282][T31922] ? rcu_lock_release+0xd/0x30 [ 2411.153042][T31922] ? rcu_lock_release+0x26/0x30 [ 2411.157866][T31922] ? __fget+0x4fe/0x540 [ 2411.161999][T31922] ? fget_many+0x30/0x30 [ 2411.166232][T31922] sock_common_setsockopt+0x99/0xb0 [ 2411.171504][T31922] __sys_setsockopt+0x1e2/0x250 [ 2411.176334][T31922] __x64_sys_setsockopt+0xbf/0xd0 [ 2411.181336][T31922] do_syscall_64+0xfe/0x140 [ 2411.185830][T31922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.191705][T31922] RIP: 0033:0x4597c9 [ 2411.195584][T31922] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2411.215165][T31922] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2411.223546][T31922] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2411.231510][T31922] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2411.239458][T31922] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2411.247415][T31922] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2411.255371][T31922] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2411.268170][T31928] device lo left promiscuous mode 06:48:38 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000003", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfL\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x88480000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:38 executing program 5 (fault-call:4 fault-nth:41): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:38 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x4000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x88640000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2411.486206][T31947] device lo entered promiscuous mode [ 2411.508429][T31945] FAULT_INJECTION: forcing a failure. [ 2411.508429][T31945] name failslab, interval 1, probability 0, space 0, times 0 [ 2411.533391][T31945] CPU: 0 PID: 31945 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2411.541286][T31945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2411.551348][T31945] Call Trace: [ 2411.554643][T31945] dump_stack+0x1d8/0x2f8 [ 2411.558983][T31945] should_fail+0x608/0x860 [ 2411.563406][T31945] ? setup_fault_attr+0x2b0/0x2b0 [ 2411.568439][T31945] __should_failslab+0x11a/0x160 [ 2411.573380][T31945] should_failslab+0x9/0x20 [ 2411.577899][T31945] kmem_cache_alloc_trace+0x5d/0x2c0 06:48:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2411.583207][T31945] ? sctp_add_bind_addr+0x8c/0x350 [ 2411.588330][T31945] sctp_add_bind_addr+0x8c/0x350 [ 2411.593261][T31945] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2411.598645][T31945] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2411.604277][T31945] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2411.610367][T31945] sctp_copy_one_addr+0xad/0x610 [ 2411.615321][T31945] sctp_bind_addr_copy+0xc0/0x3c0 [ 2411.620354][T31945] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2411.626596][T31945] __sctp_connect+0x8c9/0x1050 [ 2411.631404][T31945] ? __bfs+0x550/0x550 [ 2411.631429][T31945] ? sctp_v6_destroy_sock+0x20/0x20 [ 2411.631450][T31945] ? kasan_check_write+0x14/0x20 [ 2411.640680][T31945] ? _copy_from_user+0xe0/0x120 [ 2411.650430][T31945] ? security_sctp_bind_connect+0xaa/0xd0 [ 2411.656150][T31945] sctp_setsockopt+0x2bf5/0xf2b0 [ 2411.661092][T31945] ? sctp_shutdown+0x130/0x130 [ 2411.665853][T31945] ? __lock_acquire+0xcf7/0x1a40 [ 2411.670792][T31945] ? __bfs+0x550/0x550 [ 2411.674866][T31945] ? trace_lock_acquire+0x190/0x190 [ 2411.680056][T31945] ? __bfs+0x550/0x550 06:48:39 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x88caffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2411.684115][T31945] ? register_lock_class+0xde/0x1110 [ 2411.689395][T31945] ? __lock_acquire+0xcf7/0x1a40 [ 2411.694342][T31945] ? trace_lock_acquire+0x190/0x190 [ 2411.699538][T31945] ? __might_fault+0xf9/0x160 [ 2411.704228][T31945] ? __bfs+0x550/0x550 [ 2411.708298][T31945] ? kstrtoull+0x3ba/0x4e0 [ 2411.712732][T31945] ? kasan_check_write+0x14/0x20 [ 2411.717678][T31945] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2411.723834][T31945] ? __lock_acquire+0xcf7/0x1a40 [ 2411.728785][T31945] ? trace_lock_acquire+0x190/0x190 [ 2411.734013][T31945] ? trace_lock_acquire+0x190/0x190 [ 2411.739209][T31945] ? __mutex_lock_common+0x56b/0x2fc0 [ 2411.744555][T31945] ? memset+0x31/0x40 [ 2411.748523][T31945] ? fsnotify+0x14b9/0x1580 [ 2411.753107][T31945] ? rcu_lock_release+0xd/0x30 [ 2411.757865][T31945] ? rcu_lock_release+0x26/0x30 [ 2411.762694][T31945] ? __fget+0x4fe/0x540 [ 2411.766855][T31945] ? fget_many+0x30/0x30 [ 2411.771088][T31945] sock_common_setsockopt+0x99/0xb0 [ 2411.776303][T31945] __sys_setsockopt+0x1e2/0x250 [ 2411.781142][T31945] __x64_sys_setsockopt+0xbf/0xd0 [ 2411.786159][T31945] do_syscall_64+0xfe/0x140 [ 2411.790652][T31945] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.796536][T31945] RIP: 0033:0x4597c9 [ 2411.800407][T31945] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2411.819983][T31945] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2411.828377][T31945] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 06:48:39 executing program 5 (fault-call:4 fault-nth:42): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2411.836339][T31945] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2411.844286][T31945] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2411.852238][T31945] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2411.860183][T31945] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2411.906812][T31947] device lo left promiscuous mode 06:48:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2412.044702][T31968] FAULT_INJECTION: forcing a failure. [ 2412.044702][T31968] name failslab, interval 1, probability 0, space 0, times 0 [ 2412.066061][T31968] CPU: 0 PID: 31968 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2412.073963][T31968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2412.084013][T31968] Call Trace: [ 2412.087322][T31968] dump_stack+0x1d8/0x2f8 [ 2412.091653][T31968] should_fail+0x608/0x860 [ 2412.096064][T31968] ? setup_fault_attr+0x2b0/0x2b0 [ 2412.101091][T31968] __should_failslab+0x11a/0x160 [ 2412.106023][T31968] should_failslab+0x9/0x20 [ 2412.110516][T31968] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2412.115794][T31968] ? sctp_add_bind_addr+0x8c/0x350 [ 2412.120901][T31968] sctp_add_bind_addr+0x8c/0x350 [ 2412.125832][T31968] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2412.131192][T31968] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2412.136814][T31968] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2412.142876][T31968] sctp_copy_one_addr+0xad/0x610 [ 2412.147805][T31968] sctp_bind_addr_copy+0xc0/0x3c0 [ 2412.152819][T31968] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2412.159049][T31968] __sctp_connect+0x8c9/0x1050 [ 2412.163795][T31968] ? __bfs+0x550/0x550 [ 2412.167874][T31968] ? sctp_v6_destroy_sock+0x20/0x20 [ 2412.173068][T31968] ? kasan_check_write+0x14/0x20 [ 2412.177994][T31968] ? _copy_from_user+0xe0/0x120 [ 2412.182829][T31968] ? security_sctp_bind_connect+0xaa/0xd0 [ 2412.188551][T31968] sctp_setsockopt+0x2bf5/0xf2b0 [ 2412.193476][T31968] ? sctp_shutdown+0x130/0x130 [ 2412.198222][T31968] ? __lock_acquire+0xcf7/0x1a40 [ 2412.203140][T31968] ? __bfs+0x550/0x550 [ 2412.207204][T31968] ? trace_lock_acquire+0x190/0x190 [ 2412.215425][T31968] ? __bfs+0x550/0x550 [ 2412.219484][T31968] ? register_lock_class+0xde/0x1110 [ 2412.224752][T31968] ? __lock_acquire+0xcf7/0x1a40 [ 2412.229684][T31968] ? trace_lock_acquire+0x190/0x190 [ 2412.234877][T31968] ? __might_fault+0xf9/0x160 [ 2412.239541][T31968] ? __bfs+0x550/0x550 [ 2412.243594][T31968] ? kstrtoull+0x3ba/0x4e0 [ 2412.248002][T31968] ? kasan_check_write+0x14/0x20 [ 2412.252923][T31968] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2412.259064][T31968] ? __lock_acquire+0xcf7/0x1a40 [ 2412.263996][T31968] ? trace_lock_acquire+0x190/0x190 [ 2412.269178][T31968] ? trace_lock_acquire+0x190/0x190 [ 2412.274362][T31968] ? __mutex_lock_common+0x56b/0x2fc0 [ 2412.279720][T31968] ? memset+0x31/0x40 [ 2412.283689][T31968] ? fsnotify+0x14b9/0x1580 [ 2412.288186][T31968] ? rcu_lock_release+0xd/0x30 [ 2412.292938][T31968] ? rcu_lock_release+0x26/0x30 [ 2412.297771][T31968] ? __fget+0x4fe/0x540 [ 2412.301915][T31968] ? fget_many+0x30/0x30 [ 2412.306148][T31968] sock_common_setsockopt+0x99/0xb0 [ 2412.311332][T31968] __sys_setsockopt+0x1e2/0x250 [ 2412.316172][T31968] __x64_sys_setsockopt+0xbf/0xd0 [ 2412.321192][T31968] do_syscall_64+0xfe/0x140 [ 2412.325683][T31968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2412.331556][T31968] RIP: 0033:0x4597c9 [ 2412.335437][T31968] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2412.355592][T31968] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2412.364008][T31968] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2412.371979][T31968] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2412.379932][T31968] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2412.387885][T31968] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2412.395926][T31968] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2412.457919][ C1] print_req_error: 908 callbacks suppressed [ 2412.457936][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 80700 [ 2412.471987][ C0] print_req_error: I/O error, dev loop0, sector 33664 flags 0 [ 2412.479489][ C0] buffer_io_error: 896 callbacks suppressed [ 2412.479497][ C0] Buffer I/O error on dev loop0, logical block 4208, async page read [ 2412.498664][ C0] print_req_error: I/O error, dev loop0, sector 33784 flags 80700 [ 2412.506541][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2412.513736][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2412.521969][ C0] print_req_error: I/O error, dev loop0, sector 33784 flags 0 [ 2412.529465][ C0] Buffer I/O error on dev loop0, logical block 4223, async page read [ 2412.537590][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2412.544691][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2412.553551][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2412.560684][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2412.568827][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2412.575972][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2412.586220][ C0] print_req_error: I/O error, dev loop0, sector 8 flags 0 [ 2412.593343][ C0] Buffer I/O error on dev loop0, logical block 1, async page read [ 2412.601214][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2412.608374][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2412.617667][ C0] Buffer I/O error on dev loop0, logical block 4225, async page read [ 2412.625813][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2412.639674][T31958] ldm_validate_partition_table(): Disk read failed. [ 2412.668472][T31958] Dev loop0: unable to read RDB block 0 [ 2412.676240][T31958] loop0: unable to read partition table [ 2412.693913][T31958] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:48:40 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000fdfd", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:40 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x5000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:40 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x89060000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfX\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:40 executing program 5 (fault-call:4 fault-nth:43): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:40 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2412.866124][T31997] device lo entered promiscuous mode [ 2412.873842][T31992] FAULT_INJECTION: forcing a failure. [ 2412.873842][T31992] name failslab, interval 1, probability 0, space 0, times 0 [ 2412.886998][T31992] CPU: 1 PID: 31992 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2412.894886][T31992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2412.894895][T31992] Call Trace: [ 2412.908223][T31992] dump_stack+0x1d8/0x2f8 [ 2412.912556][T31992] should_fail+0x608/0x860 [ 2412.916969][T31992] ? setup_fault_attr+0x2b0/0x2b0 [ 2412.921997][T31992] __should_failslab+0x11a/0x160 [ 2412.926927][T31992] should_failslab+0x9/0x20 [ 2412.931417][T31992] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2412.936684][T31992] ? sctp_add_bind_addr+0x8c/0x350 [ 2412.941782][T31992] sctp_add_bind_addr+0x8c/0x350 [ 2412.946704][T31992] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2412.952065][T31992] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2412.957683][T31992] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2412.963742][T31992] sctp_copy_one_addr+0xad/0x610 [ 2412.968666][T31992] sctp_bind_addr_copy+0xc0/0x3c0 [ 2412.973680][T31992] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2412.979927][T31992] __sctp_connect+0x8c9/0x1050 [ 2412.984673][T31992] ? __bfs+0x550/0x550 [ 2412.988738][T31992] ? sctp_v6_destroy_sock+0x20/0x20 [ 2412.993931][T31992] ? kasan_check_write+0x14/0x20 [ 2412.998852][T31992] ? _copy_from_user+0xe0/0x120 [ 2413.003687][T31992] ? security_sctp_bind_connect+0xaa/0xd0 [ 2413.009395][T31992] sctp_setsockopt+0x2bf5/0xf2b0 [ 2413.014324][T31992] ? sctp_shutdown+0x130/0x130 [ 2413.019070][T31992] ? __lock_acquire+0xcf7/0x1a40 [ 2413.023991][T31992] ? __bfs+0x550/0x550 [ 2413.028049][T31992] ? trace_lock_acquire+0x190/0x190 [ 2413.033243][T31992] ? __bfs+0x550/0x550 [ 2413.037295][T31992] ? register_lock_class+0xde/0x1110 [ 2413.042564][T31992] ? __lock_acquire+0xcf7/0x1a40 [ 2413.047493][T31992] ? trace_lock_acquire+0x190/0x190 [ 2413.052669][T31992] ? __might_fault+0xf9/0x160 [ 2413.057334][T31992] ? __bfs+0x550/0x550 [ 2413.061385][T31992] ? kstrtoull+0x3ba/0x4e0 [ 2413.065789][T31992] ? kasan_check_write+0x14/0x20 [ 2413.070713][T31992] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2413.076869][T31992] ? __lock_acquire+0xcf7/0x1a40 [ 2413.081800][T31992] ? trace_lock_acquire+0x190/0x190 [ 2413.086983][T31992] ? trace_lock_acquire+0x190/0x190 [ 2413.092164][T31992] ? __mutex_lock_common+0x56b/0x2fc0 [ 2413.097519][T31992] ? memset+0x31/0x40 [ 2413.101485][T31992] ? fsnotify+0x14b9/0x1580 [ 2413.105982][T31992] ? rcu_lock_release+0xd/0x30 [ 2413.110731][T31992] ? rcu_lock_release+0x26/0x30 [ 2413.115567][T31992] ? __fget+0x4fe/0x540 [ 2413.119710][T31992] ? fget_many+0x30/0x30 [ 2413.123957][T31992] sock_common_setsockopt+0x99/0xb0 [ 2413.129144][T31992] __sys_setsockopt+0x1e2/0x250 [ 2413.133978][T31992] __x64_sys_setsockopt+0xbf/0xd0 [ 2413.138989][T31992] do_syscall_64+0xfe/0x140 [ 2413.143476][T31992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2413.149354][T31992] RIP: 0033:0x4597c9 [ 2413.153234][T31992] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2413.172822][T31992] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2413.181213][T31992] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2413.189168][T31992] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2413.197123][T31992] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2413.205075][T31992] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 06:48:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:40 executing program 5 (fault-call:4 fault-nth:44): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2413.213028][T31992] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2413.257347][T32008] device lo left promiscuous mode 06:48:40 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2413.338576][T32007] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:48:40 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x6000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2413.391185][T32017] FAULT_INJECTION: forcing a failure. [ 2413.391185][T32017] name failslab, interval 1, probability 0, space 0, times 0 [ 2413.432995][T32017] CPU: 1 PID: 32017 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2413.440897][T32017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2413.450939][T32017] Call Trace: [ 2413.454226][T32017] dump_stack+0x1d8/0x2f8 [ 2413.458560][T32017] should_fail+0x608/0x860 [ 2413.463000][T32017] ? setup_fault_attr+0x2b0/0x2b0 [ 2413.468041][T32017] __should_failslab+0x11a/0x160 [ 2413.472983][T32017] should_failslab+0x9/0x20 [ 2413.477485][T32017] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2413.482771][T32017] ? sctp_add_bind_addr+0x8c/0x350 [ 2413.487883][T32017] sctp_add_bind_addr+0x8c/0x350 [ 2413.492826][T32017] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2413.498206][T32017] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2413.503841][T32017] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2413.509901][T32017] sctp_copy_one_addr+0xad/0x610 [ 2413.514818][T32017] sctp_bind_addr_copy+0xc0/0x3c0 [ 2413.519824][T32017] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2413.526057][T32017] __sctp_connect+0x8c9/0x1050 [ 2413.530799][T32017] ? __bfs+0x550/0x550 [ 2413.534851][T32017] ? sctp_v6_destroy_sock+0x20/0x20 [ 2413.540031][T32017] ? kasan_check_write+0x14/0x20 [ 2413.544948][T32017] ? _copy_from_user+0xe0/0x120 [ 2413.549773][T32017] ? security_sctp_bind_connect+0xaa/0xd0 [ 2413.555470][T32017] sctp_setsockopt+0x2bf5/0xf2b0 [ 2413.560388][T32017] ? sctp_shutdown+0x130/0x130 [ 2413.565129][T32017] ? __lock_acquire+0xcf7/0x1a40 [ 2413.570056][T32017] ? __bfs+0x550/0x550 [ 2413.574104][T32017] ? trace_lock_acquire+0x190/0x190 [ 2413.579276][T32017] ? __bfs+0x550/0x550 [ 2413.583320][T32017] ? register_lock_class+0xde/0x1110 [ 2413.588581][T32017] ? __lock_acquire+0xcf7/0x1a40 [ 2413.593498][T32017] ? trace_lock_acquire+0x190/0x190 [ 2413.598669][T32017] ? __might_fault+0xf9/0x160 [ 2413.603323][T32017] ? __bfs+0x550/0x550 [ 2413.607369][T32017] ? kstrtoull+0x3ba/0x4e0 [ 2413.611762][T32017] ? kasan_check_write+0x14/0x20 [ 2413.616676][T32017] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2413.622811][T32017] ? __lock_acquire+0xcf7/0x1a40 [ 2413.627739][T32017] ? trace_lock_acquire+0x190/0x190 [ 2413.632910][T32017] ? trace_lock_acquire+0x190/0x190 [ 2413.638082][T32017] ? __mutex_lock_common+0x56b/0x2fc0 [ 2413.643434][T32017] ? memset+0x31/0x40 [ 2413.647425][T32017] ? fsnotify+0x14b9/0x1580 [ 2413.651907][T32017] ? rcu_lock_release+0xd/0x30 [ 2413.656646][T32017] ? rcu_lock_release+0x26/0x30 [ 2413.661472][T32017] ? __fget+0x4fe/0x540 [ 2413.665604][T32017] ? fget_many+0x30/0x30 [ 2413.669825][T32017] sock_common_setsockopt+0x99/0xb0 [ 2413.675023][T32017] __sys_setsockopt+0x1e2/0x250 [ 2413.679863][T32017] __x64_sys_setsockopt+0xbf/0xd0 [ 2413.684864][T32017] do_syscall_64+0xfe/0x140 [ 2413.689346][T32017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2413.695217][T32017] RIP: 0033:0x4597c9 [ 2413.699100][T32017] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2413.718681][T32017] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2413.727063][T32017] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2413.735006][T32017] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2413.742950][T32017] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2413.750898][T32017] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2413.758848][T32017] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2413.828965][T32007] ldm_validate_partition_table(): Disk read failed. [ 2413.847484][T32007] Dev loop0: unable to read RDB block 0 06:48:41 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a34103340000000097ff", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:41 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xff000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:41 executing program 5 (fault-call:4 fault-nth:45): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrf\\\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2413.884473][T32007] loop0: unable to read partition table [ 2413.892119][T32034] device lo entered promiscuous mode [ 2413.898946][T32007] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:48:41 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffa888]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2413.991764][T32038] FAULT_INJECTION: forcing a failure. [ 2413.991764][T32038] name failslab, interval 1, probability 0, space 0, times 0 [ 2414.004711][T32034] device lo left promiscuous mode [ 2414.022561][T32038] CPU: 1 PID: 32038 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2414.030459][T32038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:48:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2414.040510][T32038] Call Trace: [ 2414.043812][T32038] dump_stack+0x1d8/0x2f8 [ 2414.048154][T32038] should_fail+0x608/0x860 [ 2414.052577][T32038] ? setup_fault_attr+0x2b0/0x2b0 [ 2414.057608][T32038] __should_failslab+0x11a/0x160 [ 2414.062560][T32038] should_failslab+0x9/0x20 [ 2414.067054][T32038] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2414.072317][T32038] ? sctp_add_bind_addr+0x8c/0x350 [ 2414.077404][T32038] sctp_add_bind_addr+0x8c/0x350 [ 2414.082330][T32038] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2414.087681][T32038] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2414.093289][T32038] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2414.099340][T32038] sctp_copy_one_addr+0xad/0x610 [ 2414.104263][T32038] sctp_bind_addr_copy+0xc0/0x3c0 [ 2414.109277][T32038] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2414.115507][T32038] __sctp_connect+0x8c9/0x1050 [ 2414.120278][T32038] ? __bfs+0x550/0x550 [ 2414.124336][T32038] ? sctp_v6_destroy_sock+0x20/0x20 [ 2414.129521][T32038] ? kasan_check_write+0x14/0x20 [ 2414.134453][T32038] ? _copy_from_user+0xe0/0x120 [ 2414.139292][T32038] ? security_sctp_bind_connect+0xaa/0xd0 [ 2414.144989][T32038] sctp_setsockopt+0x2bf5/0xf2b0 [ 2414.149915][T32038] ? sctp_shutdown+0x130/0x130 [ 2414.154666][T32038] ? __lock_acquire+0xcf7/0x1a40 [ 2414.159600][T32038] ? __bfs+0x550/0x550 [ 2414.163658][T32038] ? trace_lock_acquire+0x190/0x190 [ 2414.168829][T32038] ? __bfs+0x550/0x550 [ 2414.172872][T32038] ? register_lock_class+0xde/0x1110 [ 2414.178139][T32038] ? __lock_acquire+0xcf7/0x1a40 [ 2414.183058][T32038] ? trace_lock_acquire+0x190/0x190 [ 2414.188237][T32038] ? __might_fault+0xf9/0x160 [ 2414.192905][T32038] ? __bfs+0x550/0x550 [ 2414.196950][T32038] ? kstrtoull+0x3ba/0x4e0 [ 2414.201344][T32038] ? kasan_check_write+0x14/0x20 [ 2414.206262][T32038] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2414.212400][T32038] ? __lock_acquire+0xcf7/0x1a40 [ 2414.217337][T32038] ? trace_lock_acquire+0x190/0x190 [ 2414.222523][T32038] ? trace_lock_acquire+0x190/0x190 [ 2414.227717][T32038] ? __mutex_lock_common+0x56b/0x2fc0 [ 2414.233072][T32038] ? memset+0x31/0x40 [ 2414.237042][T32038] ? fsnotify+0x14b9/0x1580 [ 2414.241526][T32038] ? rcu_lock_release+0xd/0x30 [ 2414.246278][T32038] ? rcu_lock_release+0x26/0x30 [ 2414.251109][T32038] ? __fget+0x4fe/0x540 [ 2414.256645][T32038] ? fget_many+0x30/0x30 [ 2414.260899][T32038] sock_common_setsockopt+0x99/0xb0 [ 2414.266085][T32038] __sys_setsockopt+0x1e2/0x250 [ 2414.270925][T32038] __x64_sys_setsockopt+0xbf/0xd0 [ 2414.275927][T32038] do_syscall_64+0xfe/0x140 [ 2414.280408][T32038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2414.286271][T32038] RIP: 0033:0x4597c9 [ 2414.290141][T32038] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2414.309718][T32038] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2414.318128][T32038] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2414.326082][T32038] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2414.334142][T32038] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2414.342109][T32038] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2414.350060][T32038] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:41 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x7000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:41 executing program 5 (fault-call:4 fault-nth:46): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:41 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffca88]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2414.521351][T32050] ldm_validate_partition_table(): Disk read failed. [ 2414.547809][T32050] Dev loop0: unable to read RDB block 0 [ 2414.565432][T32066] FAULT_INJECTION: forcing a failure. [ 2414.565432][T32066] name failslab, interval 1, probability 0, space 0, times 0 [ 2414.579424][T32050] loop0: unable to read partition table [ 2414.585294][T32050] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2414.593595][T32071] device lo entered promiscuous mode [ 2414.607515][T32066] CPU: 1 PID: 32066 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2414.615414][T32066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2414.625468][T32066] Call Trace: [ 2414.628739][T32066] dump_stack+0x1d8/0x2f8 [ 2414.633048][T32066] should_fail+0x608/0x860 [ 2414.637442][T32066] ? setup_fault_attr+0x2b0/0x2b0 [ 2414.642457][T32066] __should_failslab+0x11a/0x160 [ 2414.647384][T32066] should_failslab+0x9/0x20 [ 2414.651863][T32066] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2414.657137][T32066] ? sctp_add_bind_addr+0x8c/0x350 [ 2414.662227][T32066] sctp_add_bind_addr+0x8c/0x350 [ 2414.667138][T32066] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2414.672498][T32066] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2414.678127][T32066] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2414.684183][T32066] sctp_copy_one_addr+0xad/0x610 [ 2414.689109][T32066] sctp_bind_addr_copy+0xc0/0x3c0 [ 2414.694146][T32066] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2414.700361][T32066] __sctp_connect+0x8c9/0x1050 [ 2414.705116][T32066] ? __bfs+0x550/0x550 [ 2414.709191][T32066] ? sctp_v6_destroy_sock+0x20/0x20 [ 2414.714381][T32066] ? kasan_check_write+0x14/0x20 [ 2414.719315][T32066] ? _copy_from_user+0xe0/0x120 [ 2414.724144][T32066] ? security_sctp_bind_connect+0xaa/0xd0 [ 2414.729838][T32066] sctp_setsockopt+0x2bf5/0xf2b0 [ 2414.734763][T32066] ? sctp_shutdown+0x130/0x130 [ 2414.739518][T32066] ? __lock_acquire+0xcf7/0x1a40 [ 2414.744444][T32066] ? __bfs+0x550/0x550 [ 2414.748495][T32066] ? trace_lock_acquire+0x190/0x190 [ 2414.753674][T32066] ? __bfs+0x550/0x550 [ 2414.757733][T32066] ? register_lock_class+0xde/0x1110 [ 2414.763000][T32066] ? __lock_acquire+0xcf7/0x1a40 [ 2414.767968][T32066] ? trace_lock_acquire+0x190/0x190 [ 2414.773154][T32066] ? __might_fault+0xf9/0x160 [ 2414.777815][T32066] ? __bfs+0x550/0x550 [ 2414.781858][T32066] ? kstrtoull+0x3ba/0x4e0 [ 2414.786258][T32066] ? kasan_check_write+0x14/0x20 [ 2414.791168][T32066] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2414.797298][T32066] ? __lock_acquire+0xcf7/0x1a40 [ 2414.802216][T32066] ? trace_lock_acquire+0x190/0x190 [ 2414.807385][T32066] ? trace_lock_acquire+0x190/0x190 [ 2414.812568][T32066] ? __mutex_lock_common+0x56b/0x2fc0 [ 2414.817923][T32066] ? memset+0x31/0x40 [ 2414.821880][T32066] ? fsnotify+0x14b9/0x1580 [ 2414.826365][T32066] ? rcu_lock_release+0xd/0x30 [ 2414.831103][T32066] ? rcu_lock_release+0x26/0x30 [ 2414.835946][T32066] ? __fget+0x4fe/0x540 [ 2414.840092][T32066] ? fget_many+0x30/0x30 [ 2414.844312][T32066] sock_common_setsockopt+0x99/0xb0 [ 2414.849488][T32066] __sys_setsockopt+0x1e2/0x250 [ 2414.854320][T32066] __x64_sys_setsockopt+0xbf/0xd0 [ 2414.859323][T32066] do_syscall_64+0xfe/0x140 [ 2414.863806][T32066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2414.869672][T32066] RIP: 0033:0x4597c9 [ 2414.873555][T32066] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2414.893134][T32066] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2414.901534][T32066] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2414.909496][T32066] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 06:48:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2414.917462][T32066] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2414.925442][T32066] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2414.933387][T32066] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2414.996363][T32071] device lo left promiscuous mode 06:48:42 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000f4ff", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfc\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:42 executing program 5 (fault-call:4 fault-nth:47): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:42 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x8000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:42 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2415.143943][T32083] FAULT_INJECTION: forcing a failure. [ 2415.143943][T32083] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.156614][T32083] CPU: 1 PID: 32083 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2415.164500][T32083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2415.174545][T32083] Call Trace: [ 2415.177830][T32083] dump_stack+0x1d8/0x2f8 [ 2415.182138][T32083] should_fail+0x608/0x860 [ 2415.186554][T32083] ? setup_fault_attr+0x2b0/0x2b0 [ 2415.191647][T32083] __should_failslab+0x11a/0x160 [ 2415.196564][T32083] should_failslab+0x9/0x20 [ 2415.201045][T32083] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2415.206306][T32083] ? sctp_add_bind_addr+0x8c/0x350 [ 2415.211395][T32083] sctp_add_bind_addr+0x8c/0x350 [ 2415.216311][T32083] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2415.221687][T32083] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2415.227323][T32083] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2415.233386][T32083] sctp_copy_one_addr+0xad/0x610 [ 2415.238305][T32083] sctp_bind_addr_copy+0xc0/0x3c0 [ 2415.243324][T32083] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2415.249557][T32083] __sctp_connect+0x8c9/0x1050 [ 2415.254308][T32083] ? __bfs+0x550/0x550 [ 2415.258639][T32083] ? sctp_v6_destroy_sock+0x20/0x20 [ 2415.263827][T32083] ? kasan_check_write+0x14/0x20 [ 2415.268744][T32083] ? _copy_from_user+0xe0/0x120 [ 2415.273571][T32083] ? security_sctp_bind_connect+0xaa/0xd0 [ 2415.279267][T32083] sctp_setsockopt+0x2bf5/0xf2b0 [ 2415.284182][T32083] ? sctp_shutdown+0x130/0x130 [ 2415.288930][T32083] ? __lock_acquire+0xcf7/0x1a40 [ 2415.293842][T32083] ? __bfs+0x550/0x550 [ 2415.297892][T32083] ? trace_lock_acquire+0x190/0x190 [ 2415.303065][T32083] ? __bfs+0x550/0x550 [ 2415.307108][T32083] ? register_lock_class+0xde/0x1110 [ 2415.312374][T32083] ? __lock_acquire+0xcf7/0x1a40 [ 2415.317303][T32083] ? trace_lock_acquire+0x190/0x190 [ 2415.322486][T32083] ? __might_fault+0xf9/0x160 [ 2415.327138][T32083] ? __bfs+0x550/0x550 [ 2415.331184][T32083] ? kstrtoull+0x3ba/0x4e0 [ 2415.335581][T32083] ? kasan_check_write+0x14/0x20 [ 2415.340511][T32083] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2415.346647][T32083] ? __lock_acquire+0xcf7/0x1a40 [ 2415.351576][T32083] ? trace_lock_acquire+0x190/0x190 [ 2415.356748][T32083] ? trace_lock_acquire+0x190/0x190 [ 2415.361923][T32083] ? __mutex_lock_common+0x56b/0x2fc0 [ 2415.367280][T32083] ? memset+0x31/0x40 [ 2415.371244][T32083] ? fsnotify+0x14b9/0x1580 [ 2415.375727][T32083] ? rcu_lock_release+0xd/0x30 [ 2415.380465][T32083] ? rcu_lock_release+0x26/0x30 [ 2415.385289][T32083] ? __fget+0x4fe/0x540 [ 2415.389436][T32083] ? fget_many+0x30/0x30 [ 2415.393657][T32083] sock_common_setsockopt+0x99/0xb0 [ 2415.398846][T32083] __sys_setsockopt+0x1e2/0x250 [ 2415.403694][T32083] __x64_sys_setsockopt+0xbf/0xd0 [ 2415.408697][T32083] do_syscall_64+0xfe/0x140 [ 2415.413207][T32083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2415.419102][T32083] RIP: 0033:0x4597c9 [ 2415.422973][T32083] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:48:42 executing program 5 (fault-call:4 fault-nth:48): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2415.442573][T32083] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2415.450991][T32083] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2415.458936][T32083] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2415.466898][T32083] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2415.474877][T32083] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2415.482821][T32083] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:43 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffff8d]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2415.614842][T32096] FAULT_INJECTION: forcing a failure. [ 2415.614842][T32096] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.654260][T32096] CPU: 1 PID: 32096 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 06:48:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2415.662244][T32096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2415.672309][T32096] Call Trace: [ 2415.675597][T32096] dump_stack+0x1d8/0x2f8 [ 2415.679936][T32096] should_fail+0x608/0x860 [ 2415.684355][T32096] ? setup_fault_attr+0x2b0/0x2b0 [ 2415.689400][T32096] __should_failslab+0x11a/0x160 [ 2415.694342][T32096] should_failslab+0x9/0x20 [ 2415.698842][T32096] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2415.704125][T32096] ? sctp_add_bind_addr+0x8c/0x350 [ 2415.709240][T32096] sctp_add_bind_addr+0x8c/0x350 [ 2415.714169][T32096] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2415.719528][T32096] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2415.725149][T32096] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2415.731238][T32096] sctp_copy_one_addr+0xad/0x610 [ 2415.736158][T32096] sctp_bind_addr_copy+0xc0/0x3c0 [ 2415.741163][T32096] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2415.747379][T32096] __sctp_connect+0x8c9/0x1050 [ 2415.752129][T32096] ? __bfs+0x550/0x550 [ 2415.756195][T32096] ? sctp_v6_destroy_sock+0x20/0x20 [ 2415.761373][T32096] ? kasan_check_write+0x14/0x20 [ 2415.766330][T32096] ? _copy_from_user+0xe0/0x120 [ 2415.771159][T32096] ? security_sctp_bind_connect+0xaa/0xd0 [ 2415.776870][T32096] sctp_setsockopt+0x2bf5/0xf2b0 [ 2415.781809][T32096] ? sctp_shutdown+0x130/0x130 [ 2415.786547][T32096] ? __lock_acquire+0xcf7/0x1a40 [ 2415.791466][T32096] ? __bfs+0x550/0x550 [ 2415.795526][T32096] ? trace_lock_acquire+0x190/0x190 [ 2415.800696][T32096] ? __bfs+0x550/0x550 [ 2415.804739][T32096] ? register_lock_class+0xde/0x1110 [ 2415.810006][T32096] ? __lock_acquire+0xcf7/0x1a40 [ 2415.814933][T32096] ? trace_lock_acquire+0x190/0x190 [ 2415.820120][T32096] ? __might_fault+0xf9/0x160 [ 2415.824769][T32096] ? __bfs+0x550/0x550 [ 2415.828816][T32096] ? kstrtoull+0x3ba/0x4e0 [ 2415.833210][T32096] ? kasan_check_write+0x14/0x20 [ 2415.838122][T32096] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2415.844250][T32096] ? __lock_acquire+0xcf7/0x1a40 [ 2415.849168][T32096] ? trace_lock_acquire+0x190/0x190 [ 2415.854342][T32096] ? trace_lock_acquire+0x190/0x190 [ 2415.859517][T32096] ? __mutex_lock_common+0x56b/0x2fc0 [ 2415.864869][T32096] ? memset+0x31/0x40 [ 2415.868836][T32096] ? fsnotify+0x14b9/0x1580 [ 2415.873355][T32096] ? rcu_lock_release+0xd/0x30 [ 2415.878108][T32096] ? rcu_lock_release+0x26/0x30 [ 2415.882939][T32096] ? __fget+0x4fe/0x540 [ 2415.887080][T32096] ? fget_many+0x30/0x30 [ 2415.891310][T32096] sock_common_setsockopt+0x99/0xb0 [ 2415.896500][T32096] __sys_setsockopt+0x1e2/0x250 [ 2415.901327][T32096] __x64_sys_setsockopt+0xbf/0xd0 [ 2415.906328][T32096] do_syscall_64+0xfe/0x140 [ 2415.910815][T32096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2415.916698][T32096] RIP: 0033:0x4597c9 [ 2415.920565][T32096] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2415.940161][T32096] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2415.948547][T32096] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2415.956492][T32096] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2415.964455][T32096] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2415.972402][T32096] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2415.980367][T32096] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2415.989626][T32106] device lo entered promiscuous mode 06:48:43 executing program 5 (fault-call:4 fault-nth:49): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:43 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000fbff", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:43 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2416.046476][T32106] device lo left promiscuous mode 06:48:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfd\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:43 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x9000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2416.191542][T32119] FAULT_INJECTION: forcing a failure. [ 2416.191542][T32119] name failslab, interval 1, probability 0, space 0, times 0 [ 2416.251214][T32119] CPU: 1 PID: 32119 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2416.261473][T32119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2416.271542][T32119] Call Trace: [ 2416.274830][T32119] dump_stack+0x1d8/0x2f8 [ 2416.279154][T32119] should_fail+0x608/0x860 [ 2416.283561][T32119] ? setup_fault_attr+0x2b0/0x2b0 [ 2416.288587][T32119] __should_failslab+0x11a/0x160 [ 2416.293511][T32119] should_failslab+0x9/0x20 [ 2416.297999][T32119] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2416.303266][T32119] ? sctp_add_bind_addr+0x8c/0x350 [ 2416.308364][T32119] sctp_add_bind_addr+0x8c/0x350 [ 2416.313321][T32119] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2416.318709][T32119] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2416.324334][T32119] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2416.330399][T32119] sctp_copy_one_addr+0xad/0x610 [ 2416.335323][T32119] sctp_bind_addr_copy+0xc0/0x3c0 [ 2416.342768][T32119] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2416.349001][T32119] __sctp_connect+0x8c9/0x1050 [ 2416.353747][T32119] ? __bfs+0x550/0x550 [ 2416.357818][T32119] ? sctp_v6_destroy_sock+0x20/0x20 [ 2416.363009][T32119] ? kasan_check_write+0x14/0x20 [ 2416.367929][T32119] ? _copy_from_user+0xe0/0x120 [ 2416.372766][T32119] ? security_sctp_bind_connect+0xaa/0xd0 [ 2416.378477][T32119] sctp_setsockopt+0x2bf5/0xf2b0 [ 2416.383405][T32119] ? sctp_shutdown+0x130/0x130 [ 2416.388155][T32119] ? __lock_acquire+0xcf7/0x1a40 [ 2416.393071][T32119] ? __bfs+0x550/0x550 [ 2416.397134][T32119] ? trace_lock_acquire+0x190/0x190 [ 2416.402314][T32119] ? __bfs+0x550/0x550 [ 2416.406367][T32119] ? register_lock_class+0xde/0x1110 [ 2416.411666][T32119] ? __lock_acquire+0xcf7/0x1a40 [ 2416.416596][T32119] ? trace_lock_acquire+0x190/0x190 [ 2416.421772][T32119] ? __might_fault+0xf9/0x160 [ 2416.426440][T32119] ? __bfs+0x550/0x550 [ 2416.430495][T32119] ? kstrtoull+0x3ba/0x4e0 [ 2416.434903][T32119] ? kasan_check_write+0x14/0x20 [ 2416.439820][T32119] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2416.445973][T32119] ? __lock_acquire+0xcf7/0x1a40 [ 2416.450919][T32119] ? trace_lock_acquire+0x190/0x190 [ 2416.456098][T32119] ? trace_lock_acquire+0x190/0x190 [ 2416.461277][T32119] ? __mutex_lock_common+0x56b/0x2fc0 [ 2416.466632][T32119] ? memset+0x31/0x40 [ 2416.470604][T32119] ? fsnotify+0x14b9/0x1580 [ 2416.475098][T32119] ? rcu_lock_release+0xd/0x30 [ 2416.479848][T32119] ? rcu_lock_release+0x26/0x30 [ 2416.484682][T32119] ? __fget+0x4fe/0x540 [ 2416.488830][T32119] ? fget_many+0x30/0x30 [ 2416.493064][T32119] sock_common_setsockopt+0x99/0xb0 [ 2416.498278][T32119] __sys_setsockopt+0x1e2/0x250 [ 2416.503128][T32119] __x64_sys_setsockopt+0xbf/0xd0 [ 2416.508142][T32119] do_syscall_64+0xfe/0x140 [ 2416.512640][T32119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2416.518513][T32119] RIP: 0033:0x4597c9 [ 2416.522391][T32119] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2416.541977][T32119] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:43 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x4000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:43 executing program 5 (fault-call:4 fault-nth:50): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2416.550372][T32119] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2416.558344][T32119] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2416.566302][T32119] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2416.574258][T32119] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2416.582211][T32119] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2416.594541][T32130] device lo entered promiscuous mode [ 2416.656363][T32130] device lo left promiscuous mode [ 2416.713402][T32117] ldm_validate_partition_table(): Disk read failed. 06:48:44 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xa000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2416.812505][T32142] FAULT_INJECTION: forcing a failure. [ 2416.812505][T32142] name failslab, interval 1, probability 0, space 0, times 0 [ 2416.831635][T32117] Dev loop0: unable to read RDB block 0 [ 2416.855024][T32142] CPU: 1 PID: 32142 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2416.862928][T32142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2416.872979][T32142] Call Trace: [ 2416.876269][T32142] dump_stack+0x1d8/0x2f8 [ 2416.880593][T32142] should_fail+0x608/0x860 [ 2416.884998][T32142] ? setup_fault_attr+0x2b0/0x2b0 [ 2416.890027][T32142] __should_failslab+0x11a/0x160 [ 2416.894952][T32142] should_failslab+0x9/0x20 [ 2416.899438][T32142] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2416.904707][T32142] ? sctp_add_bind_addr+0x8c/0x350 [ 2416.909810][T32142] sctp_add_bind_addr+0x8c/0x350 [ 2416.914732][T32142] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2416.920089][T32142] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2416.925707][T32142] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2416.931764][T32142] sctp_copy_one_addr+0xad/0x610 [ 2416.936691][T32142] sctp_bind_addr_copy+0xc0/0x3c0 [ 2416.941706][T32142] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2416.947937][T32142] __sctp_connect+0x8c9/0x1050 [ 2416.952688][T32142] ? __bfs+0x550/0x550 [ 2416.956758][T32142] ? sctp_v6_destroy_sock+0x20/0x20 [ 2416.961971][T32142] ? kasan_check_write+0x14/0x20 [ 2416.966890][T32142] ? _copy_from_user+0xe0/0x120 [ 2416.971725][T32142] ? security_sctp_bind_connect+0xaa/0xd0 [ 2416.977429][T32142] sctp_setsockopt+0x2bf5/0xf2b0 [ 2416.982354][T32142] ? sctp_shutdown+0x130/0x130 [ 2416.987105][T32142] ? __lock_acquire+0xcf7/0x1a40 [ 2416.992023][T32142] ? __bfs+0x550/0x550 [ 2416.996099][T32142] ? trace_lock_acquire+0x190/0x190 [ 2417.001292][T32142] ? __bfs+0x550/0x550 [ 2417.005345][T32142] ? register_lock_class+0xde/0x1110 [ 2417.010630][T32142] ? __lock_acquire+0xcf7/0x1a40 [ 2417.015562][T32142] ? trace_lock_acquire+0x190/0x190 [ 2417.020740][T32142] ? __might_fault+0xf9/0x160 [ 2417.025402][T32142] ? __bfs+0x550/0x550 [ 2417.029459][T32142] ? kstrtoull+0x3ba/0x4e0 [ 2417.033865][T32142] ? kasan_check_write+0x14/0x20 [ 2417.038783][T32142] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2417.044953][T32142] ? __lock_acquire+0xcf7/0x1a40 [ 2417.049896][T32142] ? trace_lock_acquire+0x190/0x190 [ 2417.055074][T32142] ? trace_lock_acquire+0x190/0x190 [ 2417.060260][T32142] ? __mutex_lock_common+0x56b/0x2fc0 [ 2417.065614][T32142] ? memset+0x31/0x40 [ 2417.069584][T32142] ? fsnotify+0x14b9/0x1580 [ 2417.074079][T32142] ? rcu_lock_release+0xd/0x30 [ 2417.078843][T32142] ? rcu_lock_release+0x26/0x30 [ 2417.083671][T32142] ? __fget+0x4fe/0x540 [ 2417.087820][T32142] ? fget_many+0x30/0x30 [ 2417.092054][T32142] sock_common_setsockopt+0x99/0xb0 [ 2417.097237][T32142] __sys_setsockopt+0x1e2/0x250 [ 2417.102073][T32142] __x64_sys_setsockopt+0xbf/0xd0 [ 2417.107086][T32142] do_syscall_64+0xfe/0x140 [ 2417.111575][T32142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2417.117448][T32142] RIP: 0033:0x4597c9 [ 2417.121339][T32142] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2417.140939][T32142] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x10000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2417.149330][T32142] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2417.157282][T32142] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2417.165236][T32142] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2417.173190][T32142] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2417.181145][T32142] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:44 executing program 5 (fault-call:4 fault-nth:51): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2417.205288][T32117] loop0: unable to read partition table [ 2417.211022][T32117] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2417.269061][T32153] device lo entered promiscuous mode [ 2417.296357][T32153] device lo left promiscuous mode [ 2417.333355][T32161] FAULT_INJECTION: forcing a failure. [ 2417.333355][T32161] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.383834][T32161] CPU: 1 PID: 32161 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2417.392191][T32161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2417.392197][T32161] Call Trace: [ 2417.392217][T32161] dump_stack+0x1d8/0x2f8 [ 2417.392236][T32161] should_fail+0x608/0x860 [ 2417.392252][T32161] ? setup_fault_attr+0x2b0/0x2b0 [ 2417.419290][T32161] __should_failslab+0x11a/0x160 [ 2417.419306][T32161] should_failslab+0x9/0x20 [ 2417.419316][T32161] kmem_cache_alloc_trace+0x5d/0x2c0 06:48:44 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000fdff", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2417.419328][T32161] ? sctp_add_bind_addr+0x8c/0x350 [ 2417.419342][T32161] sctp_add_bind_addr+0x8c/0x350 [ 2417.419356][T32161] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2417.449409][T32161] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2417.455039][T32161] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2417.461111][T32161] sctp_copy_one_addr+0xad/0x610 [ 2417.466047][T32161] sctp_bind_addr_copy+0xc0/0x3c0 [ 2417.466064][T32161] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2417.466079][T32161] __sctp_connect+0x8c9/0x1050 [ 2417.477305][T32161] ? __bfs+0x550/0x550 [ 2417.477342][T32161] ? sctp_v6_destroy_sock+0x20/0x20 [ 2417.491381][T32161] ? kasan_check_write+0x14/0x20 [ 2417.496318][T32161] ? _copy_from_user+0xe0/0x120 [ 2417.496332][T32161] ? security_sctp_bind_connect+0xaa/0xd0 [ 2417.496346][T32161] sctp_setsockopt+0x2bf5/0xf2b0 [ 2417.496365][T32161] ? sctp_shutdown+0x130/0x130 [ 2417.496379][T32161] ? __lock_acquire+0xcf7/0x1a40 [ 2417.506912][T32161] ? __bfs+0x550/0x550 [ 2417.506932][T32161] ? trace_lock_acquire+0x190/0x190 [ 2417.506942][T32161] ? __bfs+0x550/0x550 [ 2417.506953][T32161] ? register_lock_class+0xde/0x1110 [ 2417.506971][T32161] ? __lock_acquire+0xcf7/0x1a40 [ 2417.545086][T32161] ? trace_lock_acquire+0x190/0x190 [ 2417.550289][T32161] ? __might_fault+0xf9/0x160 [ 2417.554971][T32161] ? __bfs+0x550/0x550 [ 2417.559043][T32161] ? kstrtoull+0x3ba/0x4e0 [ 2417.563473][T32161] ? kasan_check_write+0x14/0x20 [ 2417.568399][T32161] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2417.574537][T32161] ? __lock_acquire+0xcf7/0x1a40 [ 2417.579461][T32161] ? trace_lock_acquire+0x190/0x190 [ 2417.584646][T32161] ? trace_lock_acquire+0x190/0x190 [ 2417.589840][T32161] ? __mutex_lock_common+0x56b/0x2fc0 [ 2417.595202][T32161] ? memset+0x31/0x40 [ 2417.599186][T32161] ? fsnotify+0x14b9/0x1580 [ 2417.603671][T32161] ? rcu_lock_release+0xd/0x30 [ 2417.608410][T32161] ? rcu_lock_release+0x26/0x30 [ 2417.613233][T32161] ? __fget+0x4fe/0x540 [ 2417.617364][T32161] ? fget_many+0x30/0x30 [ 2417.621596][T32161] sock_common_setsockopt+0x99/0xb0 [ 2417.626784][T32161] __sys_setsockopt+0x1e2/0x250 [ 2417.631625][T32161] __x64_sys_setsockopt+0xbf/0xd0 [ 2417.636634][T32161] do_syscall_64+0xfe/0x140 [ 2417.641113][T32161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2417.646985][T32161] RIP: 0033:0x4597c9 [ 2417.650855][T32161] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2417.670430][T32161] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2417.678814][T32161] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2417.686757][T32161] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2417.694701][T32161] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2417.702645][T32161] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2417.710592][T32161] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2417.862934][ C0] print_req_error: 602 callbacks suppressed [ 2417.862942][ C0] print_req_error: I/O error, dev loop0, sector 33664 flags 80700 [ 2417.884739][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2417.891905][ C0] buffer_io_error: 594 callbacks suppressed [ 2417.891913][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2417.905697][ C0] print_req_error: I/O error, dev loop0, sector 33664 flags 0 06:48:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfh\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:45 executing program 5 (fault-call:4 fault-nth:52): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:45 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xb000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:45 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2417.913157][ C0] Buffer I/O error on dev loop0, logical block 4208, async page read [ 2417.937718][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2417.944870][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2417.950494][T32186] FAULT_INJECTION: forcing a failure. [ 2417.950494][T32186] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.952739][ C0] print_req_error: I/O error, dev loop0, sector 33784 flags 80700 [ 2417.970523][T32186] CPU: 1 PID: 32186 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2417.980973][T32186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2417.991013][T32186] Call Trace: [ 2417.994295][T32186] dump_stack+0x1d8/0x2f8 [ 2417.998625][T32186] should_fail+0x608/0x860 [ 2418.003038][T32186] ? setup_fault_attr+0x2b0/0x2b0 [ 2418.005871][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2418.008059][T32186] __should_failslab+0x11a/0x160 [ 2418.015138][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2418.020579][T32186] should_failslab+0x9/0x20 [ 2418.020590][T32186] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2418.020602][T32186] ? sctp_add_bind_addr+0x8c/0x350 [ 2418.020616][T32186] sctp_add_bind_addr+0x8c/0x350 [ 2418.028470][ C0] print_req_error: I/O error, dev loop0, sector 33784 flags 0 [ 2418.032899][T32186] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2418.038176][ C0] Buffer I/O error on dev loop0, logical block 4223, async page read [ 2418.043247][T32186] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2418.048565][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2418.055595][T32186] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2418.055618][T32186] sctp_copy_one_addr+0xad/0x610 [ 2418.055635][T32186] sctp_bind_addr_copy+0xc0/0x3c0 [ 2418.060985][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2418.069027][T32186] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2418.069041][T32186] __sctp_connect+0x8c9/0x1050 [ 2418.069055][T32186] ? __bfs+0x550/0x550 [ 2418.075061][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2418.081764][T32186] ? sctp_v6_destroy_sock+0x20/0x20 [ 2418.081800][T32186] ? kasan_check_write+0x14/0x20 [ 2418.087881][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2418.092777][T32186] ? _copy_from_user+0xe0/0x120 [ 2418.098157][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2418.105555][T32186] ? security_sctp_bind_connect+0xaa/0xd0 [ 2418.105571][T32186] sctp_setsockopt+0x2bf5/0xf2b0 [ 2418.105590][T32186] ? sctp_shutdown+0x130/0x130 [ 2418.105606][T32186] ? __lock_acquire+0xcf7/0x1a40 [ 2418.111826][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2418.116561][T32186] ? __bfs+0x550/0x550 [ 2418.116580][T32186] ? trace_lock_acquire+0x190/0x190 [ 2418.116592][T32186] ? __bfs+0x550/0x550 [ 2418.121118][ C0] Buffer I/O error on dev loop0, logical block 1, async page read [ 2418.127722][T32186] ? register_lock_class+0xde/0x1110 06:48:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2418.127736][T32186] ? __lock_acquire+0xcf7/0x1a40 [ 2418.127758][T32186] ? trace_lock_acquire+0x190/0x190 [ 2418.127767][T32186] ? __might_fault+0xf9/0x160 [ 2418.127780][T32186] ? __bfs+0x550/0x550 [ 2418.132998][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2418.137881][T32186] ? kstrtoull+0x3ba/0x4e0 [ 2418.137900][T32186] ? kasan_check_write+0x14/0x20 [ 2418.137910][T32186] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2418.137924][T32186] ? __lock_acquire+0xcf7/0x1a40 [ 2418.147637][T32169] ldm_validate_partition_table(): Disk read failed. [ 2418.150557][T32186] ? trace_lock_acquire+0x190/0x190 [ 2418.150568][T32186] ? trace_lock_acquire+0x190/0x190 [ 2418.150584][T32186] ? __mutex_lock_common+0x56b/0x2fc0 [ 2418.183308][T32169] Dev loop0: unable to read RDB block 0 [ 2418.185746][T32186] ? memset+0x31/0x40 [ 2418.185761][T32186] ? fsnotify+0x14b9/0x1580 [ 2418.185783][T32186] ? rcu_lock_release+0xd/0x30 [ 2418.185805][T32186] ? rcu_lock_release+0x26/0x30 [ 2418.190633][T32169] loop0: unable to read partition table [ 2418.195023][T32186] ? __fget+0x4fe/0x540 [ 2418.195041][T32186] ? fget_many+0x30/0x30 [ 2418.195058][T32186] sock_common_setsockopt+0x99/0xb0 [ 2418.199289][T32169] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2418.206885][T32186] __sys_setsockopt+0x1e2/0x250 [ 2418.206901][T32186] __x64_sys_setsockopt+0xbf/0xd0 [ 2418.206918][T32186] do_syscall_64+0xfe/0x140 [ 2418.206935][T32186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2418.358029][T32186] RIP: 0033:0x4597c9 [ 2418.361897][T32186] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2418.381473][T32186] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2418.389855][T32186] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2418.397804][T32186] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2418.405744][T32186] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 06:48:45 executing program 5 (fault-call:4 fault-nth:53): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2418.413684][T32186] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2418.421624][T32186] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2418.436791][T32187] device lo entered promiscuous mode 06:48:45 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2418.560838][T32198] FAULT_INJECTION: forcing a failure. [ 2418.560838][T32198] name failslab, interval 1, probability 0, space 0, times 0 [ 2418.575891][T32187] device lo left promiscuous mode [ 2418.597837][T32198] CPU: 0 PID: 32198 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2418.605856][T32198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2418.615912][T32198] Call Trace: [ 2418.619213][T32198] dump_stack+0x1d8/0x2f8 [ 2418.623539][T32198] should_fail+0x608/0x860 [ 2418.627936][T32198] ? setup_fault_attr+0x2b0/0x2b0 [ 2418.632956][T32198] __should_failslab+0x11a/0x160 [ 2418.637902][T32198] should_failslab+0x9/0x20 [ 2418.642388][T32198] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2418.647651][T32198] ? sctp_add_bind_addr+0x8c/0x350 [ 2418.652745][T32198] sctp_add_bind_addr+0x8c/0x350 [ 2418.657691][T32198] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2418.663066][T32198] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2418.668700][T32198] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2418.674759][T32198] sctp_copy_one_addr+0xad/0x610 [ 2418.679683][T32198] sctp_bind_addr_copy+0xc0/0x3c0 [ 2418.684699][T32198] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2418.690919][T32198] __sctp_connect+0x8c9/0x1050 [ 2418.695668][T32198] ? __bfs+0x550/0x550 [ 2418.699733][T32198] ? sctp_v6_destroy_sock+0x20/0x20 [ 2418.704911][T32198] ? kasan_check_write+0x14/0x20 [ 2418.709824][T32198] ? _copy_from_user+0xe0/0x120 [ 2418.714649][T32198] ? security_sctp_bind_connect+0xaa/0xd0 [ 2418.720345][T32198] sctp_setsockopt+0x2bf5/0xf2b0 [ 2418.725274][T32198] ? sctp_shutdown+0x130/0x130 [ 2418.730034][T32198] ? __lock_acquire+0xcf7/0x1a40 [ 2418.734943][T32198] ? __bfs+0x550/0x550 [ 2418.739007][T32198] ? trace_lock_acquire+0x190/0x190 [ 2418.744196][T32198] ? __bfs+0x550/0x550 [ 2418.748254][T32198] ? register_lock_class+0xde/0x1110 [ 2418.753514][T32198] ? __lock_acquire+0xcf7/0x1a40 [ 2418.758446][T32198] ? trace_lock_acquire+0x190/0x190 [ 2418.763676][T32198] ? __might_fault+0xf9/0x160 [ 2418.768347][T32198] ? __bfs+0x550/0x550 [ 2418.772393][T32198] ? kstrtoull+0x3ba/0x4e0 [ 2418.776802][T32198] ? kasan_check_write+0x14/0x20 [ 2418.781735][T32198] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2418.787878][T32198] ? __lock_acquire+0xcf7/0x1a40 [ 2418.792799][T32198] ? trace_lock_acquire+0x190/0x190 [ 2418.797988][T32198] ? trace_lock_acquire+0x190/0x190 [ 2418.803183][T32198] ? __mutex_lock_common+0x56b/0x2fc0 [ 2418.808541][T32198] ? memset+0x31/0x40 [ 2418.812503][T32198] ? fsnotify+0x14b9/0x1580 [ 2418.817002][T32198] ? rcu_lock_release+0xd/0x30 [ 2418.821752][T32198] ? rcu_lock_release+0x26/0x30 [ 2418.826610][T32198] ? __fget+0x4fe/0x540 [ 2418.830744][T32198] ? fget_many+0x30/0x30 [ 2418.834967][T32198] sock_common_setsockopt+0x99/0xb0 [ 2418.840144][T32198] __sys_setsockopt+0x1e2/0x250 [ 2418.844971][T32198] __x64_sys_setsockopt+0xbf/0xd0 [ 2418.849973][T32198] do_syscall_64+0xfe/0x140 [ 2418.854455][T32198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2418.860326][T32198] RIP: 0033:0x4597c9 [ 2418.864192][T32198] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2418.883769][T32198] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2418.892160][T32198] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2418.900117][T32198] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 06:48:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2418.908064][T32198] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2418.916018][T32198] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2418.923978][T32198] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2419.032138][T32200] ldm_validate_partition_table(): Disk read failed. [ 2419.065063][T32200] Dev loop0: unable to read RDB block 0 [ 2419.078177][T32200] loop0: unable to read partition table [ 2419.083994][T32200] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:48:46 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:46 executing program 5 (fault-call:4 fault-nth:54): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:46 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xc000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:46 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfi\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2419.249741][T32226] FAULT_INJECTION: forcing a failure. [ 2419.249741][T32226] name failslab, interval 1, probability 0, space 0, times 0 [ 2419.299849][T32226] CPU: 1 PID: 32226 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2419.307764][T32226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2419.317825][T32226] Call Trace: [ 2419.321115][T32226] dump_stack+0x1d8/0x2f8 [ 2419.325441][T32226] should_fail+0x608/0x860 [ 2419.329839][T32226] ? setup_fault_attr+0x2b0/0x2b0 [ 2419.334863][T32226] __should_failslab+0x11a/0x160 [ 2419.339775][T32226] should_failslab+0x9/0x20 [ 2419.344261][T32226] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2419.349520][T32226] ? sctp_add_bind_addr+0x8c/0x350 [ 2419.354618][T32226] sctp_add_bind_addr+0x8c/0x350 [ 2419.359548][T32226] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2419.364899][T32226] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2419.370509][T32226] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2419.376555][T32226] sctp_copy_one_addr+0xad/0x610 [ 2419.381469][T32226] sctp_bind_addr_copy+0xc0/0x3c0 [ 2419.386473][T32226] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2419.392710][T32226] __sctp_connect+0x8c9/0x1050 [ 2419.397465][T32226] ? __bfs+0x550/0x550 [ 2419.401539][T32226] ? sctp_v6_destroy_sock+0x20/0x20 [ 2419.406732][T32226] ? kasan_check_write+0x14/0x20 [ 2419.411643][T32226] ? _copy_from_user+0xe0/0x120 [ 2419.416470][T32226] ? security_sctp_bind_connect+0xaa/0xd0 [ 2419.422164][T32226] sctp_setsockopt+0x2bf5/0xf2b0 [ 2419.427081][T32226] ? sctp_shutdown+0x130/0x130 [ 2419.431821][T32226] ? __lock_acquire+0xcf7/0x1a40 [ 2419.436732][T32226] ? __bfs+0x550/0x550 [ 2419.440777][T32226] ? trace_lock_acquire+0x190/0x190 [ 2419.445954][T32226] ? __bfs+0x550/0x550 [ 2419.450007][T32226] ? register_lock_class+0xde/0x1110 [ 2419.455270][T32226] ? __lock_acquire+0xcf7/0x1a40 [ 2419.460188][T32226] ? trace_lock_acquire+0x190/0x190 [ 2419.465360][T32226] ? __might_fault+0xf9/0x160 [ 2419.470020][T32226] ? __bfs+0x550/0x550 [ 2419.474094][T32226] ? kstrtoull+0x3ba/0x4e0 [ 2419.478504][T32226] ? kasan_check_write+0x14/0x20 [ 2419.483423][T32226] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2419.489564][T32226] ? __lock_acquire+0xcf7/0x1a40 [ 2419.494479][T32226] ? trace_lock_acquire+0x190/0x190 [ 2419.499649][T32226] ? trace_lock_acquire+0x190/0x190 [ 2419.504823][T32226] ? __mutex_lock_common+0x56b/0x2fc0 [ 2419.510175][T32226] ? memset+0x31/0x40 [ 2419.514148][T32226] ? fsnotify+0x14b9/0x1580 [ 2419.518634][T32226] ? rcu_lock_release+0xd/0x30 [ 2419.523375][T32226] ? rcu_lock_release+0x26/0x30 [ 2419.528199][T32226] ? __fget+0x4fe/0x540 [ 2419.532330][T32226] ? fget_many+0x30/0x30 [ 2419.536550][T32226] sock_common_setsockopt+0x99/0xb0 [ 2419.541724][T32226] __sys_setsockopt+0x1e2/0x250 [ 2419.546570][T32226] __x64_sys_setsockopt+0xbf/0xd0 [ 2419.551575][T32226] do_syscall_64+0xfe/0x140 [ 2419.556054][T32226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2419.561921][T32226] RIP: 0033:0x4597c9 [ 2419.565793][T32226] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2419.586195][T32226] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:46 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:47 executing program 5 (fault-call:4 fault-nth:55): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2419.594578][T32226] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2419.602522][T32226] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2419.610467][T32226] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2419.618416][T32226] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2419.626377][T32226] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2419.641375][T32233] device lo entered promiscuous mode [ 2419.740036][T32242] FAULT_INJECTION: forcing a failure. [ 2419.740036][T32242] name failslab, interval 1, probability 0, space 0, times 0 [ 2419.754584][T32232] ldm_validate_partition_table(): Disk read failed. [ 2419.771891][T32242] CPU: 1 PID: 32242 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2419.779810][T32242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2419.787991][T32232] Dev loop0: unable to read RDB block 0 [ 2419.789862][T32242] Call Trace: [ 2419.789882][T32242] dump_stack+0x1d8/0x2f8 [ 2419.789901][T32242] should_fail+0x608/0x860 [ 2419.789917][T32242] ? setup_fault_attr+0x2b0/0x2b0 [ 2419.812436][T32242] __should_failslab+0x11a/0x160 [ 2419.817362][T32242] should_failslab+0x9/0x20 [ 2419.821850][T32242] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2419.827123][T32242] ? sctp_add_bind_addr+0x8c/0x350 [ 2419.832234][T32242] sctp_add_bind_addr+0x8c/0x350 [ 2419.837155][T32242] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2419.842514][T32242] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2419.848136][T32242] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2419.854200][T32242] sctp_copy_one_addr+0xad/0x610 [ 2419.859125][T32242] sctp_bind_addr_copy+0xc0/0x3c0 [ 2419.864140][T32242] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2419.870367][T32242] __sctp_connect+0x8c9/0x1050 [ 2419.875113][T32242] ? __bfs+0x550/0x550 [ 2419.879182][T32242] ? sctp_v6_destroy_sock+0x20/0x20 [ 2419.884375][T32242] ? kasan_check_write+0x14/0x20 [ 2419.889299][T32242] ? _copy_from_user+0xe0/0x120 [ 2419.894137][T32242] ? security_sctp_bind_connect+0xaa/0xd0 [ 2419.899843][T32242] sctp_setsockopt+0x2bf5/0xf2b0 [ 2419.904770][T32242] ? sctp_shutdown+0x130/0x130 [ 2419.909523][T32242] ? __lock_acquire+0xcf7/0x1a40 [ 2419.914441][T32242] ? __bfs+0x550/0x550 [ 2419.918503][T32242] ? trace_lock_acquire+0x190/0x190 [ 2419.923686][T32242] ? __bfs+0x550/0x550 [ 2419.927742][T32242] ? register_lock_class+0xde/0x1110 [ 2419.933017][T32242] ? __lock_acquire+0xcf7/0x1a40 [ 2419.937977][T32242] ? trace_lock_acquire+0x190/0x190 [ 2419.943161][T32242] ? __might_fault+0xf9/0x160 [ 2419.947824][T32242] ? __bfs+0x550/0x550 [ 2419.951877][T32242] ? kstrtoull+0x3ba/0x4e0 [ 2419.956285][T32242] ? kasan_check_write+0x14/0x20 [ 2419.961208][T32242] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2419.967358][T32242] ? __lock_acquire+0xcf7/0x1a40 [ 2419.972290][T32242] ? trace_lock_acquire+0x190/0x190 [ 2419.977476][T32242] ? trace_lock_acquire+0x190/0x190 [ 2419.982661][T32242] ? __mutex_lock_common+0x56b/0x2fc0 [ 2419.988017][T32242] ? memset+0x31/0x40 [ 2419.991984][T32242] ? fsnotify+0x14b9/0x1580 [ 2419.996484][T32242] ? rcu_lock_release+0xd/0x30 [ 2420.001234][T32242] ? rcu_lock_release+0x26/0x30 [ 2420.006068][T32242] ? __fget+0x4fe/0x540 [ 2420.010214][T32242] ? fget_many+0x30/0x30 [ 2420.014460][T32242] sock_common_setsockopt+0x99/0xb0 [ 2420.019651][T32242] __sys_setsockopt+0x1e2/0x250 [ 2420.024489][T32242] __x64_sys_setsockopt+0xbf/0xd0 [ 2420.029507][T32242] do_syscall_64+0xfe/0x140 [ 2420.034003][T32242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2420.039878][T32242] RIP: 0033:0x4597c9 [ 2420.043760][T32242] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2420.063354][T32242] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2420.071750][T32242] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2420.079704][T32242] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2420.087656][T32242] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2420.095608][T32242] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2420.103565][T32242] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2420.129873][T32232] loop0: unable to read partition table 06:48:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="100000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:47 executing program 5 (fault-call:4 fault-nth:56): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2420.167657][T32232] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2420.188002][T32233] device lo left promiscuous mode 06:48:47 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:47 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xd000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfl\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2420.325782][T32260] FAULT_INJECTION: forcing a failure. [ 2420.325782][T32260] name failslab, interval 1, probability 0, space 0, times 0 06:48:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c00000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2420.415349][T32260] CPU: 0 PID: 32260 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2420.423268][T32260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2420.423274][T32260] Call Trace: [ 2420.423299][T32260] dump_stack+0x1d8/0x2f8 [ 2420.423318][T32260] should_fail+0x608/0x860 [ 2420.445347][T32260] ? setup_fault_attr+0x2b0/0x2b0 [ 2420.450366][T32260] __should_failslab+0x11a/0x160 [ 2420.455302][T32260] should_failslab+0x9/0x20 [ 2420.459789][T32260] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2420.465061][T32260] ? sctp_add_bind_addr+0x8c/0x350 [ 2420.470163][T32260] sctp_add_bind_addr+0x8c/0x350 [ 2420.475101][T32260] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2420.480465][T32260] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2420.486088][T32260] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2420.492150][T32260] sctp_copy_one_addr+0xad/0x610 [ 2420.497093][T32260] sctp_bind_addr_copy+0xc0/0x3c0 [ 2420.502105][T32260] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2420.508332][T32260] __sctp_connect+0x8c9/0x1050 [ 2420.513080][T32260] ? __bfs+0x550/0x550 [ 2420.517144][T32260] ? sctp_v6_destroy_sock+0x20/0x20 [ 2420.522336][T32260] ? kasan_check_write+0x14/0x20 [ 2420.527256][T32260] ? _copy_from_user+0xe0/0x120 [ 2420.532103][T32260] ? security_sctp_bind_connect+0xaa/0xd0 [ 2420.537809][T32260] sctp_setsockopt+0x2bf5/0xf2b0 [ 2420.542735][T32260] ? sctp_shutdown+0x130/0x130 [ 2420.547484][T32260] ? __lock_acquire+0xcf7/0x1a40 [ 2420.552417][T32260] ? __bfs+0x550/0x550 [ 2420.556481][T32260] ? trace_lock_acquire+0x190/0x190 [ 2420.561662][T32260] ? __bfs+0x550/0x550 [ 2420.565713][T32260] ? register_lock_class+0xde/0x1110 [ 2420.570986][T32260] ? __lock_acquire+0xcf7/0x1a40 [ 2420.575920][T32260] ? trace_lock_acquire+0x190/0x190 [ 2420.581100][T32260] ? __might_fault+0xf9/0x160 [ 2420.585763][T32260] ? __bfs+0x550/0x550 [ 2420.589818][T32260] ? kstrtoull+0x3ba/0x4e0 [ 2420.594228][T32260] ? kasan_check_write+0x14/0x20 [ 2420.599150][T32260] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2420.605293][T32260] ? __lock_acquire+0xcf7/0x1a40 [ 2420.610223][T32260] ? trace_lock_acquire+0x190/0x190 [ 2420.615403][T32260] ? trace_lock_acquire+0x190/0x190 [ 2420.620584][T32260] ? __mutex_lock_common+0x56b/0x2fc0 [ 2420.625943][T32260] ? memset+0x31/0x40 [ 2420.629909][T32260] ? fsnotify+0x14b9/0x1580 [ 2420.634422][T32260] ? rcu_lock_release+0xd/0x30 [ 2420.639175][T32260] ? rcu_lock_release+0x26/0x30 [ 2420.644006][T32260] ? __fget+0x4fe/0x540 [ 2420.648151][T32260] ? fget_many+0x30/0x30 [ 2420.652386][T32260] sock_common_setsockopt+0x99/0xb0 [ 2420.657580][T32260] __sys_setsockopt+0x1e2/0x250 [ 2420.662420][T32260] __x64_sys_setsockopt+0xbf/0xd0 [ 2420.667435][T32260] do_syscall_64+0xfe/0x140 [ 2420.671927][T32260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2420.677803][T32260] RIP: 0033:0x4597c9 [ 2420.681683][T32260] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2420.701269][T32260] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2420.709665][T32260] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2420.717620][T32260] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2420.725572][T32260] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2420.733528][T32260] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2420.741482][T32260] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2420.757092][T32277] device lo entered promiscuous mode 06:48:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="c00e00000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:48 executing program 5 (fault-call:4 fault-nth:57): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2420.836770][T32270] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:48:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="e03f03000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2420.891637][T32277] device lo left promiscuous mode 06:48:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2420.917039][T32268] device lo entered promiscuous mode [ 2420.941460][T32292] FAULT_INJECTION: forcing a failure. [ 2420.941460][T32292] name failslab, interval 1, probability 0, space 0, times 0 [ 2420.954226][T32292] CPU: 1 PID: 32292 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2420.962096][T32292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2420.972171][T32292] Call Trace: [ 2420.975446][T32292] dump_stack+0x1d8/0x2f8 [ 2420.979762][T32292] should_fail+0x608/0x860 [ 2420.984166][T32292] ? setup_fault_attr+0x2b0/0x2b0 [ 2420.989183][T32292] __should_failslab+0x11a/0x160 [ 2420.994103][T32292] should_failslab+0x9/0x20 [ 2420.998597][T32292] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2421.003860][T32292] ? sctp_add_bind_addr+0x8c/0x350 [ 2421.009053][T32292] sctp_add_bind_addr+0x8c/0x350 [ 2421.013978][T32292] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2421.019341][T32292] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2421.024969][T32292] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2421.031026][T32292] sctp_copy_one_addr+0xad/0x610 [ 2421.035948][T32292] sctp_bind_addr_copy+0xc0/0x3c0 [ 2421.040949][T32292] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2421.047164][T32292] __sctp_connect+0x8c9/0x1050 [ 2421.051909][T32292] ? __bfs+0x550/0x550 [ 2421.055971][T32292] ? sctp_v6_destroy_sock+0x20/0x20 [ 2421.061148][T32292] ? kasan_check_write+0x14/0x20 [ 2421.066060][T32292] ? _copy_from_user+0xe0/0x120 [ 2421.070900][T32292] ? security_sctp_bind_connect+0xaa/0xd0 [ 2421.076610][T32292] sctp_setsockopt+0x2bf5/0xf2b0 [ 2421.081538][T32292] ? sctp_shutdown+0x130/0x130 [ 2421.086277][T32292] ? __lock_acquire+0xcf7/0x1a40 [ 2421.091190][T32292] ? __bfs+0x550/0x550 [ 2421.095253][T32292] ? trace_lock_acquire+0x190/0x190 [ 2421.100441][T32292] ? __bfs+0x550/0x550 [ 2421.104484][T32292] ? register_lock_class+0xde/0x1110 [ 2421.109746][T32292] ? __lock_acquire+0xcf7/0x1a40 [ 2421.114666][T32292] ? trace_lock_acquire+0x190/0x190 [ 2421.119836][T32292] ? __might_fault+0xf9/0x160 [ 2421.124488][T32292] ? __bfs+0x550/0x550 [ 2421.128539][T32292] ? kstrtoull+0x3ba/0x4e0 [ 2421.132956][T32292] ? kasan_check_write+0x14/0x20 [ 2421.137883][T32292] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2421.144010][T32292] ? __lock_acquire+0xcf7/0x1a40 [ 2421.148931][T32292] ? trace_lock_acquire+0x190/0x190 [ 2421.154112][T32292] ? trace_lock_acquire+0x190/0x190 [ 2421.159299][T32292] ? __mutex_lock_common+0x56b/0x2fc0 [ 2421.164658][T32292] ? memset+0x31/0x40 [ 2421.168616][T32292] ? fsnotify+0x14b9/0x1580 [ 2421.173106][T32292] ? rcu_lock_release+0xd/0x30 [ 2421.177845][T32292] ? rcu_lock_release+0x26/0x30 [ 2421.182688][T32292] ? __fget+0x4fe/0x540 [ 2421.186824][T32292] ? fget_many+0x30/0x30 [ 2421.191046][T32292] sock_common_setsockopt+0x99/0xb0 [ 2421.196220][T32292] __sys_setsockopt+0x1e2/0x250 [ 2421.201047][T32292] __x64_sys_setsockopt+0xbf/0xd0 [ 2421.206050][T32292] do_syscall_64+0xfe/0x140 [ 2421.210540][T32292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2421.216405][T32292] RIP: 0033:0x4597c9 [ 2421.220277][T32292] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:48:48 executing program 5 (fault-call:4 fault-nth:58): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2421.239857][T32292] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2421.248237][T32292] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2421.256182][T32292] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2421.264371][T32292] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2421.272326][T32292] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2421.280278][T32292] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:48 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000ffff", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfo\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:48 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xe000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d40300200301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2421.455018][T32305] FAULT_INJECTION: forcing a failure. [ 2421.455018][T32305] name failslab, interval 1, probability 0, space 0, times 0 06:48:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="00f0ff7f0301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2421.545939][T32305] CPU: 1 PID: 32305 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2421.553855][T32305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2421.563899][T32305] Call Trace: [ 2421.567171][T32305] dump_stack+0x1d8/0x2f8 [ 2421.571491][T32305] should_fail+0x608/0x860 [ 2421.575911][T32305] ? setup_fault_attr+0x2b0/0x2b0 [ 2421.580932][T32305] __should_failslab+0x11a/0x160 [ 2421.585859][T32305] should_failslab+0x9/0x20 [ 2421.590364][T32305] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2421.595653][T32305] ? sctp_add_bind_addr+0x8c/0x350 [ 2421.600775][T32305] sctp_add_bind_addr+0x8c/0x350 [ 2421.605698][T32305] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2421.611058][T32305] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2421.616667][T32305] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2421.622711][T32305] sctp_copy_one_addr+0xad/0x610 [ 2421.627630][T32305] sctp_bind_addr_copy+0xc0/0x3c0 [ 2421.632671][T32305] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2421.638906][T32305] __sctp_connect+0x8c9/0x1050 [ 2421.643666][T32305] ? __bfs+0x550/0x550 [ 2421.647731][T32305] ? sctp_v6_destroy_sock+0x20/0x20 [ 2421.652925][T32305] ? kasan_check_write+0x14/0x20 [ 2421.657838][T32305] ? _copy_from_user+0xe0/0x120 [ 2421.662675][T32305] ? security_sctp_bind_connect+0xaa/0xd0 [ 2421.668387][T32305] sctp_setsockopt+0x2bf5/0xf2b0 [ 2421.673303][T32305] ? sctp_shutdown+0x130/0x130 [ 2421.678043][T32305] ? __lock_acquire+0xcf7/0x1a40 [ 2421.682955][T32305] ? __bfs+0x550/0x550 [ 2421.687002][T32305] ? trace_lock_acquire+0x190/0x190 [ 2421.692261][T32305] ? __bfs+0x550/0x550 [ 2421.696308][T32305] ? register_lock_class+0xde/0x1110 [ 2421.701586][T32305] ? __lock_acquire+0xcf7/0x1a40 [ 2421.706504][T32305] ? trace_lock_acquire+0x190/0x190 [ 2421.711700][T32305] ? __might_fault+0xf9/0x160 [ 2421.716364][T32305] ? __bfs+0x550/0x550 [ 2421.720422][T32305] ? kstrtoull+0x3ba/0x4e0 [ 2421.724816][T32305] ? kasan_check_write+0x14/0x20 [ 2421.729725][T32305] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2421.735855][T32305] ? __lock_acquire+0xcf7/0x1a40 [ 2421.740771][T32305] ? trace_lock_acquire+0x190/0x190 [ 2421.745948][T32305] ? trace_lock_acquire+0x190/0x190 [ 2421.751122][T32305] ? __mutex_lock_common+0x56b/0x2fc0 [ 2421.756465][T32305] ? memset+0x31/0x40 [ 2421.760431][T32305] ? fsnotify+0x14b9/0x1580 [ 2421.764931][T32305] ? rcu_lock_release+0xd/0x30 [ 2421.769679][T32305] ? rcu_lock_release+0x26/0x30 [ 2421.774503][T32305] ? __fget+0x4fe/0x540 [ 2421.778637][T32305] ? fget_many+0x30/0x30 [ 2421.782882][T32305] sock_common_setsockopt+0x99/0xb0 [ 2421.788071][T32305] __sys_setsockopt+0x1e2/0x250 [ 2421.792902][T32305] __x64_sys_setsockopt+0xbf/0xd0 [ 2421.797909][T32305] do_syscall_64+0xfe/0x140 [ 2421.802395][T32305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2421.808261][T32305] RIP: 0033:0x4597c9 [ 2421.812142][T32305] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2421.831734][T32305] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:49 executing program 5 (fault-call:4 fault-nth:59): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2421.840119][T32305] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2421.848097][T32305] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2421.856053][T32305] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2421.864014][T32305] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2421.871960][T32305] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2421.881092][T32320] device lo left promiscuous mode [ 2421.889575][T32323] device lo entered promiscuous mode [ 2421.928296][T32312] ldm_validate_partition_table(): Disk read failed. [ 2421.937367][T32320] device lo left promiscuous mode 06:48:49 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2421.970720][T32312] Dev loop0: unable to read RDB block 0 [ 2421.986413][T32313] device lo entered promiscuous mode [ 2422.002805][T32312] loop0: unable to read partition table [ 2422.012344][T32312] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2422.017264][T32333] FAULT_INJECTION: forcing a failure. [ 2422.017264][T32333] name failslab, interval 1, probability 0, space 0, times 0 [ 2422.036220][T32333] CPU: 0 PID: 32333 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2422.044102][T32333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2422.054133][T32333] Call Trace: [ 2422.054151][T32333] dump_stack+0x1d8/0x2f8 [ 2422.054168][T32333] should_fail+0x608/0x860 [ 2422.054181][T32333] ? setup_fault_attr+0x2b0/0x2b0 [ 2422.054200][T32333] __should_failslab+0x11a/0x160 [ 2422.061783][T32333] should_failslab+0x9/0x20 [ 2422.061793][T32333] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2422.061806][T32333] ? sctp_add_bind_addr+0x8c/0x350 [ 2422.061821][T32333] sctp_add_bind_addr+0x8c/0x350 [ 2422.061832][T32333] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2422.061848][T32333] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2422.061864][T32333] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2422.112989][T32333] sctp_copy_one_addr+0xad/0x610 [ 2422.117931][T32333] sctp_bind_addr_copy+0xc0/0x3c0 [ 2422.122966][T32333] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2422.129210][T32333] __sctp_connect+0x8c9/0x1050 [ 2422.133977][T32333] ? __bfs+0x550/0x550 [ 2422.138057][T32333] ? sctp_v6_destroy_sock+0x20/0x20 [ 2422.143265][T32333] ? kasan_check_write+0x14/0x20 [ 2422.148206][T32333] ? _copy_from_user+0xe0/0x120 [ 2422.153055][T32333] ? security_sctp_bind_connect+0xaa/0xd0 [ 2422.158780][T32333] sctp_setsockopt+0x2bf5/0xf2b0 [ 2422.163720][T32333] ? sctp_shutdown+0x130/0x130 [ 2422.168491][T32333] ? __lock_acquire+0xcf7/0x1a40 [ 2422.168501][T32333] ? __bfs+0x550/0x550 [ 2422.168521][T32333] ? trace_lock_acquire+0x190/0x190 [ 2422.168531][T32333] ? __bfs+0x550/0x550 [ 2422.168542][T32333] ? register_lock_class+0xde/0x1110 [ 2422.168555][T32333] ? __lock_acquire+0xcf7/0x1a40 [ 2422.168586][T32333] ? trace_lock_acquire+0x190/0x190 [ 2422.202123][T32333] ? __might_fault+0xf9/0x160 [ 2422.206787][T32333] ? __bfs+0x550/0x550 [ 2422.210844][T32333] ? kstrtoull+0x3ba/0x4e0 [ 2422.215327][T32333] ? kasan_check_write+0x14/0x20 [ 2422.220263][T32333] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2422.226426][T32333] ? __lock_acquire+0xcf7/0x1a40 [ 2422.231355][T32333] ? trace_lock_acquire+0x190/0x190 [ 2422.236539][T32333] ? trace_lock_acquire+0x190/0x190 [ 2422.241720][T32333] ? __mutex_lock_common+0x56b/0x2fc0 [ 2422.247078][T32333] ? memset+0x31/0x40 [ 2422.251047][T32333] ? fsnotify+0x14b9/0x1580 [ 2422.255603][T32333] ? rcu_lock_release+0xd/0x30 [ 2422.260353][T32333] ? rcu_lock_release+0x26/0x30 [ 2422.265187][T32333] ? __fget+0x4fe/0x540 [ 2422.269336][T32333] ? fget_many+0x30/0x30 [ 2422.273569][T32333] sock_common_setsockopt+0x99/0xb0 [ 2422.278757][T32333] __sys_setsockopt+0x1e2/0x250 [ 2422.283591][T32333] __x64_sys_setsockopt+0xbf/0xd0 [ 2422.288602][T32333] do_syscall_64+0xfe/0x140 [ 2422.293091][T32333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2422.298982][T32333] RIP: 0033:0x4597c9 [ 2422.302864][T32333] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:48:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000101ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfp\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2422.322456][T32333] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2422.330851][T32333] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2422.338806][T32333] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2422.348496][T32333] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2422.356462][T32333] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2422.364432][T32333] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:49 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xf000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2422.514473][T32344] ldm_validate_partition_table(): Disk read failed. [ 2422.564454][T32344] Dev loop0: unable to read RDB block 0 [ 2422.580024][T32344] loop0: unable to read partition table [ 2422.596141][T32354] device lo left promiscuous mode [ 2422.611304][T32344] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2422.615927][T32354] device lo entered promiscuous mode 06:48:50 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:50 executing program 5 (fault-call:4 fault-nth:60): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:50 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000201ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2422.687629][T32362] device lo left promiscuous mode 06:48:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrft\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2422.741795][T32368] FAULT_INJECTION: forcing a failure. [ 2422.741795][T32368] name failslab, interval 1, probability 0, space 0, times 0 06:48:50 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x5800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2422.813503][T32368] CPU: 0 PID: 32368 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2422.821429][T32368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2422.831490][T32368] Call Trace: [ 2422.834792][T32368] dump_stack+0x1d8/0x2f8 [ 2422.839158][T32368] should_fail+0x608/0x860 [ 2422.843575][T32368] ? setup_fault_attr+0x2b0/0x2b0 [ 2422.848604][T32368] __should_failslab+0x11a/0x160 [ 2422.853532][T32368] should_failslab+0x9/0x20 [ 2422.858009][T32368] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2422.863269][T32368] ? sctp_add_bind_addr+0x8c/0x350 [ 2422.868361][T32368] sctp_add_bind_addr+0x8c/0x350 [ 2422.873273][T32368] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2422.878654][T32368] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2422.884263][T32368] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2422.890329][T32368] sctp_copy_one_addr+0xad/0x610 [ 2422.895267][T32368] sctp_bind_addr_copy+0xc0/0x3c0 [ 2422.900294][T32368] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2422.906511][T32368] __sctp_connect+0x8c9/0x1050 [ 2422.911252][T32368] ? __bfs+0x550/0x550 [ 2422.915328][T32368] ? sctp_v6_destroy_sock+0x20/0x20 [ 2422.920535][T32368] ? kasan_check_write+0x14/0x20 [ 2422.925462][T32368] ? _copy_from_user+0xe0/0x120 [ 2422.930293][T32368] ? security_sctp_bind_connect+0xaa/0xd0 [ 2422.935990][T32368] sctp_setsockopt+0x2bf5/0xf2b0 [ 2422.940907][T32368] ? sctp_shutdown+0x130/0x130 [ 2422.945656][T32368] ? __lock_acquire+0xcf7/0x1a40 [ 2422.950596][T32368] ? __bfs+0x550/0x550 [ 2422.954644][T32368] ? trace_lock_acquire+0x190/0x190 [ 2422.959826][T32368] ? __bfs+0x550/0x550 [ 2422.963882][T32368] ? register_lock_class+0xde/0x1110 [ 2422.969141][T32368] ? __lock_acquire+0xcf7/0x1a40 [ 2422.974060][T32368] ? trace_lock_acquire+0x190/0x190 [ 2422.979231][T32368] ? __might_fault+0xf9/0x160 [ 2422.983884][T32368] ? __bfs+0x550/0x550 [ 2422.987932][T32368] ? kstrtoull+0x3ba/0x4e0 [ 2422.992328][T32368] ? kasan_check_write+0x14/0x20 [ 2422.997240][T32368] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2423.003371][T32368] ? __lock_acquire+0xcf7/0x1a40 [ 2423.008293][T32368] ? trace_lock_acquire+0x190/0x190 [ 2423.013464][T32368] ? trace_lock_acquire+0x190/0x190 [ 2423.018649][T32368] ? __mutex_lock_common+0x56b/0x2fc0 [ 2423.024024][T32368] ? memset+0x31/0x40 [ 2423.027982][T32368] ? fsnotify+0x14b9/0x1580 [ 2423.032468][T32368] ? rcu_lock_release+0xd/0x30 [ 2423.037208][T32368] ? rcu_lock_release+0x26/0x30 [ 2423.042043][T32368] ? __fget+0x4fe/0x540 [ 2423.046193][T32368] ? fget_many+0x30/0x30 [ 2423.050432][T32368] sock_common_setsockopt+0x99/0xb0 [ 2423.055609][T32368] __sys_setsockopt+0x1e2/0x250 [ 2423.060434][T32368] __x64_sys_setsockopt+0xbf/0xd0 [ 2423.065450][T32368] do_syscall_64+0xfe/0x140 [ 2423.069960][T32368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2423.075842][T32368] RIP: 0033:0x4597c9 [ 2423.079711][T32368] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2423.099330][T32368] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:50 executing program 5 (fault-call:4 fault-nth:61): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2423.107724][T32368] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2423.115679][T32368] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2423.123626][T32368] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2423.131572][T32368] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2423.139516][T32368] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:50 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x10000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140200000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:50 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x6600000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2423.281091][ C1] print_req_error: 755 callbacks suppressed [ 2423.281099][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 80700 [ 2423.329370][T32389] FAULT_INJECTION: forcing a failure. [ 2423.329370][T32389] name failslab, interval 1, probability 0, space 0, times 0 [ 2423.331839][T32395] device lo entered promiscuous mode [ 2423.352632][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 0 [ 2423.360159][ C1] buffer_io_error: 745 callbacks suppressed [ 2423.360168][ C1] Buffer I/O error on dev loop0, logical block 4208, async page read 06:48:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140300000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2423.374230][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2423.378759][T32389] CPU: 0 PID: 32389 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2423.381401][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2423.389205][T32389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2423.389210][T32389] Call Trace: [ 2423.389228][T32389] dump_stack+0x1d8/0x2f8 [ 2423.389246][T32389] should_fail+0x608/0x860 [ 2423.405684][ C1] print_req_error: I/O error, dev loop0, sector 33784 flags 80700 [ 2423.407544][T32389] ? setup_fault_attr+0x2b0/0x2b0 [ 2423.407567][T32389] __should_failslab+0x11a/0x160 [ 2423.407582][T32389] should_failslab+0x9/0x20 [ 2423.413952][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2423.415160][T32389] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2423.415174][T32389] ? sctp_add_bind_addr+0x8c/0x350 [ 2423.415189][T32389] sctp_add_bind_addr+0x8c/0x350 [ 2423.415200][T32389] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2423.415218][T32389] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2423.419651][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2423.427398][T32389] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2423.427421][T32389] sctp_copy_one_addr+0xad/0x610 [ 2423.427440][T32389] sctp_bind_addr_copy+0xc0/0x3c0 [ 2423.433301][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2423.437367][T32389] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2423.437383][T32389] __sctp_connect+0x8c9/0x1050 [ 2423.437395][T32389] ? __bfs+0x550/0x550 [ 2423.437419][T32389] ? sctp_v6_destroy_sock+0x20/0x20 [ 2423.437441][T32389] ? kasan_check_write+0x14/0x20 [ 2423.441923][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2423.449006][T32389] ? _copy_from_user+0xe0/0x120 [ 2423.449019][T32389] ? security_sctp_bind_connect+0xaa/0xd0 [ 2423.449034][T32389] sctp_setsockopt+0x2bf5/0xf2b0 [ 2423.449054][T32389] ? sctp_shutdown+0x130/0x130 [ 2423.461147][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2423.464318][T32389] ? __lock_acquire+0xcf7/0x1a40 [ 2423.464328][T32389] ? __bfs+0x550/0x550 06:48:50 executing program 5 (fault-call:4 fault-nth:62): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2423.464350][T32389] ? trace_lock_acquire+0x190/0x190 [ 2423.464359][T32389] ? __bfs+0x550/0x550 [ 2423.464372][T32389] ? register_lock_class+0xde/0x1110 [ 2423.469756][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2423.475337][T32389] ? __lock_acquire+0xcf7/0x1a40 [ 2423.475360][T32389] ? trace_lock_acquire+0x190/0x190 [ 2423.475370][T32389] ? __might_fault+0xf9/0x160 [ 2423.475383][T32389] ? __bfs+0x550/0x550 [ 2423.483678][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2423.489208][T32389] ? kstrtoull+0x3ba/0x4e0 [ 2423.489229][T32389] ? kasan_check_write+0x14/0x20 [ 2423.489240][T32389] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2423.489256][T32389] ? __lock_acquire+0xcf7/0x1a40 [ 2423.489278][T32389] ? trace_lock_acquire+0x190/0x190 [ 2423.494194][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2423.499203][T32389] ? trace_lock_acquire+0x190/0x190 [ 2423.499217][T32389] ? __mutex_lock_common+0x56b/0x2fc0 [ 2423.499229][T32389] ? memset+0x31/0x40 [ 2423.499242][T32389] ? fsnotify+0x14b9/0x1580 [ 2423.499264][T32389] ? rcu_lock_release+0xd/0x30 [ 2423.511735][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2423.512562][T32389] ? rcu_lock_release+0x26/0x30 [ 2423.512573][T32389] ? __fget+0x4fe/0x540 [ 2423.512591][T32389] ? fget_many+0x30/0x30 [ 2423.512609][T32389] sock_common_setsockopt+0x99/0xb0 [ 2423.517385][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2423.521404][T32389] __sys_setsockopt+0x1e2/0x250 [ 2423.529184][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2423.531500][T32389] __x64_sys_setsockopt+0xbf/0xd0 [ 2423.531547][T32389] do_syscall_64+0xfe/0x140 [ 2423.531588][T32389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2423.531602][T32389] RIP: 0033:0x4597c9 [ 2423.539411][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2423.544211][T32389] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2423.555120][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2423.559550][T32389] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2423.559562][T32389] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2423.559568][T32389] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2423.559574][T32389] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2423.559580][T32389] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2423.559587][T32389] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2423.563979][ C0] Buffer I/O error on dev loop0, logical block 4223, async page read [ 2423.566832][T32375] ldm_validate_partition_table(): Disk read failed. [ 2423.844686][T32375] Dev loop0: unable to read RDB block 0 [ 2423.867914][T32395] device lo left promiscuous mode [ 2423.891182][T32398] FAULT_INJECTION: forcing a failure. [ 2423.891182][T32398] name failslab, interval 1, probability 0, space 0, times 0 [ 2423.912025][T32398] CPU: 0 PID: 32398 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2423.919919][T32398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2423.919926][T32398] Call Trace: [ 2423.919945][T32398] dump_stack+0x1d8/0x2f8 [ 2423.919965][T32398] should_fail+0x608/0x860 [ 2423.919985][T32398] ? setup_fault_attr+0x2b0/0x2b0 [ 2423.937627][T32398] __should_failslab+0x11a/0x160 [ 2423.937642][T32398] should_failslab+0x9/0x20 [ 2423.937652][T32398] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2423.937664][T32398] ? sctp_add_bind_addr+0x8c/0x350 [ 2423.937680][T32398] sctp_add_bind_addr+0x8c/0x350 [ 2423.971599][T32375] loop0: unable to read partition table [ 2423.971817][T32398] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2423.982784][T32398] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2423.988420][T32398] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2423.994490][T32398] sctp_copy_one_addr+0xad/0x610 [ 2423.995676][T32375] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2423.999419][T32398] sctp_bind_addr_copy+0xc0/0x3c0 [ 2424.014680][T32398] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2424.020907][T32398] __sctp_connect+0x8c9/0x1050 [ 2424.025658][T32398] ? __bfs+0x550/0x550 [ 2424.029729][T32398] ? sctp_v6_destroy_sock+0x20/0x20 [ 2424.034916][T32398] ? kasan_check_write+0x14/0x20 [ 2424.039826][T32398] ? _copy_from_user+0xe0/0x120 [ 2424.044649][T32398] ? security_sctp_bind_connect+0xaa/0xd0 [ 2424.050343][T32398] sctp_setsockopt+0x2bf5/0xf2b0 [ 2424.055269][T32398] ? sctp_shutdown+0x130/0x130 [ 2424.060016][T32398] ? __lock_acquire+0xcf7/0x1a40 [ 2424.064922][T32398] ? __bfs+0x550/0x550 [ 2424.068980][T32398] ? trace_lock_acquire+0x190/0x190 [ 2424.074160][T32398] ? __bfs+0x550/0x550 [ 2424.078220][T32398] ? register_lock_class+0xde/0x1110 [ 2424.083476][T32398] ? __lock_acquire+0xcf7/0x1a40 [ 2424.088406][T32398] ? trace_lock_acquire+0x190/0x190 [ 2424.093583][T32398] ? __might_fault+0xf9/0x160 [ 2424.098245][T32398] ? __bfs+0x550/0x550 [ 2424.102307][T32398] ? kstrtoull+0x3ba/0x4e0 [ 2424.106714][T32398] ? kasan_check_write+0x14/0x20 [ 2424.111635][T32398] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2424.117760][T32398] ? __lock_acquire+0xcf7/0x1a40 [ 2424.122670][T32398] ? trace_lock_acquire+0x190/0x190 [ 2424.127849][T32398] ? trace_lock_acquire+0x190/0x190 [ 2424.133029][T32398] ? __mutex_lock_common+0x56b/0x2fc0 [ 2424.138371][T32398] ? memset+0x31/0x40 [ 2424.142331][T32398] ? fsnotify+0x14b9/0x1580 [ 2424.146834][T32398] ? rcu_lock_release+0xd/0x30 [ 2424.151586][T32398] ? rcu_lock_release+0x26/0x30 [ 2424.156409][T32398] ? __fget+0x4fe/0x540 [ 2424.160536][T32398] ? fget_many+0x30/0x30 [ 2424.164765][T32398] sock_common_setsockopt+0x99/0xb0 [ 2424.169936][T32398] __sys_setsockopt+0x1e2/0x250 [ 2424.174759][T32398] __x64_sys_setsockopt+0xbf/0xd0 [ 2424.179760][T32398] do_syscall_64+0xfe/0x140 [ 2424.184235][T32398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2424.190097][T32398] RIP: 0033:0x4597c9 [ 2424.193962][T32398] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2424.214238][T32398] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2424.222621][T32398] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2424.230573][T32398] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2424.238553][T32398] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2424.246503][T32398] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2424.254459][T32398] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:51 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140003000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:51 executing program 5 (fault-call:4 fault-nth:63): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfu\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:51 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x11000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:51 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2424.448926][T32416] FAULT_INJECTION: forcing a failure. [ 2424.448926][T32416] name failslab, interval 1, probability 0, space 0, times 0 06:48:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14c00e000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:51 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2424.521726][T32416] CPU: 0 PID: 32416 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2424.529643][T32416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2424.539698][T32416] Call Trace: [ 2424.542996][T32416] dump_stack+0x1d8/0x2f8 [ 2424.547338][T32416] should_fail+0x608/0x860 [ 2424.551745][T32416] ? setup_fault_attr+0x2b0/0x2b0 [ 2424.556768][T32416] __should_failslab+0x11a/0x160 [ 2424.561694][T32416] should_failslab+0x9/0x20 [ 2424.566182][T32416] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2424.571506][T32416] ? sctp_add_bind_addr+0x8c/0x350 [ 2424.576607][T32416] sctp_add_bind_addr+0x8c/0x350 [ 2424.579208][T32433] device lo entered promiscuous mode [ 2424.581539][T32416] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2424.581557][T32416] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2424.581574][T32416] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2424.581596][T32416] sctp_copy_one_addr+0xad/0x610 [ 2424.581611][T32416] sctp_bind_addr_copy+0xc0/0x3c0 [ 2424.613778][T32416] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2424.620018][T32416] __sctp_connect+0x8c9/0x1050 [ 2424.624765][T32416] ? __bfs+0x550/0x550 [ 2424.628830][T32416] ? sctp_v6_destroy_sock+0x20/0x20 [ 2424.634009][T32416] ? kasan_check_write+0x14/0x20 [ 2424.638920][T32416] ? _copy_from_user+0xe0/0x120 [ 2424.643745][T32416] ? security_sctp_bind_connect+0xaa/0xd0 [ 2424.649455][T32416] sctp_setsockopt+0x2bf5/0xf2b0 [ 2424.654386][T32416] ? sctp_shutdown+0x130/0x130 [ 2424.659123][T32416] ? __lock_acquire+0xcf7/0x1a40 [ 2424.664044][T32416] ? __bfs+0x550/0x550 [ 2424.668106][T32416] ? trace_lock_acquire+0x190/0x190 [ 2424.673297][T32416] ? __bfs+0x550/0x550 [ 2424.677356][T32416] ? register_lock_class+0xde/0x1110 [ 2424.682669][T32416] ? __lock_acquire+0xcf7/0x1a40 [ 2424.687620][T32416] ? trace_lock_acquire+0x190/0x190 [ 2424.692812][T32416] ? __might_fault+0xf9/0x160 [ 2424.697476][T32416] ? __bfs+0x550/0x550 [ 2424.701520][T32416] ? kstrtoull+0x3ba/0x4e0 [ 2424.705928][T32416] ? kasan_check_write+0x14/0x20 [ 2424.710849][T32416] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2424.716990][T32416] ? __lock_acquire+0xcf7/0x1a40 [ 2424.721918][T32416] ? trace_lock_acquire+0x190/0x190 [ 2424.727100][T32416] ? trace_lock_acquire+0x190/0x190 [ 2424.732283][T32416] ? __mutex_lock_common+0x56b/0x2fc0 [ 2424.737659][T32416] ? memset+0x31/0x40 [ 2424.741631][T32416] ? fsnotify+0x14b9/0x1580 [ 2424.746129][T32416] ? rcu_lock_release+0xd/0x30 [ 2424.750878][T32416] ? rcu_lock_release+0x26/0x30 [ 2424.755710][T32416] ? __fget+0x4fe/0x540 [ 2424.759856][T32416] ? fget_many+0x30/0x30 [ 2424.764075][T32416] sock_common_setsockopt+0x99/0xb0 [ 2424.769251][T32416] __sys_setsockopt+0x1e2/0x250 [ 2424.774083][T32416] __x64_sys_setsockopt+0xbf/0xd0 [ 2424.779103][T32416] do_syscall_64+0xfe/0x140 [ 2424.783602][T32416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2424.789472][T32416] RIP: 0033:0x4597c9 [ 2424.793340][T32416] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2424.813958][T32416] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:52 executing program 5 (fault-call:4 fault-nth:64): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2424.822341][T32416] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2424.830302][T32416] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2424.838265][T32416] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2424.846221][T32416] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2424.854178][T32416] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2424.910177][T32433] device lo left promiscuous mode [ 2424.916228][T32428] ldm_validate_partition_table(): Disk read failed. 06:48:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14fb27000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2424.955784][T32428] Dev loop0: unable to read RDB block 0 [ 2424.990876][T32428] loop0: unable to read partition table 06:48:52 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x12000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfx\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2425.004136][T32428] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2425.024214][T32443] FAULT_INJECTION: forcing a failure. [ 2425.024214][T32443] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.091104][T32443] CPU: 1 PID: 32443 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2425.099010][T32443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2425.109067][T32443] Call Trace: [ 2425.112358][T32443] dump_stack+0x1d8/0x2f8 [ 2425.116673][T32443] should_fail+0x608/0x860 [ 2425.121065][T32443] ? setup_fault_attr+0x2b0/0x2b0 [ 2425.126069][T32443] __should_failslab+0x11a/0x160 [ 2425.130985][T32443] should_failslab+0x9/0x20 [ 2425.135462][T32443] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2425.140746][T32443] ? sctp_add_bind_addr+0x8c/0x350 [ 2425.145835][T32443] sctp_add_bind_addr+0x8c/0x350 [ 2425.150755][T32443] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2425.156122][T32443] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2425.161737][T32443] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2425.167799][T32443] sctp_copy_one_addr+0xad/0x610 [ 2425.172724][T32443] sctp_bind_addr_copy+0xc0/0x3c0 [ 2425.177725][T32443] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2425.183941][T32443] __sctp_connect+0x8c9/0x1050 [ 2425.188696][T32443] ? __bfs+0x550/0x550 [ 2425.192748][T32443] ? sctp_v6_destroy_sock+0x20/0x20 [ 2425.197949][T32443] ? kasan_check_write+0x14/0x20 [ 2425.202865][T32443] ? _copy_from_user+0xe0/0x120 [ 2425.207692][T32443] ? security_sctp_bind_connect+0xaa/0xd0 [ 2425.213406][T32443] sctp_setsockopt+0x2bf5/0xf2b0 [ 2425.218334][T32443] ? sctp_shutdown+0x130/0x130 [ 2425.223071][T32443] ? __lock_acquire+0xcf7/0x1a40 [ 2425.227989][T32443] ? __bfs+0x550/0x550 [ 2425.232045][T32443] ? trace_lock_acquire+0x190/0x190 [ 2425.237213][T32443] ? __bfs+0x550/0x550 [ 2425.241259][T32443] ? register_lock_class+0xde/0x1110 [ 2425.246516][T32443] ? __lock_acquire+0xcf7/0x1a40 [ 2425.251439][T32443] ? trace_lock_acquire+0x190/0x190 [ 2425.256621][T32443] ? __might_fault+0xf9/0x160 [ 2425.261567][T32443] ? __bfs+0x550/0x550 [ 2425.265619][T32443] ? kstrtoull+0x3ba/0x4e0 [ 2425.270027][T32443] ? kasan_check_write+0x14/0x20 [ 2425.274950][T32443] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2425.281081][T32443] ? __lock_acquire+0xcf7/0x1a40 [ 2425.285997][T32443] ? trace_lock_acquire+0x190/0x190 [ 2425.291183][T32443] ? trace_lock_acquire+0x190/0x190 [ 2425.296357][T32443] ? __mutex_lock_common+0x56b/0x2fc0 [ 2425.301701][T32443] ? memset+0x31/0x40 [ 2425.305662][T32443] ? fsnotify+0x14b9/0x1580 [ 2425.310162][T32443] ? rcu_lock_release+0xd/0x30 [ 2425.314915][T32443] ? rcu_lock_release+0x26/0x30 [ 2425.319767][T32443] ? __fget+0x4fe/0x540 [ 2425.323910][T32443] ? fget_many+0x30/0x30 [ 2425.328129][T32443] sock_common_setsockopt+0x99/0xb0 [ 2425.333312][T32443] __sys_setsockopt+0x1e2/0x250 [ 2425.338138][T32443] __x64_sys_setsockopt+0xbf/0xd0 [ 2425.343149][T32443] do_syscall_64+0xfe/0x140 [ 2425.347642][T32443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2425.353508][T32443] RIP: 0033:0x4597c9 [ 2425.357388][T32443] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2425.376994][T32443] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2425.385392][T32443] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2425.393341][T32443] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2425.401287][T32443] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2425.409237][T32443] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2425.417183][T32443] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:52 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:52 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140040000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:52 executing program 5 (fault-call:4 fault-nth:65): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2425.584385][T32456] device lo entered promiscuous mode [ 2425.637113][T32466] device lo left promiscuous mode [ 2425.639046][T32465] FAULT_INJECTION: forcing a failure. [ 2425.639046][T32465] name failslab, interval 1, probability 0, space 0, times 0 06:48:53 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140ec0000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2425.714867][T32465] CPU: 1 PID: 32465 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2425.722796][T32465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2425.732847][T32465] Call Trace: [ 2425.736147][T32465] dump_stack+0x1d8/0x2f8 [ 2425.740480][T32465] should_fail+0x608/0x860 [ 2425.744885][T32465] ? setup_fault_attr+0x2b0/0x2b0 [ 2425.749895][T32465] __should_failslab+0x11a/0x160 [ 2425.754837][T32465] should_failslab+0x9/0x20 [ 2425.759339][T32465] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2425.764614][T32465] ? sctp_add_bind_addr+0x8c/0x350 [ 2425.769714][T32465] sctp_add_bind_addr+0x8c/0x350 [ 2425.774645][T32465] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2425.779996][T32465] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2425.785608][T32465] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2425.791666][T32465] sctp_copy_one_addr+0xad/0x610 [ 2425.796593][T32465] sctp_bind_addr_copy+0xc0/0x3c0 [ 2425.801594][T32465] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2425.807812][T32465] __sctp_connect+0x8c9/0x1050 [ 2425.812553][T32465] ? __bfs+0x550/0x550 [ 2425.816618][T32465] ? sctp_v6_destroy_sock+0x20/0x20 [ 2425.821821][T32465] ? kasan_check_write+0x14/0x20 [ 2425.826733][T32465] ? _copy_from_user+0xe0/0x120 [ 2425.831559][T32465] ? security_sctp_bind_connect+0xaa/0xd0 [ 2425.837255][T32465] sctp_setsockopt+0x2bf5/0xf2b0 [ 2425.842169][T32465] ? sctp_shutdown+0x130/0x130 [ 2425.846918][T32465] ? __lock_acquire+0xcf7/0x1a40 [ 2425.851847][T32465] ? __bfs+0x550/0x550 [ 2425.855923][T32465] ? trace_lock_acquire+0x190/0x190 [ 2425.861102][T32465] ? __bfs+0x550/0x550 [ 2425.865216][T32465] ? register_lock_class+0xde/0x1110 [ 2425.870489][T32465] ? __lock_acquire+0xcf7/0x1a40 [ 2425.875405][T32465] ? trace_lock_acquire+0x190/0x190 [ 2425.880576][T32465] ? __might_fault+0xf9/0x160 [ 2425.885240][T32465] ? __bfs+0x550/0x550 [ 2425.889297][T32465] ? kstrtoull+0x3ba/0x4e0 [ 2425.893695][T32465] ? kasan_check_write+0x14/0x20 [ 2425.898605][T32465] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2425.904733][T32465] ? __lock_acquire+0xcf7/0x1a40 [ 2425.909649][T32465] ? trace_lock_acquire+0x190/0x190 [ 2425.914822][T32465] ? trace_lock_acquire+0x190/0x190 [ 2425.919995][T32465] ? __mutex_lock_common+0x56b/0x2fc0 [ 2425.925359][T32465] ? memset+0x31/0x40 [ 2425.929320][T32465] ? fsnotify+0x14b9/0x1580 [ 2425.933808][T32465] ? rcu_lock_release+0xd/0x30 [ 2425.938564][T32465] ? rcu_lock_release+0x26/0x30 [ 2425.943393][T32465] ? __fget+0x4fe/0x540 [ 2425.947533][T32465] ? fget_many+0x30/0x30 [ 2425.951765][T32465] sock_common_setsockopt+0x99/0xb0 [ 2425.956977][T32465] __sys_setsockopt+0x1e2/0x250 [ 2425.961820][T32465] __x64_sys_setsockopt+0xbf/0xd0 [ 2425.966836][T32465] do_syscall_64+0xfe/0x140 [ 2425.971318][T32465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2425.977186][T32465] RIP: 0033:0x4597c9 [ 2425.981056][T32465] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2426.000631][T32465] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:53 executing program 5 (fault-call:4 fault-nth:66): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2426.009015][T32465] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2426.016961][T32465] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2426.024904][T32465] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2426.032855][T32465] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2426.040815][T32465] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:53 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x16000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:53 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1427fb000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:53 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfz\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2426.255403][T32490] FAULT_INJECTION: forcing a failure. [ 2426.255403][T32490] name failslab, interval 1, probability 0, space 0, times 0 [ 2426.294516][T32490] CPU: 0 PID: 32490 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2426.302421][T32490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2426.312467][T32490] Call Trace: [ 2426.315758][T32490] dump_stack+0x1d8/0x2f8 [ 2426.320130][T32490] should_fail+0x608/0x860 [ 2426.324545][T32490] ? setup_fault_attr+0x2b0/0x2b0 [ 2426.329575][T32490] __should_failslab+0x11a/0x160 [ 2426.334505][T32490] should_failslab+0x9/0x20 [ 2426.338426][T32500] device lo entered promiscuous mode [ 2426.338996][T32490] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2426.339011][T32490] ? sctp_add_bind_addr+0x8c/0x350 [ 2426.339026][T32490] sctp_add_bind_addr+0x8c/0x350 [ 2426.339036][T32490] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2426.339053][T32490] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2426.370537][T32490] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2426.376606][T32490] sctp_copy_one_addr+0xad/0x610 [ 2426.381533][T32490] sctp_bind_addr_copy+0xc0/0x3c0 [ 2426.386549][T32490] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2426.392777][T32490] __sctp_connect+0x8c9/0x1050 [ 2426.397543][T32490] ? __bfs+0x550/0x550 [ 2426.401604][T32490] ? sctp_v6_destroy_sock+0x20/0x20 [ 2426.406796][T32490] ? kasan_check_write+0x14/0x20 [ 2426.411723][T32490] ? _copy_from_user+0xe0/0x120 [ 2426.416561][T32490] ? security_sctp_bind_connect+0xaa/0xd0 [ 2426.422278][T32490] sctp_setsockopt+0x2bf5/0xf2b0 [ 2426.427215][T32490] ? sctp_shutdown+0x130/0x130 [ 2426.431965][T32490] ? __lock_acquire+0xcf7/0x1a40 [ 2426.436886][T32490] ? __bfs+0x550/0x550 [ 2426.440965][T32490] ? trace_lock_acquire+0x190/0x190 [ 2426.446162][T32490] ? __bfs+0x550/0x550 [ 2426.450217][T32490] ? register_lock_class+0xde/0x1110 [ 2426.455485][T32490] ? __lock_acquire+0xcf7/0x1a40 [ 2426.460425][T32490] ? trace_lock_acquire+0x190/0x190 [ 2426.465607][T32490] ? __might_fault+0xf9/0x160 [ 2426.470280][T32490] ? __bfs+0x550/0x550 [ 2426.474344][T32490] ? kstrtoull+0x3ba/0x4e0 [ 2426.478752][T32490] ? kasan_check_write+0x14/0x20 [ 2426.483664][T32490] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2426.489812][T32490] ? __lock_acquire+0xcf7/0x1a40 [ 2426.494733][T32490] ? trace_lock_acquire+0x190/0x190 [ 2426.499908][T32490] ? trace_lock_acquire+0x190/0x190 [ 2426.505089][T32490] ? __mutex_lock_common+0x56b/0x2fc0 [ 2426.510461][T32490] ? memset+0x31/0x40 [ 2426.514425][T32490] ? fsnotify+0x14b9/0x1580 [ 2426.518929][T32490] ? rcu_lock_release+0xd/0x30 [ 2426.523690][T32490] ? rcu_lock_release+0x26/0x30 [ 2426.528525][T32490] ? __fget+0x4fe/0x540 [ 2426.532666][T32490] ? fget_many+0x30/0x30 [ 2426.536898][T32490] sock_common_setsockopt+0x99/0xb0 [ 2426.542097][T32490] __sys_setsockopt+0x1e2/0x250 [ 2426.546948][T32490] __x64_sys_setsockopt+0xbf/0xd0 [ 2426.551962][T32490] do_syscall_64+0xfe/0x140 [ 2426.556454][T32490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2426.562338][T32490] RIP: 0033:0x4597c9 [ 2426.566231][T32490] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2426.585826][T32490] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2426.594219][T32490] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 06:48:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000801ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:54 executing program 5 (fault-call:4 fault-nth:67): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2426.602165][T32490] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2426.610120][T32490] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2426.618070][T32490] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2426.626034][T32490] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2426.698568][T32500] device lo left promiscuous mode 06:48:54 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x18000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2426.782247][T32509] FAULT_INJECTION: forcing a failure. [ 2426.782247][T32509] name failslab, interval 1, probability 0, space 0, times 0 [ 2426.809209][T32509] CPU: 1 PID: 32509 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2426.817111][T32509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2426.827157][T32509] Call Trace: 06:48:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000004001ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2426.830446][T32509] dump_stack+0x1d8/0x2f8 [ 2426.834792][T32509] should_fail+0x608/0x860 [ 2426.839221][T32509] ? setup_fault_attr+0x2b0/0x2b0 [ 2426.844261][T32509] __should_failslab+0x11a/0x160 [ 2426.849201][T32509] should_failslab+0x9/0x20 [ 2426.853687][T32509] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2426.858948][T32509] ? sctp_add_bind_addr+0x8c/0x350 [ 2426.864039][T32509] sctp_add_bind_addr+0x8c/0x350 [ 2426.868954][T32509] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2426.874308][T32509] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2426.879919][T32509] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2426.885970][T32509] sctp_copy_one_addr+0xad/0x610 [ 2426.890900][T32509] sctp_bind_addr_copy+0xc0/0x3c0 [ 2426.895902][T32509] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2426.902120][T32509] __sctp_connect+0x8c9/0x1050 [ 2426.906862][T32509] ? __bfs+0x550/0x550 [ 2426.910912][T32509] ? sctp_v6_destroy_sock+0x20/0x20 [ 2426.916093][T32509] ? kasan_check_write+0x14/0x20 [ 2426.921026][T32509] ? _copy_from_user+0xe0/0x120 [ 2426.925857][T32509] ? security_sctp_bind_connect+0xaa/0xd0 [ 2426.931556][T32509] sctp_setsockopt+0x2bf5/0xf2b0 [ 2426.936473][T32509] ? sctp_shutdown+0x130/0x130 [ 2426.941218][T32509] ? __lock_acquire+0xcf7/0x1a40 [ 2426.946270][T32509] ? __bfs+0x550/0x550 [ 2426.950327][T32509] ? trace_lock_acquire+0x190/0x190 [ 2426.955513][T32509] ? __bfs+0x550/0x550 [ 2426.959572][T32509] ? register_lock_class+0xde/0x1110 [ 2426.964832][T32509] ? __lock_acquire+0xcf7/0x1a40 [ 2426.969769][T32509] ? trace_lock_acquire+0x190/0x190 [ 2426.974951][T32509] ? __might_fault+0xf9/0x160 [ 2426.979622][T32509] ? __bfs+0x550/0x550 [ 2426.983677][T32509] ? kstrtoull+0x3ba/0x4e0 [ 2426.988097][T32509] ? kasan_check_write+0x14/0x20 [ 2426.993027][T32509] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2426.999155][T32509] ? __lock_acquire+0xcf7/0x1a40 [ 2427.004070][T32509] ? trace_lock_acquire+0x190/0x190 [ 2427.009241][T32509] ? trace_lock_acquire+0x190/0x190 [ 2427.014414][T32509] ? __mutex_lock_common+0x56b/0x2fc0 [ 2427.019760][T32509] ? memset+0x31/0x40 [ 2427.023739][T32509] ? fsnotify+0x14b9/0x1580 [ 2427.028223][T32509] ? rcu_lock_release+0xd/0x30 [ 2427.032976][T32509] ? rcu_lock_release+0x26/0x30 [ 2427.037815][T32509] ? __fget+0x4fe/0x540 [ 2427.041964][T32509] ? fget_many+0x30/0x30 [ 2427.046199][T32509] sock_common_setsockopt+0x99/0xb0 [ 2427.051385][T32509] __sys_setsockopt+0x1e2/0x250 [ 2427.056212][T32509] __x64_sys_setsockopt+0xbf/0xd0 [ 2427.061221][T32509] do_syscall_64+0xfe/0x140 [ 2427.065721][T32509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2427.071589][T32509] RIP: 0033:0x4597c9 [ 2427.075472][T32509] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2427.095072][T32509] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2427.103476][T32509] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2427.111444][T32509] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2427.119397][T32509] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 06:48:54 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:54 executing program 5 (fault-call:4 fault-nth:68): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2427.127348][T32509] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2427.135302][T32509] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2427.228302][T32502] ldm_validate_partition_table(): Disk read failed. [ 2427.260918][T32528] FAULT_INJECTION: forcing a failure. [ 2427.260918][T32528] name failslab, interval 1, probability 0, space 0, times 0 06:48:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140002000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2427.269744][T32502] Dev loop0: unable to read RDB block 0 [ 2427.283096][T32529] device lo entered promiscuous mode [ 2427.294156][T32502] loop0: unable to read partition table [ 2427.301169][T32528] CPU: 1 PID: 32528 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2427.306561][T32502] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2427.309059][T32528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2427.309065][T32528] Call Trace: [ 2427.309085][T32528] dump_stack+0x1d8/0x2f8 [ 2427.309104][T32528] should_fail+0x608/0x860 [ 2427.341336][T32528] ? setup_fault_attr+0x2b0/0x2b0 [ 2427.346338][T32528] __should_failslab+0x11a/0x160 [ 2427.351253][T32528] should_failslab+0x9/0x20 [ 2427.355731][T32528] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2427.360998][T32528] ? sctp_add_bind_addr+0x8c/0x350 [ 2427.366087][T32528] sctp_add_bind_addr+0x8c/0x350 [ 2427.371012][T32528] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2427.376362][T32528] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2427.381969][T32528] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2427.388030][T32528] sctp_copy_one_addr+0xad/0x610 [ 2427.393237][T32528] sctp_bind_addr_copy+0xc0/0x3c0 [ 2427.398259][T32528] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2427.404489][T32528] __sctp_connect+0x8c9/0x1050 [ 2427.409236][T32528] ? __bfs+0x550/0x550 [ 2427.413314][T32528] ? sctp_v6_destroy_sock+0x20/0x20 [ 2427.418495][T32528] ? kasan_check_write+0x14/0x20 [ 2427.423426][T32528] ? _copy_from_user+0xe0/0x120 [ 2427.428252][T32528] ? security_sctp_bind_connect+0xaa/0xd0 [ 2427.433950][T32528] sctp_setsockopt+0x2bf5/0xf2b0 [ 2427.438877][T32528] ? sctp_shutdown+0x130/0x130 [ 2427.443618][T32528] ? __lock_acquire+0xcf7/0x1a40 [ 2427.448529][T32528] ? __bfs+0x550/0x550 [ 2427.452594][T32528] ? trace_lock_acquire+0x190/0x190 [ 2427.457775][T32528] ? __bfs+0x550/0x550 [ 2427.461824][T32528] ? register_lock_class+0xde/0x1110 [ 2427.467082][T32528] ? __lock_acquire+0xcf7/0x1a40 [ 2427.471998][T32528] ? trace_lock_acquire+0x190/0x190 [ 2427.477173][T32528] ? __might_fault+0xf9/0x160 [ 2427.481824][T32528] ? __bfs+0x550/0x550 [ 2427.485871][T32528] ? kstrtoull+0x3ba/0x4e0 [ 2427.490265][T32528] ? kasan_check_write+0x14/0x20 [ 2427.495192][T32528] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2427.501344][T32528] ? __lock_acquire+0xcf7/0x1a40 [ 2427.506281][T32528] ? trace_lock_acquire+0x190/0x190 [ 2427.511458][T32528] ? trace_lock_acquire+0x190/0x190 [ 2427.516637][T32528] ? __mutex_lock_common+0x56b/0x2fc0 [ 2427.521982][T32528] ? memset+0x31/0x40 [ 2427.525952][T32528] ? fsnotify+0x14b9/0x1580 [ 2427.530464][T32528] ? rcu_lock_release+0xd/0x30 [ 2427.535228][T32528] ? rcu_lock_release+0x26/0x30 [ 2427.540061][T32528] ? __fget+0x4fe/0x540 [ 2427.544193][T32528] ? fget_many+0x30/0x30 [ 2427.548426][T32528] sock_common_setsockopt+0x99/0xb0 [ 2427.553631][T32528] __sys_setsockopt+0x1e2/0x250 [ 2427.558470][T32528] __x64_sys_setsockopt+0xbf/0xd0 [ 2427.563483][T32528] do_syscall_64+0xfe/0x140 [ 2427.567965][T32528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2427.573830][T32528] RIP: 0033:0x4597c9 [ 2427.577701][T32528] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2427.597285][T32528] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2427.605679][T32528] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2427.613623][T32528] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2427.621575][T32528] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 06:48:55 executing program 5 (fault-call:4 fault-nth:69): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2427.629534][T32528] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2427.637501][T32528] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2427.726775][T32529] device lo left promiscuous mode [ 2427.768386][T32545] FAULT_INJECTION: forcing a failure. [ 2427.768386][T32545] name failslab, interval 1, probability 0, space 0, times 0 [ 2427.786601][T32545] CPU: 0 PID: 32545 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2427.794500][T32545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2427.805084][T32545] Call Trace: [ 2427.808385][T32545] dump_stack+0x1d8/0x2f8 [ 2427.812715][T32545] should_fail+0x608/0x860 [ 2427.817124][T32545] ? setup_fault_attr+0x2b0/0x2b0 [ 2427.822153][T32545] __should_failslab+0x11a/0x160 [ 2427.827100][T32545] should_failslab+0x9/0x20 [ 2427.831600][T32545] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2427.836871][T32545] ? sctp_add_bind_addr+0x8c/0x350 [ 2427.841968][T32545] sctp_add_bind_addr+0x8c/0x350 [ 2427.846888][T32545] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2427.852246][T32545] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2427.857866][T32545] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2427.863944][T32545] sctp_copy_one_addr+0xad/0x610 [ 2427.868868][T32545] sctp_bind_addr_copy+0xc0/0x3c0 [ 2427.873896][T32545] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2427.880122][T32545] __sctp_connect+0x8c9/0x1050 [ 2427.884869][T32545] ? __bfs+0x550/0x550 [ 2427.888936][T32545] ? sctp_v6_destroy_sock+0x20/0x20 [ 2427.894129][T32545] ? kasan_check_write+0x14/0x20 [ 2427.899053][T32545] ? _copy_from_user+0xe0/0x120 [ 2427.903890][T32545] ? security_sctp_bind_connect+0xaa/0xd0 [ 2427.909664][T32545] sctp_setsockopt+0x2bf5/0xf2b0 [ 2427.914629][T32545] ? sctp_shutdown+0x130/0x130 [ 2427.919375][T32545] ? __lock_acquire+0xcf7/0x1a40 [ 2427.924297][T32545] ? __bfs+0x550/0x550 [ 2427.928360][T32545] ? trace_lock_acquire+0x190/0x190 [ 2427.933544][T32545] ? __bfs+0x550/0x550 [ 2427.937599][T32545] ? register_lock_class+0xde/0x1110 [ 2427.942869][T32545] ? __lock_acquire+0xcf7/0x1a40 [ 2427.947801][T32545] ? trace_lock_acquire+0x190/0x190 [ 2427.952983][T32545] ? __might_fault+0xf9/0x160 [ 2427.957644][T32545] ? __bfs+0x550/0x550 [ 2427.961698][T32545] ? kstrtoull+0x3ba/0x4e0 [ 2427.966107][T32545] ? kasan_check_write+0x14/0x20 [ 2427.971040][T32545] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2427.977178][T32545] ? __lock_acquire+0xcf7/0x1a40 [ 2427.982105][T32545] ? trace_lock_acquire+0x190/0x190 [ 2427.987300][T32545] ? trace_lock_acquire+0x190/0x190 [ 2427.992493][T32545] ? __mutex_lock_common+0x56b/0x2fc0 [ 2427.997853][T32545] ? memset+0x31/0x40 [ 2428.001825][T32545] ? fsnotify+0x14b9/0x1580 [ 2428.006328][T32545] ? rcu_lock_release+0xd/0x30 [ 2428.011081][T32545] ? rcu_lock_release+0x26/0x30 [ 2428.015916][T32545] ? __fget+0x4fe/0x540 [ 2428.020062][T32545] ? fget_many+0x30/0x30 [ 2428.024328][T32545] sock_common_setsockopt+0x99/0xb0 [ 2428.029519][T32545] __sys_setsockopt+0x1e2/0x250 [ 2428.034355][T32545] __x64_sys_setsockopt+0xbf/0xd0 [ 2428.039367][T32545] do_syscall_64+0xfe/0x140 [ 2428.043860][T32545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2428.049736][T32545] RIP: 0033:0x4597c9 [ 2428.053618][T32545] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2428.073206][T32545] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2428.081601][T32545] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2428.089558][T32545] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2428.097512][T32545] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2428.105466][T32545] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2428.113421][T32545] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2428.166951][T32541] ldm_validate_partition_table(): Disk read failed. [ 2428.227251][T32541] Dev loop0: unable to read RDB block 0 [ 2428.238544][T32541] loop0: unable to read partition table [ 2428.246750][T32541] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:48:55 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x02', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140003000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:55 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:55 executing program 5 (fault-call:4 fault-nth:70): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:55 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x1f000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:55 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000030301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2428.401825][T32563] FAULT_INJECTION: forcing a failure. [ 2428.401825][T32563] name failslab, interval 1, probability 0, space 0, times 0 [ 2428.437596][T32563] CPU: 1 PID: 32563 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2428.445502][T32563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2428.455545][T32563] Call Trace: [ 2428.455566][T32563] dump_stack+0x1d8/0x2f8 [ 2428.455584][T32563] should_fail+0x608/0x860 [ 2428.455599][T32563] ? setup_fault_attr+0x2b0/0x2b0 [ 2428.455626][T32563] __should_failslab+0x11a/0x160 [ 2428.467681][T32563] should_failslab+0x9/0x20 [ 2428.467692][T32563] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2428.467705][T32563] ? sctp_add_bind_addr+0x8c/0x350 [ 2428.467719][T32563] sctp_add_bind_addr+0x8c/0x350 [ 2428.467734][T32563] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2428.480155][T32571] device lo entered promiscuous mode [ 2428.482158][T32563] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2428.482181][T32563] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2428.519698][T32563] sctp_copy_one_addr+0xad/0x610 [ 2428.524623][T32563] sctp_bind_addr_copy+0xc0/0x3c0 [ 2428.529641][T32563] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2428.535894][T32563] __sctp_connect+0x8c9/0x1050 [ 2428.540651][T32563] ? __bfs+0x550/0x550 [ 2428.544716][T32563] ? sctp_v6_destroy_sock+0x20/0x20 [ 2428.549909][T32563] ? kasan_check_write+0x14/0x20 [ 2428.554832][T32563] ? _copy_from_user+0xe0/0x120 [ 2428.559667][T32563] ? security_sctp_bind_connect+0xaa/0xd0 [ 2428.565362][T32563] sctp_setsockopt+0x2bf5/0xf2b0 [ 2428.570280][T32563] ? sctp_shutdown+0x130/0x130 [ 2428.575044][T32563] ? __lock_acquire+0xcf7/0x1a40 [ 2428.579959][T32563] ? __bfs+0x550/0x550 [ 2428.584033][T32563] ? trace_lock_acquire+0x190/0x190 [ 2428.589206][T32563] ? __bfs+0x550/0x550 [ 2428.593265][T32563] ? register_lock_class+0xde/0x1110 [ 2428.598554][T32563] ? __lock_acquire+0xcf7/0x1a40 [ 2428.603481][T32563] ? trace_lock_acquire+0x190/0x190 [ 2428.608655][T32563] ? __might_fault+0xf9/0x160 [ 2428.613336][T32563] ? __bfs+0x550/0x550 [ 2428.617383][T32563] ? kstrtoull+0x3ba/0x4e0 [ 2428.621778][T32563] ? kasan_check_write+0x14/0x20 [ 2428.626694][T32563] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2428.632825][T32563] ? __lock_acquire+0xcf7/0x1a40 [ 2428.637742][T32563] ? trace_lock_acquire+0x190/0x190 [ 2428.642917][T32563] ? trace_lock_acquire+0x190/0x190 [ 2428.648092][T32563] ? __mutex_lock_common+0x56b/0x2fc0 [ 2428.653439][T32563] ? memset+0x31/0x40 [ 2428.657406][T32563] ? fsnotify+0x14b9/0x1580 [ 2428.661920][T32563] ? rcu_lock_release+0xd/0x30 [ 2428.666662][T32563] ? rcu_lock_release+0x26/0x30 [ 2428.671492][T32563] ? __fget+0x4fe/0x540 [ 2428.675629][T32563] ? fget_many+0x30/0x30 [ 2428.679850][T32563] sock_common_setsockopt+0x99/0xb0 [ 2428.685032][T32563] __sys_setsockopt+0x1e2/0x250 [ 2428.689876][T32563] __x64_sys_setsockopt+0xbf/0xd0 [ 2428.694880][T32563] do_syscall_64+0xfe/0x140 [ 2428.699366][T32563] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2428.705243][T32563] RIP: 0033:0x4597c9 [ 2428.709116][T32563] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2428.728696][T32563] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2428.737088][T32563] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2428.745055][T32563] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 06:48:56 executing program 5 (fault-call:4 fault-nth:71): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2428.753022][T32563] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2428.760992][T32563] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2428.768952][T32563] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2428.846900][T32571] device lo left promiscuous mode [ 2428.866908][ C0] print_req_error: 737 callbacks suppressed [ 2428.866916][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2428.879956][ C0] buffer_io_error: 728 callbacks suppressed [ 2428.879964][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 06:48:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400c00e0301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:56 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2428.888254][T32583] FAULT_INJECTION: forcing a failure. [ 2428.888254][T32583] name failslab, interval 1, probability 0, space 0, times 0 [ 2428.921766][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2428.928938][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2428.939340][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2428.946498][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2428.960402][T32583] CPU: 0 PID: 32583 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2428.968309][T32583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2428.978361][T32583] Call Trace: [ 2428.981663][T32583] dump_stack+0x1d8/0x2f8 [ 2428.986001][T32583] should_fail+0x608/0x860 [ 2428.990418][T32583] ? setup_fault_attr+0x2b0/0x2b0 [ 2428.995455][T32583] __should_failslab+0x11a/0x160 [ 2429.000401][T32583] should_failslab+0x9/0x20 [ 2429.004881][T32583] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2429.010142][T32583] ? sctp_add_bind_addr+0x8c/0x350 [ 2429.015245][T32583] sctp_add_bind_addr+0x8c/0x350 [ 2429.020174][T32583] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2429.025536][T32583] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2429.031157][T32583] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2429.037245][T32583] sctp_copy_one_addr+0xad/0x610 [ 2429.042188][T32583] sctp_bind_addr_copy+0xc0/0x3c0 [ 2429.047199][T32583] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2429.053430][T32583] __sctp_connect+0x8c9/0x1050 [ 2429.058170][T32583] ? __bfs+0x550/0x550 [ 2429.062222][T32583] ? sctp_v6_destroy_sock+0x20/0x20 [ 2429.067418][T32583] ? kasan_check_write+0x14/0x20 [ 2429.072341][T32583] ? _copy_from_user+0xe0/0x120 [ 2429.077178][T32583] ? security_sctp_bind_connect+0xaa/0xd0 [ 2429.082898][T32583] sctp_setsockopt+0x2bf5/0xf2b0 [ 2429.087842][T32583] ? sctp_shutdown+0x130/0x130 [ 2429.092608][T32583] ? __lock_acquire+0xcf7/0x1a40 [ 2429.097534][T32583] ? __bfs+0x550/0x550 [ 2429.101595][T32583] ? trace_lock_acquire+0x190/0x190 [ 2429.106787][T32583] ? __bfs+0x550/0x550 [ 2429.110837][T32583] ? register_lock_class+0xde/0x1110 [ 2429.116122][T32583] ? __lock_acquire+0xcf7/0x1a40 [ 2429.121079][T32583] ? trace_lock_acquire+0x190/0x190 [ 2429.126356][T32583] ? __might_fault+0xf9/0x160 [ 2429.131037][T32583] ? __bfs+0x550/0x550 [ 2429.135094][T32583] ? kstrtoull+0x3ba/0x4e0 [ 2429.139520][T32583] ? kasan_check_write+0x14/0x20 [ 2429.144469][T32583] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2429.150601][T32583] ? __lock_acquire+0xcf7/0x1a40 [ 2429.155560][T32583] ? trace_lock_acquire+0x190/0x190 [ 2429.160740][T32583] ? trace_lock_acquire+0x190/0x190 [ 2429.165960][T32583] ? __mutex_lock_common+0x56b/0x2fc0 [ 2429.171406][T32583] ? memset+0x31/0x40 [ 2429.175398][T32583] ? fsnotify+0x14b9/0x1580 [ 2429.179913][T32583] ? rcu_lock_release+0xd/0x30 [ 2429.184676][T32583] ? rcu_lock_release+0x26/0x30 [ 2429.189509][T32583] ? __fget+0x4fe/0x540 [ 2429.193654][T32583] ? fget_many+0x30/0x30 [ 2429.197896][T32583] sock_common_setsockopt+0x99/0xb0 [ 2429.203084][T32583] __sys_setsockopt+0x1e2/0x250 [ 2429.210215][T32583] __x64_sys_setsockopt+0xbf/0xd0 [ 2429.215240][T32583] do_syscall_64+0xfe/0x140 [ 2429.219771][T32583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2429.225665][T32583] RIP: 0033:0x4597c9 [ 2429.229556][T32583] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2429.249150][T32583] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2429.257562][T32583] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2429.265536][T32583] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2429.273502][T32583] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2429.281465][T32583] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2429.289419][T32583] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:56 executing program 5 (fault-call:4 fault-nth:72): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2429.297821][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2429.304949][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2429.315260][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2429.322476][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2429.330770][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2429.337936][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2429.346255][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2429.353389][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2429.361513][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2429.368658][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2429.376674][T32572] ldm_validate_partition_table(): Disk read failed. [ 2429.383399][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2429.390624][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2429.418796][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2429.425973][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2429.445676][T32572] Dev loop0: unable to read RDB block 0 [ 2429.464579][T32572] loop0: unable to read partition table [ 2429.481642][T32572] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:48:56 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:56 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x20000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x03', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400fb270301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:56 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2429.576204][T32598] device lo entered promiscuous mode [ 2429.584073][T32596] FAULT_INJECTION: forcing a failure. [ 2429.584073][T32596] name failslab, interval 1, probability 0, space 0, times 0 [ 2429.640536][T32596] CPU: 0 PID: 32596 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2429.648457][T32596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2429.658536][T32596] Call Trace: [ 2429.661863][T32596] dump_stack+0x1d8/0x2f8 [ 2429.666187][T32596] should_fail+0x608/0x860 [ 2429.670590][T32596] ? setup_fault_attr+0x2b0/0x2b0 [ 2429.675640][T32596] __should_failslab+0x11a/0x160 [ 2429.680660][T32596] should_failslab+0x9/0x20 [ 2429.685152][T32596] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2429.690414][T32596] ? sctp_add_bind_addr+0x8c/0x350 [ 2429.695512][T32596] sctp_add_bind_addr+0x8c/0x350 [ 2429.700436][T32596] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2429.705795][T32596] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2429.711436][T32596] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2429.717499][T32596] sctp_copy_one_addr+0xad/0x610 [ 2429.722424][T32596] sctp_bind_addr_copy+0xc0/0x3c0 [ 2429.727427][T32596] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2429.733643][T32596] __sctp_connect+0x8c9/0x1050 [ 2429.738391][T32596] ? __bfs+0x550/0x550 [ 2429.742471][T32596] ? sctp_v6_destroy_sock+0x20/0x20 [ 2429.747650][T32596] ? kasan_check_write+0x14/0x20 [ 2429.752573][T32596] ? _copy_from_user+0xe0/0x120 [ 2429.757409][T32596] ? security_sctp_bind_connect+0xaa/0xd0 [ 2429.763143][T32596] sctp_setsockopt+0x2bf5/0xf2b0 [ 2429.768074][T32596] ? sctp_shutdown+0x130/0x130 [ 2429.772831][T32596] ? __lock_acquire+0xcf7/0x1a40 [ 2429.777755][T32596] ? __bfs+0x550/0x550 [ 2429.781820][T32596] ? trace_lock_acquire+0x190/0x190 [ 2429.786999][T32596] ? __bfs+0x550/0x550 [ 2429.791050][T32596] ? register_lock_class+0xde/0x1110 [ 2429.796321][T32596] ? __lock_acquire+0xcf7/0x1a40 [ 2429.801247][T32596] ? trace_lock_acquire+0x190/0x190 [ 2429.806433][T32596] ? __might_fault+0xf9/0x160 [ 2429.811143][T32596] ? __bfs+0x550/0x550 [ 2429.815207][T32596] ? kstrtoull+0x3ba/0x4e0 [ 2429.819632][T32596] ? kasan_check_write+0x14/0x20 [ 2429.824556][T32596] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2429.830686][T32596] ? __lock_acquire+0xcf7/0x1a40 [ 2429.835626][T32596] ? trace_lock_acquire+0x190/0x190 [ 2429.840840][T32596] ? trace_lock_acquire+0x190/0x190 [ 2429.846027][T32596] ? __mutex_lock_common+0x56b/0x2fc0 [ 2429.851383][T32596] ? memset+0x31/0x40 [ 2429.855358][T32596] ? fsnotify+0x14b9/0x1580 [ 2429.859852][T32596] ? rcu_lock_release+0xd/0x30 [ 2429.864607][T32596] ? rcu_lock_release+0x26/0x30 [ 2429.869447][T32596] ? __fget+0x4fe/0x540 [ 2429.873589][T32596] ? fget_many+0x30/0x30 [ 2429.877836][T32596] sock_common_setsockopt+0x99/0xb0 [ 2429.883023][T32596] __sys_setsockopt+0x1e2/0x250 [ 2429.887850][T32596] __x64_sys_setsockopt+0xbf/0xd0 [ 2429.892852][T32596] do_syscall_64+0xfe/0x140 [ 2429.897347][T32596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2429.903221][T32596] RIP: 0033:0x4597c9 [ 2429.907089][T32596] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2429.926678][T32596] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000400301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:57 executing program 5 (fault-call:4 fault-nth:73): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2429.935072][T32596] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2429.943016][T32596] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2429.950961][T32596] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2429.958915][T32596] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2429.966885][T32596] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2430.028688][T32612] device lo left promiscuous mode 06:48:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000ec00301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:57 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2430.076546][T32620] FAULT_INJECTION: forcing a failure. [ 2430.076546][T32620] name failslab, interval 1, probability 0, space 0, times 0 [ 2430.134629][T32620] CPU: 1 PID: 32620 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2430.142542][T32620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2430.152573][T32620] Call Trace: [ 2430.155855][T32620] dump_stack+0x1d8/0x2f8 [ 2430.160181][T32620] should_fail+0x608/0x860 [ 2430.164588][T32620] ? setup_fault_attr+0x2b0/0x2b0 [ 2430.169609][T32620] __should_failslab+0x11a/0x160 [ 2430.174538][T32620] should_failslab+0x9/0x20 [ 2430.179027][T32620] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2430.184290][T32620] ? sctp_add_bind_addr+0x8c/0x350 [ 2430.189404][T32620] sctp_add_bind_addr+0x8c/0x350 [ 2430.194326][T32620] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2430.199781][T32620] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2430.205441][T32620] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2430.211488][T32620] sctp_copy_one_addr+0xad/0x610 [ 2430.216416][T32620] sctp_bind_addr_copy+0xc0/0x3c0 [ 2430.221417][T32620] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2430.227635][T32620] __sctp_connect+0x8c9/0x1050 [ 2430.232386][T32620] ? __bfs+0x550/0x550 [ 2430.236459][T32620] ? sctp_v6_destroy_sock+0x20/0x20 [ 2430.241644][T32620] ? kasan_check_write+0x14/0x20 [ 2430.246554][T32620] ? _copy_from_user+0xe0/0x120 [ 2430.251392][T32620] ? security_sctp_bind_connect+0xaa/0xd0 [ 2430.257125][T32620] sctp_setsockopt+0x2bf5/0xf2b0 [ 2430.262060][T32620] ? sctp_shutdown+0x130/0x130 [ 2430.266815][T32620] ? __lock_acquire+0xcf7/0x1a40 [ 2430.271749][T32620] ? __bfs+0x550/0x550 [ 2430.275823][T32620] ? trace_lock_acquire+0x190/0x190 [ 2430.281006][T32620] ? __bfs+0x550/0x550 [ 2430.285059][T32620] ? register_lock_class+0xde/0x1110 [ 2430.290337][T32620] ? __lock_acquire+0xcf7/0x1a40 [ 2430.295271][T32620] ? trace_lock_acquire+0x190/0x190 [ 2430.300474][T32620] ? __might_fault+0xf9/0x160 [ 2430.305128][T32620] ? __bfs+0x550/0x550 [ 2430.309181][T32620] ? kstrtoull+0x3ba/0x4e0 [ 2430.313593][T32620] ? kasan_check_write+0x14/0x20 [ 2430.318522][T32620] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2430.324666][T32620] ? __lock_acquire+0xcf7/0x1a40 [ 2430.329587][T32620] ? trace_lock_acquire+0x190/0x190 [ 2430.334769][T32620] ? trace_lock_acquire+0x190/0x190 [ 2430.339969][T32620] ? __mutex_lock_common+0x56b/0x2fc0 [ 2430.345324][T32620] ? memset+0x31/0x40 [ 2430.349283][T32620] ? fsnotify+0x14b9/0x1580 [ 2430.353790][T32620] ? rcu_lock_release+0xd/0x30 [ 2430.358548][T32620] ? rcu_lock_release+0x26/0x30 [ 2430.363396][T32620] ? __fget+0x4fe/0x540 [ 2430.367542][T32620] ? fget_many+0x30/0x30 [ 2430.371764][T32620] sock_common_setsockopt+0x99/0xb0 [ 2430.376946][T32620] __sys_setsockopt+0x1e2/0x250 [ 2430.381803][T32620] __x64_sys_setsockopt+0xbf/0xd0 [ 2430.386824][T32620] do_syscall_64+0xfe/0x140 [ 2430.391340][T32620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2430.397220][T32620] RIP: 0033:0x4597c9 [ 2430.401088][T32620] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2430.420691][T32620] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:57 executing program 5 (fault-call:4 fault-nth:74): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:57 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x25000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2430.429091][T32620] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2430.437053][T32620] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2430.445009][T32620] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2430.452956][T32620] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2430.460937][T32620] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x04', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2430.555599][T32630] FAULT_INJECTION: forcing a failure. [ 2430.555599][T32630] name failslab, interval 1, probability 0, space 0, times 0 [ 2430.569490][T32630] CPU: 0 PID: 32630 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2430.577402][T32630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2430.587436][T32630] Call Trace: [ 2430.590742][T32630] dump_stack+0x1d8/0x2f8 [ 2430.595047][T32630] should_fail+0x608/0x860 [ 2430.599456][T32630] ? setup_fault_attr+0x2b0/0x2b0 [ 2430.604483][T32630] __should_failslab+0x11a/0x160 [ 2430.609415][T32630] should_failslab+0x9/0x20 [ 2430.613900][T32630] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2430.619199][T32630] ? sctp_add_bind_addr+0x8c/0x350 [ 2430.624303][T32630] sctp_add_bind_addr+0x8c/0x350 [ 2430.629226][T32630] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2430.634587][T32630] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2430.640210][T32630] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2430.646303][T32630] sctp_copy_one_addr+0xad/0x610 [ 2430.651267][T32630] sctp_bind_addr_copy+0xc0/0x3c0 [ 2430.656282][T32630] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2430.662515][T32630] __sctp_connect+0x8c9/0x1050 [ 2430.667273][T32630] ? __bfs+0x550/0x550 [ 2430.671341][T32630] ? sctp_v6_destroy_sock+0x20/0x20 [ 2430.676535][T32630] ? kasan_check_write+0x14/0x20 [ 2430.681457][T32630] ? _copy_from_user+0xe0/0x120 [ 2430.686337][T32630] ? security_sctp_bind_connect+0xaa/0xd0 [ 2430.692044][T32630] sctp_setsockopt+0x2bf5/0xf2b0 [ 2430.696991][T32630] ? sctp_shutdown+0x130/0x130 [ 2430.701770][T32630] ? __lock_acquire+0xcf7/0x1a40 [ 2430.706737][T32630] ? __bfs+0x550/0x550 [ 2430.710858][T32630] ? trace_lock_acquire+0x190/0x190 [ 2430.716052][T32630] ? __bfs+0x550/0x550 [ 2430.720105][T32630] ? register_lock_class+0xde/0x1110 [ 2430.725376][T32630] ? __lock_acquire+0xcf7/0x1a40 [ 2430.730326][T32630] ? trace_lock_acquire+0x190/0x190 [ 2430.735506][T32630] ? __might_fault+0xf9/0x160 [ 2430.740166][T32630] ? __bfs+0x550/0x550 [ 2430.744217][T32630] ? kstrtoull+0x3ba/0x4e0 [ 2430.748623][T32630] ? kasan_check_write+0x14/0x20 [ 2430.753543][T32630] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2430.759687][T32630] ? __lock_acquire+0xcf7/0x1a40 [ 2430.764632][T32630] ? trace_lock_acquire+0x190/0x190 [ 2430.769815][T32630] ? trace_lock_acquire+0x190/0x190 [ 2430.774994][T32630] ? __mutex_lock_common+0x56b/0x2fc0 [ 2430.780350][T32630] ? memset+0x31/0x40 [ 2430.784328][T32630] ? fsnotify+0x14b9/0x1580 [ 2430.788832][T32630] ? rcu_lock_release+0xd/0x30 [ 2430.793587][T32630] ? rcu_lock_release+0x26/0x30 [ 2430.798428][T32630] ? __fget+0x4fe/0x540 [ 2430.802588][T32630] ? fget_many+0x30/0x30 [ 2430.806837][T32630] sock_common_setsockopt+0x99/0xb0 [ 2430.812025][T32630] __sys_setsockopt+0x1e2/0x250 [ 2430.816867][T32630] __x64_sys_setsockopt+0xbf/0xd0 [ 2430.821889][T32630] do_syscall_64+0xfe/0x140 [ 2430.826391][T32630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2430.832282][T32630] RIP: 0033:0x4597c9 [ 2430.836184][T32630] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2430.855802][T32630] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2430.864223][T32630] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2430.872176][T32630] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2430.880132][T32630] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2430.888090][T32630] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2430.896046][T32630] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2430.960320][T32611] ldm_validate_partition_table(): Disk read failed. [ 2430.987825][T32611] Dev loop0: unable to read RDB block 0 [ 2431.037332][T32641] device lo entered promiscuous mode [ 2431.047570][T32611] loop0: unable to read partition table [ 2431.087849][T32611] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2431.109623][T32650] device lo left promiscuous mode 06:48:58 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:58 executing program 5 (fault-call:4 fault-nth:75): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140027fb0301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:48:58 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:58 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x3f000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:58 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2431.254653][T32663] FAULT_INJECTION: forcing a failure. [ 2431.254653][T32663] name failslab, interval 1, probability 0, space 0, times 0 06:48:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000580101ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2431.300185][T32663] CPU: 1 PID: 32663 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2431.308086][T32663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2431.318145][T32663] Call Trace: [ 2431.321443][T32663] dump_stack+0x1d8/0x2f8 [ 2431.325779][T32663] should_fail+0x608/0x860 [ 2431.330248][T32663] ? setup_fault_attr+0x2b0/0x2b0 [ 2431.335285][T32663] __should_failslab+0x11a/0x160 [ 2431.340227][T32663] should_failslab+0x9/0x20 [ 2431.344732][T32663] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2431.350014][T32663] ? sctp_add_bind_addr+0x8c/0x350 [ 2431.350030][T32663] sctp_add_bind_addr+0x8c/0x350 [ 2431.350041][T32663] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2431.350057][T32663] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2431.360089][T32663] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2431.360113][T32663] sctp_copy_one_addr+0xad/0x610 [ 2431.360128][T32663] sctp_bind_addr_copy+0xc0/0x3c0 [ 2431.367322][T32672] device lo entered promiscuous mode [ 2431.371093][T32663] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 06:48:58 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2431.371108][T32663] __sctp_connect+0x8c9/0x1050 [ 2431.371122][T32663] ? __bfs+0x550/0x550 [ 2431.407969][T32663] ? sctp_v6_destroy_sock+0x20/0x20 [ 2431.413179][T32663] ? kasan_check_write+0x14/0x20 [ 2431.418109][T32663] ? _copy_from_user+0xe0/0x120 [ 2431.422940][T32663] ? security_sctp_bind_connect+0xaa/0xd0 [ 2431.428636][T32663] sctp_setsockopt+0x2bf5/0xf2b0 [ 2431.433552][T32663] ? sctp_shutdown+0x130/0x130 [ 2431.438305][T32663] ? __lock_acquire+0xcf7/0x1a40 [ 2431.443233][T32663] ? __bfs+0x550/0x550 [ 2431.447307][T32663] ? trace_lock_acquire+0x190/0x190 [ 2431.452493][T32663] ? __bfs+0x550/0x550 [ 2431.456539][T32663] ? register_lock_class+0xde/0x1110 [ 2431.461802][T32663] ? __lock_acquire+0xcf7/0x1a40 [ 2431.466726][T32663] ? trace_lock_acquire+0x190/0x190 [ 2431.471901][T32663] ? __might_fault+0xf9/0x160 [ 2431.476560][T32663] ? __bfs+0x550/0x550 [ 2431.480606][T32663] ? kstrtoull+0x3ba/0x4e0 [ 2431.485006][T32663] ? kasan_check_write+0x14/0x20 [ 2431.489920][T32663] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2431.496048][T32663] ? __lock_acquire+0xcf7/0x1a40 [ 2431.501064][T32663] ? trace_lock_acquire+0x190/0x190 [ 2431.506269][T32663] ? trace_lock_acquire+0x190/0x190 [ 2431.511454][T32663] ? __mutex_lock_common+0x56b/0x2fc0 [ 2431.516804][T32663] ? memset+0x31/0x40 [ 2431.520791][T32663] ? fsnotify+0x14b9/0x1580 [ 2431.525296][T32663] ? rcu_lock_release+0xd/0x30 [ 2431.530051][T32663] ? rcu_lock_release+0x26/0x30 [ 2431.534878][T32663] ? __fget+0x4fe/0x540 [ 2431.539011][T32663] ? fget_many+0x30/0x30 [ 2431.543245][T32663] sock_common_setsockopt+0x99/0xb0 [ 2431.548435][T32663] __sys_setsockopt+0x1e2/0x250 [ 2431.553264][T32663] __x64_sys_setsockopt+0xbf/0xd0 [ 2431.558266][T32663] do_syscall_64+0xfe/0x140 [ 2431.562750][T32663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2431.568615][T32663] RIP: 0033:0x4597c9 [ 2431.572499][T32663] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2431.592083][T32663] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:48:59 executing program 5 (fault-call:4 fault-nth:76): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2431.600467][T32663] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2431.608414][T32663] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2431.616360][T32663] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2431.624316][T32663] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2431.632268][T32663] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x05', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:48:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000020301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2431.736457][T32672] device lo left promiscuous mode [ 2431.756008][T32675] loop_set_status: loop0 () has still dirty pages (nrpages=1) [ 2431.799251][T32683] FAULT_INJECTION: forcing a failure. [ 2431.799251][T32683] name failslab, interval 1, probability 0, space 0, times 0 [ 2431.818094][T32683] CPU: 1 PID: 32683 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2431.826000][T32683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2431.836069][T32683] Call Trace: [ 2431.839367][T32683] dump_stack+0x1d8/0x2f8 [ 2431.843723][T32683] should_fail+0x608/0x860 06:48:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000030301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2431.848147][T32683] ? setup_fault_attr+0x2b0/0x2b0 [ 2431.853190][T32683] __should_failslab+0x11a/0x160 [ 2431.858140][T32683] should_failslab+0x9/0x20 [ 2431.862649][T32683] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2431.867945][T32683] ? sctp_add_bind_addr+0x8c/0x350 [ 2431.873070][T32683] sctp_add_bind_addr+0x8c/0x350 [ 2431.878012][T32683] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2431.883395][T32683] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2431.889043][T32683] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2431.895124][T32683] sctp_copy_one_addr+0xad/0x610 [ 2431.900115][T32683] sctp_bind_addr_copy+0xc0/0x3c0 [ 2431.905128][T32683] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2431.911355][T32683] __sctp_connect+0x8c9/0x1050 [ 2431.916105][T32683] ? __bfs+0x550/0x550 [ 2431.920166][T32683] ? sctp_v6_destroy_sock+0x20/0x20 [ 2431.925359][T32683] ? kasan_check_write+0x14/0x20 [ 2431.930283][T32683] ? _copy_from_user+0xe0/0x120 [ 2431.935247][T32683] ? security_sctp_bind_connect+0xaa/0xd0 [ 2431.940967][T32683] sctp_setsockopt+0x2bf5/0xf2b0 [ 2431.945895][T32683] ? sctp_shutdown+0x130/0x130 [ 2431.950649][T32683] ? __lock_acquire+0xcf7/0x1a40 [ 2431.955573][T32683] ? __bfs+0x550/0x550 [ 2431.959685][T32683] ? trace_lock_acquire+0x190/0x190 [ 2431.964872][T32683] ? __bfs+0x550/0x550 [ 2431.968940][T32683] ? register_lock_class+0xde/0x1110 [ 2431.974213][T32683] ? __lock_acquire+0xcf7/0x1a40 [ 2431.979191][T32683] ? trace_lock_acquire+0x190/0x190 [ 2431.984379][T32683] ? __might_fault+0xf9/0x160 [ 2431.989042][T32683] ? __bfs+0x550/0x550 [ 2431.993101][T32683] ? kstrtoull+0x3ba/0x4e0 [ 2431.997511][T32683] ? kasan_check_write+0x14/0x20 [ 2432.002484][T32683] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2432.008636][T32683] ? __lock_acquire+0xcf7/0x1a40 [ 2432.013629][T32683] ? trace_lock_acquire+0x190/0x190 [ 2432.018827][T32683] ? trace_lock_acquire+0x190/0x190 [ 2432.024013][T32683] ? __mutex_lock_common+0x56b/0x2fc0 [ 2432.029373][T32683] ? memset+0x31/0x40 [ 2432.033342][T32683] ? fsnotify+0x14b9/0x1580 [ 2432.037936][T32683] ? rcu_lock_release+0xd/0x30 [ 2432.042691][T32683] ? rcu_lock_release+0x26/0x30 [ 2432.047531][T32683] ? __fget+0x4fe/0x540 [ 2432.051725][T32683] ? fget_many+0x30/0x30 [ 2432.055967][T32683] sock_common_setsockopt+0x99/0xb0 [ 2432.061327][T32683] __sys_setsockopt+0x1e2/0x250 [ 2432.066187][T32683] __x64_sys_setsockopt+0xbf/0xd0 [ 2432.071227][T32683] do_syscall_64+0xfe/0x140 [ 2432.075770][T32683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2432.081742][T32683] RIP: 0033:0x4597c9 [ 2432.085626][T32683] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2432.105343][T32683] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2432.113932][T32683] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2432.121909][T32683] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2432.129884][T32683] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2432.137964][T32683] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2432.145920][T32683] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:48:59 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:48:59 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:48:59 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x40000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:48:59 executing program 5 (fault-call:4 fault-nth:77): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:48:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000004001ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2432.265874][T32675] loop_set_status: loop0 () has still dirty pages (nrpages=1) [ 2432.325576][T32703] FAULT_INJECTION: forcing a failure. [ 2432.325576][T32703] name failslab, interval 1, probability 0, space 0, times 0 06:48:59 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2432.374160][T32712] device lo entered promiscuous mode 06:48:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2432.423511][T32703] CPU: 1 PID: 32703 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2432.431866][T32703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2432.441999][T32703] Call Trace: [ 2432.445307][T32703] dump_stack+0x1d8/0x2f8 [ 2432.449646][T32703] should_fail+0x608/0x860 [ 2432.454069][T32703] ? setup_fault_attr+0x2b0/0x2b0 [ 2432.459116][T32703] __should_failslab+0x11a/0x160 [ 2432.464430][T32703] should_failslab+0x9/0x20 [ 2432.468926][T32703] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2432.474202][T32703] ? sctp_add_bind_addr+0x8c/0x350 [ 2432.479425][T32703] sctp_add_bind_addr+0x8c/0x350 [ 2432.484452][T32703] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2432.489989][T32703] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2432.495702][T32703] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2432.501763][T32703] sctp_copy_one_addr+0xad/0x610 [ 2432.506695][T32703] sctp_bind_addr_copy+0xc0/0x3c0 [ 2432.511722][T32703] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2432.518216][T32703] __sctp_connect+0x8c9/0x1050 [ 2432.522973][T32703] ? __bfs+0x550/0x550 [ 2432.527040][T32703] ? sctp_v6_destroy_sock+0x20/0x20 [ 2432.532262][T32703] ? kasan_check_write+0x14/0x20 [ 2432.537256][T32703] ? _copy_from_user+0xe0/0x120 [ 2432.542329][T32703] ? security_sctp_bind_connect+0xaa/0xd0 [ 2432.548037][T32703] sctp_setsockopt+0x2bf5/0xf2b0 [ 2432.552967][T32703] ? sctp_shutdown+0x130/0x130 [ 2432.557810][T32703] ? __lock_acquire+0xcf7/0x1a40 [ 2432.562870][T32703] ? __bfs+0x550/0x550 [ 2432.566943][T32703] ? trace_lock_acquire+0x190/0x190 [ 2432.572144][T32703] ? __bfs+0x550/0x550 [ 2432.576200][T32703] ? register_lock_class+0xde/0x1110 [ 2432.581510][T32703] ? __lock_acquire+0xcf7/0x1a40 [ 2432.586449][T32703] ? trace_lock_acquire+0x190/0x190 [ 2432.591685][T32703] ? __might_fault+0xf9/0x160 [ 2432.596350][T32703] ? __bfs+0x550/0x550 [ 2432.600408][T32703] ? kstrtoull+0x3ba/0x4e0 [ 2432.604881][T32703] ? kasan_check_write+0x14/0x20 [ 2432.609830][T32703] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2432.615999][T32703] ? __lock_acquire+0xcf7/0x1a40 [ 2432.620931][T32703] ? trace_lock_acquire+0x190/0x190 [ 2432.626120][T32703] ? trace_lock_acquire+0x190/0x190 [ 2432.631309][T32703] ? __mutex_lock_common+0x56b/0x2fc0 [ 2432.636679][T32703] ? memset+0x31/0x40 [ 2432.640774][T32703] ? fsnotify+0x14b9/0x1580 [ 2432.645305][T32703] ? rcu_lock_release+0xd/0x30 [ 2432.650160][T32703] ? rcu_lock_release+0x26/0x30 [ 2432.655049][T32703] ? __fget+0x4fe/0x540 [ 2432.659196][T32703] ? fget_many+0x30/0x30 [ 2432.663432][T32703] sock_common_setsockopt+0x99/0xb0 [ 2432.668625][T32703] __sys_setsockopt+0x1e2/0x250 [ 2432.673464][T32703] __x64_sys_setsockopt+0xbf/0xd0 [ 2432.678494][T32703] do_syscall_64+0xfe/0x140 [ 2432.683011][T32703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2432.688910][T32703] RIP: 0033:0x4597c9 [ 2432.692812][T32703] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2432.712403][T32703] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:49:00 executing program 5 (fault-call:4 fault-nth:78): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2432.720828][T32703] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2432.728802][T32703] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2432.736866][T32703] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2432.744918][T32703] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2432.752945][T32703] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2432.806376][T32712] device lo left promiscuous mode 06:49:00 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x48000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2432.878887][T32715] ldm_validate_partition_table(): Disk read failed. [ 2432.893029][T32715] Dev loop0: unable to read RDB block 0 [ 2432.941506][T32715] loop0: unable to read partition table [ 2432.950967][T32729] FAULT_INJECTION: forcing a failure. [ 2432.950967][T32729] name failslab, interval 1, probability 0, space 0, times 0 [ 2432.965418][T32715] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x06', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000201ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:49:00 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2433.009020][T32729] CPU: 1 PID: 32729 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2433.017127][T32729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2433.027222][T32729] Call Trace: [ 2433.030570][T32729] dump_stack+0x1d8/0x2f8 [ 2433.035010][T32729] should_fail+0x608/0x860 [ 2433.039451][T32729] ? setup_fault_attr+0x2b0/0x2b0 [ 2433.044485][T32729] __should_failslab+0x11a/0x160 [ 2433.049429][T32729] should_failslab+0x9/0x20 [ 2433.054035][T32729] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2433.059352][T32729] ? sctp_add_bind_addr+0x8c/0x350 [ 2433.064717][T32729] sctp_add_bind_addr+0x8c/0x350 [ 2433.069651][T32729] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2433.075474][T32729] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2433.081179][T32729] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2433.083687][T32735] device lo entered promiscuous mode [ 2433.087297][T32729] sctp_copy_one_addr+0xad/0x610 [ 2433.087314][T32729] sctp_bind_addr_copy+0xc0/0x3c0 [ 2433.087330][T32729] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2433.109347][T32729] __sctp_connect+0x8c9/0x1050 [ 2433.114114][T32729] ? __bfs+0x550/0x550 [ 2433.118274][T32729] ? sctp_v6_destroy_sock+0x20/0x20 [ 2433.123699][T32729] ? kasan_check_write+0x14/0x20 [ 2433.128696][T32729] ? _copy_from_user+0xe0/0x120 [ 2433.133536][T32729] ? security_sctp_bind_connect+0xaa/0xd0 [ 2433.139244][T32729] sctp_setsockopt+0x2bf5/0xf2b0 [ 2433.144185][T32729] ? sctp_shutdown+0x130/0x130 [ 2433.148984][T32729] ? __lock_acquire+0xcf7/0x1a40 [ 2433.153923][T32729] ? __bfs+0x550/0x550 [ 2433.158103][T32729] ? trace_lock_acquire+0x190/0x190 [ 2433.163425][T32729] ? __bfs+0x550/0x550 [ 2433.167486][T32729] ? register_lock_class+0xde/0x1110 [ 2433.172769][T32729] ? __lock_acquire+0xcf7/0x1a40 [ 2433.177772][T32729] ? trace_lock_acquire+0x190/0x190 [ 2433.183001][T32729] ? __might_fault+0xf9/0x160 [ 2433.187687][T32729] ? __bfs+0x550/0x550 [ 2433.191763][T32729] ? kstrtoull+0x3ba/0x4e0 [ 2433.196178][T32729] ? kasan_check_write+0x14/0x20 [ 2433.201103][T32729] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2433.207244][T32729] ? __lock_acquire+0xcf7/0x1a40 [ 2433.212198][T32729] ? trace_lock_acquire+0x190/0x190 [ 2433.217408][T32729] ? trace_lock_acquire+0x190/0x190 [ 2433.222600][T32729] ? __mutex_lock_common+0x56b/0x2fc0 [ 2433.228081][T32729] ? memset+0x31/0x40 [ 2433.232056][T32729] ? fsnotify+0x14b9/0x1580 [ 2433.236930][T32729] ? rcu_lock_release+0xd/0x30 [ 2433.241820][T32729] ? rcu_lock_release+0x26/0x30 [ 2433.246671][T32729] ? __fget+0x4fe/0x540 [ 2433.250820][T32729] ? fget_many+0x30/0x30 [ 2433.255085][T32729] sock_common_setsockopt+0x99/0xb0 [ 2433.260705][T32729] __sys_setsockopt+0x1e2/0x250 [ 2433.265570][T32729] __x64_sys_setsockopt+0xbf/0xd0 [ 2433.270596][T32729] do_syscall_64+0xfe/0x140 [ 2433.275089][T32729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2433.280968][T32729] RIP: 0033:0x4597c9 [ 2433.284850][T32729] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2433.304575][T32729] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2433.313188][T32729] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2433.321410][T32729] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2433.329425][T32729] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2433.337386][T32729] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2433.345345][T32729] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:00 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:00 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:00 executing program 5 (fault-call:4 fault-nth:79): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2433.426970][T32735] device lo left promiscuous mode [ 2433.454460][T32739] FAULT_INJECTION: forcing a failure. [ 2433.454460][T32739] name failslab, interval 1, probability 0, space 0, times 0 [ 2433.467332][T32739] CPU: 0 PID: 32739 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2433.475230][T32739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2433.485723][T32739] Call Trace: [ 2433.489023][T32739] dump_stack+0x1d8/0x2f8 [ 2433.493352][T32739] should_fail+0x608/0x860 [ 2433.497925][T32739] ? setup_fault_attr+0x2b0/0x2b0 [ 2433.502957][T32739] __should_failslab+0x11a/0x160 [ 2433.507910][T32739] should_failslab+0x9/0x20 [ 2433.512412][T32739] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2433.517694][T32739] ? sctp_add_bind_addr+0x8c/0x350 [ 2433.522803][T32739] sctp_add_bind_addr+0x8c/0x350 [ 2433.527736][T32739] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2433.533259][T32739] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2433.538895][T32739] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2433.544967][T32739] sctp_copy_one_addr+0xad/0x610 [ 2433.549912][T32739] sctp_bind_addr_copy+0xc0/0x3c0 [ 2433.554936][T32739] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2433.561433][T32739] __sctp_connect+0x8c9/0x1050 [ 2433.566312][T32739] ? __bfs+0x550/0x550 [ 2433.570390][T32739] ? sctp_v6_destroy_sock+0x20/0x20 [ 2433.575734][T32739] ? kasan_check_write+0x14/0x20 [ 2433.580670][T32739] ? _copy_from_user+0xe0/0x120 [ 2433.585526][T32739] ? security_sctp_bind_connect+0xaa/0xd0 [ 2433.591243][T32739] sctp_setsockopt+0x2bf5/0xf2b0 [ 2433.596196][T32739] ? sctp_shutdown+0x130/0x130 [ 2433.601070][T32739] ? __lock_acquire+0xcf7/0x1a40 [ 2433.606026][T32739] ? __bfs+0x550/0x550 [ 2433.610098][T32739] ? trace_lock_acquire+0x190/0x190 [ 2433.615296][T32739] ? __bfs+0x550/0x550 [ 2433.619360][T32739] ? register_lock_class+0xde/0x1110 [ 2433.624648][T32739] ? __lock_acquire+0xcf7/0x1a40 [ 2433.629766][T32739] ? trace_lock_acquire+0x190/0x190 [ 2433.634975][T32739] ? __might_fault+0xf9/0x160 [ 2433.639648][T32739] ? __bfs+0x550/0x550 [ 2433.643733][T32739] ? kstrtoull+0x3ba/0x4e0 [ 2433.648212][T32739] ? kasan_check_write+0x14/0x20 [ 2433.653285][T32739] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2433.659440][T32739] ? __lock_acquire+0xcf7/0x1a40 [ 2433.664380][T32739] ? trace_lock_acquire+0x190/0x190 [ 2433.669574][T32739] ? trace_lock_acquire+0x190/0x190 [ 2433.674765][T32739] ? __mutex_lock_common+0x56b/0x2fc0 [ 2433.680132][T32739] ? memset+0x31/0x40 [ 2433.684111][T32739] ? fsnotify+0x14b9/0x1580 [ 2433.688619][T32739] ? rcu_lock_release+0xd/0x30 [ 2433.693383][T32739] ? rcu_lock_release+0x26/0x30 [ 2433.698229][T32739] ? __fget+0x4fe/0x540 [ 2433.702385][T32739] ? fget_many+0x30/0x30 [ 2433.706631][T32739] sock_common_setsockopt+0x99/0xb0 [ 2433.711830][T32739] __sys_setsockopt+0x1e2/0x250 [ 2433.716682][T32739] __x64_sys_setsockopt+0xbf/0xd0 [ 2433.721706][T32739] do_syscall_64+0xfe/0x140 [ 2433.726212][T32739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2433.732154][T32739] RIP: 0033:0x4597c9 [ 2433.736056][T32739] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2433.755958][T32739] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2433.764380][T32739] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2433.772397][T32739] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2433.780384][T32739] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2433.788351][T32739] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2433.796322][T32739] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:01 executing program 5 (fault-call:4 fault-nth:80): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:01 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x4c000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000801ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:49:01 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\a', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2433.918349][ C0] print_req_error: 449 callbacks suppressed [ 2433.918358][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2433.931698][ C0] buffer_io_error: 443 callbacks suppressed [ 2433.931706][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000ff0bffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2434.014075][T32763] FAULT_INJECTION: forcing a failure. [ 2434.014075][T32763] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.027565][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2434.034693][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2434.043283][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2434.043410][T32763] CPU: 0 PID: 32763 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2434.050463][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2434.058419][T32763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2434.058425][T32763] Call Trace: [ 2434.058442][T32763] dump_stack+0x1d8/0x2f8 [ 2434.058458][T32763] should_fail+0x608/0x860 [ 2434.058471][T32763] ? setup_fault_attr+0x2b0/0x2b0 [ 2434.058491][T32763] __should_failslab+0x11a/0x160 [ 2434.098368][T32763] should_failslab+0x9/0x20 [ 2434.102878][T32763] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2434.108167][T32763] ? sctp_add_bind_addr+0x8c/0x350 [ 2434.113286][T32763] sctp_add_bind_addr+0x8c/0x350 [ 2434.118223][T32763] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2434.123595][T32763] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2434.129228][T32763] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2434.135360][T32763] sctp_copy_one_addr+0xad/0x610 [ 2434.140303][T32763] sctp_bind_addr_copy+0xc0/0x3c0 [ 2434.145328][T32763] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2434.151567][T32763] __sctp_connect+0x8c9/0x1050 [ 2434.156332][T32763] ? __bfs+0x550/0x550 [ 2434.160559][T32763] ? sctp_v6_destroy_sock+0x20/0x20 [ 2434.165766][T32763] ? kasan_check_write+0x14/0x20 [ 2434.170808][T32763] ? _copy_from_user+0xe0/0x120 [ 2434.175655][T32763] ? security_sctp_bind_connect+0xaa/0xd0 [ 2434.181374][T32763] sctp_setsockopt+0x2bf5/0xf2b0 [ 2434.186462][T32763] ? sctp_shutdown+0x130/0x130 [ 2434.191338][T32763] ? __lock_acquire+0xcf7/0x1a40 [ 2434.196271][T32763] ? __bfs+0x550/0x550 [ 2434.200494][T32763] ? trace_lock_acquire+0x190/0x190 [ 2434.205699][T32763] ? __bfs+0x550/0x550 [ 2434.212289][T32763] ? register_lock_class+0xde/0x1110 [ 2434.217576][T32763] ? __lock_acquire+0xcf7/0x1a40 [ 2434.222516][T32763] ? trace_lock_acquire+0x190/0x190 [ 2434.227707][T32763] ? __might_fault+0xf9/0x160 [ 2434.232384][T32763] ? __bfs+0x550/0x550 [ 2434.236453][T32763] ? kstrtoull+0x3ba/0x4e0 [ 2434.240929][T32763] ? kasan_check_write+0x14/0x20 [ 2434.245861][T32763] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2434.252012][T32763] ? __lock_acquire+0xcf7/0x1a40 [ 2434.258831][T32763] ? trace_lock_acquire+0x190/0x190 [ 2434.264023][T32763] ? trace_lock_acquire+0x190/0x190 [ 2434.269235][T32763] ? __mutex_lock_common+0x56b/0x2fc0 [ 2434.274605][T32763] ? memset+0x31/0x40 [ 2434.278589][T32763] ? fsnotify+0x14b9/0x1580 [ 2434.283096][T32763] ? rcu_lock_release+0xd/0x30 [ 2434.287864][T32763] ? rcu_lock_release+0x26/0x30 [ 2434.292711][T32763] ? __fget+0x4fe/0x540 [ 2434.296867][T32763] ? fget_many+0x30/0x30 [ 2434.301131][T32763] sock_common_setsockopt+0x99/0xb0 [ 2434.306332][T32763] __sys_setsockopt+0x1e2/0x250 [ 2434.311183][T32763] __x64_sys_setsockopt+0xbf/0xd0 [ 2434.316306][T32763] do_syscall_64+0xfe/0x140 [ 2434.320809][T32763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2434.326703][T32763] RIP: 0033:0x4597c9 [ 2434.330597][T32763] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2434.350340][T32763] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2434.358751][T32763] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2434.366718][T32763] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2434.374688][T32763] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2434.382654][T32763] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2434.390621][T32763] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2434.399698][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2434.400049][T32767] device lo entered promiscuous mode 06:49:01 executing program 5 (fault-call:4 fault-nth:81): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2434.406913][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2434.435372][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2434.442768][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2434.451976][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2434.459277][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2434.467469][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2434.474594][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2434.482813][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2434.489957][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2434.498124][T32752] ldm_validate_partition_table(): Disk read failed. [ 2434.504926][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2434.512240][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2434.520484][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2434.527746][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2434.536725][T32767] device lo left promiscuous mode 06:49:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000302ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2434.566326][T32752] Dev loop0: unable to read RDB block 0 [ 2434.576176][T32752] loop0: unable to read partition table [ 2434.602384][T32752] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:02 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:02 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x5c000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2434.663160][ T310] FAULT_INJECTION: forcing a failure. [ 2434.663160][ T310] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.687660][ T310] CPU: 0 PID: 310 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2434.695402][ T310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2434.705603][ T310] Call Trace: [ 2434.708903][ T310] dump_stack+0x1d8/0x2f8 [ 2434.713242][ T310] should_fail+0x608/0x860 [ 2434.717669][ T310] ? setup_fault_attr+0x2b0/0x2b0 [ 2434.722712][ T310] __should_failslab+0x11a/0x160 [ 2434.727800][ T310] should_failslab+0x9/0x20 [ 2434.732307][ T310] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2434.737589][ T310] ? sctp_add_bind_addr+0x8c/0x350 [ 2434.742700][ T310] sctp_add_bind_addr+0x8c/0x350 [ 2434.747653][ T310] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2434.753025][ T310] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2434.758660][ T310] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2434.764862][ T310] sctp_copy_one_addr+0xad/0x610 [ 2434.769803][ T310] sctp_bind_addr_copy+0xc0/0x3c0 [ 2434.774960][ T310] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2434.781198][ T310] __sctp_connect+0x8c9/0x1050 [ 2434.786075][ T310] ? __bfs+0x550/0x550 [ 2434.790194][ T310] ? sctp_v6_destroy_sock+0x20/0x20 [ 2434.795399][ T310] ? kasan_check_write+0x14/0x20 [ 2434.800330][ T310] ? _copy_from_user+0xe0/0x120 [ 2434.805190][ T310] ? security_sctp_bind_connect+0xaa/0xd0 [ 2434.811018][ T310] sctp_setsockopt+0x2bf5/0xf2b0 [ 2434.815961][ T310] ? sctp_shutdown+0x130/0x130 [ 2434.820731][ T310] ? __lock_acquire+0xcf7/0x1a40 [ 2434.825689][ T310] ? __bfs+0x550/0x550 [ 2434.829761][ T310] ? trace_lock_acquire+0x190/0x190 [ 2434.834953][ T310] ? __bfs+0x550/0x550 [ 2434.839019][ T310] ? register_lock_class+0xde/0x1110 [ 2434.844303][ T310] ? __lock_acquire+0xcf7/0x1a40 [ 2434.849246][ T310] ? trace_lock_acquire+0x190/0x190 [ 2434.854458][ T310] ? __might_fault+0xf9/0x160 [ 2434.859134][ T310] ? __bfs+0x550/0x550 [ 2434.863196][ T310] ? kstrtoull+0x3ba/0x4e0 [ 2434.867725][ T310] ? kasan_check_write+0x14/0x20 [ 2434.872656][ T310] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2434.878854][ T310] ? __lock_acquire+0xcf7/0x1a40 [ 2434.883997][ T310] ? trace_lock_acquire+0x190/0x190 [ 2434.889187][ T310] ? trace_lock_acquire+0x190/0x190 [ 2434.894385][ T310] ? __mutex_lock_common+0x56b/0x2fc0 [ 2434.899755][ T310] ? memset+0x31/0x40 [ 2434.903738][ T310] ? fsnotify+0x14b9/0x1580 [ 2434.908248][ T310] ? rcu_lock_release+0xd/0x30 [ 2434.913010][ T310] ? rcu_lock_release+0x26/0x30 [ 2434.917853][ T310] ? __fget+0x4fe/0x540 [ 2434.922009][ T310] ? fget_many+0x30/0x30 [ 2434.926255][ T310] sock_common_setsockopt+0x99/0xb0 [ 2434.931470][ T310] __sys_setsockopt+0x1e2/0x250 [ 2434.936322][ T310] __x64_sys_setsockopt+0xbf/0xd0 [ 2434.941402][ T310] do_syscall_64+0xfe/0x140 [ 2434.946009][ T310] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2434.952030][ T310] RIP: 0033:0x4597c9 [ 2434.955931][ T310] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2434.975591][ T310] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2434.984145][ T310] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2434.992110][ T310] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2435.000286][ T310] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2435.008340][ T310] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2435.016404][ T310] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2435.187847][ T323] device lo entered promiscuous mode [ 2435.195326][ T320] ldm_validate_partition_table(): Disk read failed. [ 2435.217694][ T329] device lo left promiscuous mode [ 2435.223234][ T320] Dev loop0: unable to read RDB block 0 06:49:02 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000308ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:49:02 executing program 5 (fault-call:4 fault-nth:82): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:02 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\b', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2435.240222][ T320] loop0: unable to read partition table [ 2435.260222][ T320] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:02 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x60000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2435.353658][ T337] FAULT_INJECTION: forcing a failure. [ 2435.353658][ T337] name failslab, interval 1, probability 0, space 0, times 0 [ 2435.384207][ T337] CPU: 0 PID: 337 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2435.392316][ T337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2435.402517][ T337] Call Trace: [ 2435.406098][ T337] dump_stack+0x1d8/0x2f8 [ 2435.410454][ T337] should_fail+0x608/0x860 [ 2435.414890][ T337] ? setup_fault_attr+0x2b0/0x2b0 [ 2435.420031][ T337] __should_failslab+0x11a/0x160 [ 2435.424998][ T337] should_failslab+0x9/0x20 [ 2435.429512][ T337] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2435.434807][ T337] ? sctp_add_bind_addr+0x8c/0x350 [ 2435.440040][ T337] sctp_add_bind_addr+0x8c/0x350 [ 2435.440052][ T337] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2435.440069][ T337] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2435.440084][ T337] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2435.456201][ T337] sctp_copy_one_addr+0xad/0x610 [ 2435.456218][ T337] sctp_bind_addr_copy+0xc0/0x3c0 [ 2435.456234][ T337] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2435.456247][ T337] __sctp_connect+0x8c9/0x1050 [ 2435.456258][ T337] ? __bfs+0x550/0x550 [ 2435.456296][ T337] ? sctp_v6_destroy_sock+0x20/0x20 [ 2435.456318][ T337] ? kasan_check_write+0x14/0x20 [ 2435.497708][ T337] ? _copy_from_user+0xe0/0x120 [ 2435.502573][ T337] ? security_sctp_bind_connect+0xaa/0xd0 [ 2435.508323][ T337] sctp_setsockopt+0x2bf5/0xf2b0 [ 2435.513292][ T337] ? sctp_shutdown+0x130/0x130 [ 2435.518085][ T337] ? __lock_acquire+0xcf7/0x1a40 [ 2435.523034][ T337] ? __bfs+0x550/0x550 [ 2435.527134][ T337] ? trace_lock_acquire+0x190/0x190 [ 2435.532341][ T337] ? __bfs+0x550/0x550 [ 2435.536416][ T337] ? register_lock_class+0xde/0x1110 [ 2435.541723][ T337] ? __lock_acquire+0xcf7/0x1a40 [ 2435.546678][ T337] ? trace_lock_acquire+0x190/0x190 [ 2435.551907][ T337] ? __might_fault+0xf9/0x160 [ 2435.556601][ T337] ? __bfs+0x550/0x550 [ 2435.560851][ T337] ? kstrtoull+0x3ba/0x4e0 [ 2435.565298][ T337] ? kasan_check_write+0x14/0x20 [ 2435.570239][ T337] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2435.576479][ T337] ? __lock_acquire+0xcf7/0x1a40 [ 2435.581420][ T337] ? trace_lock_acquire+0x190/0x190 [ 2435.586604][ T337] ? trace_lock_acquire+0x190/0x190 [ 2435.591794][ T337] ? __mutex_lock_common+0x56b/0x2fc0 [ 2435.597319][ T337] ? memset+0x31/0x40 [ 2435.601449][ T337] ? fsnotify+0x14b9/0x1580 [ 2435.602237][ T353] device lo entered promiscuous mode [ 2435.605983][ T337] ? rcu_lock_release+0xd/0x30 [ 2435.606001][ T337] ? rcu_lock_release+0x26/0x30 [ 2435.606011][ T337] ? __fget+0x4fe/0x540 [ 2435.606028][ T337] ? fget_many+0x30/0x30 [ 2435.606046][ T337] sock_common_setsockopt+0x99/0xb0 [ 2435.606062][ T337] __sys_setsockopt+0x1e2/0x250 [ 2435.639479][ T337] __x64_sys_setsockopt+0xbf/0xd0 [ 2435.644507][ T337] do_syscall_64+0xfe/0x140 [ 2435.649014][ T337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2435.654895][ T337] RIP: 0033:0x4597c9 [ 2435.658800][ T337] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2435.678734][ T337] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2435.687280][ T337] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2435.695357][ T337] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 06:49:03 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff021c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:49:03 executing program 5 (fault-call:4 fault-nth:83): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2435.703469][ T337] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2435.711575][ T337] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2435.719550][ T337] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:03 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2435.868232][ T353] device lo left promiscuous mode [ 2435.903846][ T366] FAULT_INJECTION: forcing a failure. [ 2435.903846][ T366] name failslab, interval 1, probability 0, space 0, times 0 [ 2435.918116][ T366] CPU: 0 PID: 366 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2435.925849][ T366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2435.935905][ T366] Call Trace: [ 2435.939197][ T366] dump_stack+0x1d8/0x2f8 [ 2435.943528][ T366] should_fail+0x608/0x860 [ 2435.947946][ T366] ? setup_fault_attr+0x2b0/0x2b0 [ 2435.952976][ T366] __should_failslab+0x11a/0x160 [ 2435.957914][ T366] should_failslab+0x9/0x20 [ 2435.962411][ T366] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2435.967711][ T366] ? sctp_add_bind_addr+0x8c/0x350 [ 2435.972819][ T366] sctp_add_bind_addr+0x8c/0x350 [ 2435.977764][ T366] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2435.983221][ T366] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2435.988852][ T366] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2435.994924][ T366] sctp_copy_one_addr+0xad/0x610 [ 2435.999863][ T366] sctp_bind_addr_copy+0xc0/0x3c0 [ 2436.004887][ T366] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2436.011126][ T366] __sctp_connect+0x8c9/0x1050 [ 2436.015888][ T366] ? __bfs+0x550/0x550 [ 2436.019964][ T366] ? sctp_v6_destroy_sock+0x20/0x20 [ 2436.025163][ T366] ? kasan_check_write+0x14/0x20 [ 2436.030096][ T366] ? _copy_from_user+0xe0/0x120 [ 2436.034941][ T366] ? security_sctp_bind_connect+0xaa/0xd0 [ 2436.040658][ T366] sctp_setsockopt+0x2bf5/0xf2b0 [ 2436.045594][ T366] ? sctp_shutdown+0x130/0x130 [ 2436.050355][ T366] ? __lock_acquire+0xcf7/0x1a40 [ 2436.055480][ T366] ? __bfs+0x550/0x550 [ 2436.059555][ T366] ? trace_lock_acquire+0x190/0x190 [ 2436.064745][ T366] ? __bfs+0x550/0x550 [ 2436.068811][ T366] ? register_lock_class+0xde/0x1110 [ 2436.074090][ T366] ? __lock_acquire+0xcf7/0x1a40 [ 2436.079030][ T366] ? trace_lock_acquire+0x190/0x190 [ 2436.084224][ T366] ? __might_fault+0xf9/0x160 [ 2436.088898][ T366] ? __bfs+0x550/0x550 [ 2436.093082][ T366] ? kstrtoull+0x3ba/0x4e0 [ 2436.097611][ T366] ? kasan_check_write+0x14/0x20 [ 2436.102543][ T366] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2436.108694][ T366] ? __lock_acquire+0xcf7/0x1a40 [ 2436.113742][ T366] ? trace_lock_acquire+0x190/0x190 [ 2436.118936][ T366] ? trace_lock_acquire+0x190/0x190 [ 2436.124127][ T366] ? __mutex_lock_common+0x56b/0x2fc0 [ 2436.129502][ T366] ? memset+0x31/0x40 [ 2436.133483][ T366] ? fsnotify+0x14b9/0x1580 [ 2436.137990][ T366] ? rcu_lock_release+0xd/0x30 [ 2436.142754][ T366] ? rcu_lock_release+0x26/0x30 [ 2436.147609][ T366] ? __fget+0x4fe/0x540 [ 2436.151765][ T366] ? fget_many+0x30/0x30 [ 2436.156011][ T366] sock_common_setsockopt+0x99/0xb0 [ 2436.161444][ T366] __sys_setsockopt+0x1e2/0x250 [ 2436.166297][ T366] __x64_sys_setsockopt+0xbf/0xd0 [ 2436.171334][ T366] do_syscall_64+0xfe/0x140 [ 2436.175837][ T366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.181723][ T366] RIP: 0033:0x4597c9 [ 2436.185612][ T366] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:49:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff031c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2436.205211][ T366] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2436.213620][ T366] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2436.221710][ T366] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2436.229679][ T366] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2436.237770][ T366] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2436.245745][ T366] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:03 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x66]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2436.319692][ T354] ldm_validate_partition_table(): Disk read failed. [ 2436.327325][ T354] Dev loop0: unable to read RDB block 0 [ 2436.333938][ T354] loop0: unable to read partition table [ 2436.339927][ T354] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:03 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:03 executing program 5 (fault-call:4 fault-nth:84): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:03 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x68000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\t', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:03 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0200000000ae1e"], 0x14}}, 0x0) 06:49:03 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2436.586327][ T386] device lo entered promiscuous mode 06:49:04 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2436.675089][ T395] FAULT_INJECTION: forcing a failure. [ 2436.675089][ T395] name failslab, interval 1, probability 0, space 0, times 0 [ 2436.702492][ T395] CPU: 1 PID: 395 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2436.710408][ T395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2436.720462][ T395] Call Trace: [ 2436.723742][ T395] dump_stack+0x1d8/0x2f8 [ 2436.728068][ T395] should_fail+0x608/0x860 [ 2436.732474][ T395] ? setup_fault_attr+0x2b0/0x2b0 [ 2436.737674][ T395] __should_failslab+0x11a/0x160 [ 2436.742720][ T395] should_failslab+0x9/0x20 [ 2436.747353][ T395] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2436.752649][ T395] ? sctp_add_bind_addr+0x8c/0x350 [ 2436.757829][ T395] sctp_add_bind_addr+0x8c/0x350 [ 2436.762755][ T395] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2436.768214][ T395] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2436.773837][ T395] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2436.779901][ T395] sctp_copy_one_addr+0xad/0x610 [ 2436.784830][ T395] sctp_bind_addr_copy+0xc0/0x3c0 [ 2436.789843][ T395] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2436.796073][ T395] __sctp_connect+0x8c9/0x1050 [ 2436.800826][ T395] ? __bfs+0x550/0x550 [ 2436.804905][ T395] ? sctp_v6_destroy_sock+0x20/0x20 [ 2436.810111][ T395] ? kasan_check_write+0x14/0x20 [ 2436.815036][ T395] ? _copy_from_user+0xe0/0x120 [ 2436.819952][ T395] ? security_sctp_bind_connect+0xaa/0xd0 [ 2436.825693][ T395] sctp_setsockopt+0x2bf5/0xf2b0 [ 2436.830743][ T395] ? sctp_shutdown+0x130/0x130 [ 2436.835498][ T395] ? __lock_acquire+0xcf7/0x1a40 [ 2436.840435][ T395] ? __bfs+0x550/0x550 [ 2436.844514][ T395] ? trace_lock_acquire+0x190/0x190 [ 2436.849751][ T395] ? __bfs+0x550/0x550 [ 2436.853831][ T395] ? register_lock_class+0xde/0x1110 [ 2436.859116][ T395] ? __lock_acquire+0xcf7/0x1a40 [ 2436.864137][ T395] ? trace_lock_acquire+0x190/0x190 [ 2436.869563][ T395] ? __might_fault+0xf9/0x160 [ 2436.874314][ T395] ? __bfs+0x550/0x550 [ 2436.878390][ T395] ? kstrtoull+0x3ba/0x4e0 [ 2436.882802][ T395] ? kasan_check_write+0x14/0x20 [ 2436.887728][ T395] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2436.893958][ T395] ? __lock_acquire+0xcf7/0x1a40 [ 2436.898889][ T395] ? trace_lock_acquire+0x190/0x190 [ 2436.904090][ T395] ? trace_lock_acquire+0x190/0x190 [ 2436.909292][ T395] ? __mutex_lock_common+0x56b/0x2fc0 [ 2436.914651][ T395] ? memset+0x31/0x40 [ 2436.918638][ T395] ? fsnotify+0x14b9/0x1580 [ 2436.923161][ T395] ? rcu_lock_release+0xd/0x30 [ 2436.927928][ T395] ? rcu_lock_release+0x26/0x30 [ 2436.932865][ T395] ? __fget+0x4fe/0x540 [ 2436.937013][ T395] ? fget_many+0x30/0x30 [ 2436.941247][ T395] sock_common_setsockopt+0x99/0xb0 [ 2436.946589][ T395] __sys_setsockopt+0x1e2/0x250 [ 2436.951478][ T395] __x64_sys_setsockopt+0xbf/0xd0 [ 2436.956493][ T395] do_syscall_64+0xfe/0x140 [ 2436.961006][ T395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.966886][ T395] RIP: 0033:0x4597c9 [ 2436.970830][ T395] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2436.990448][ T395] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2436.998870][ T395] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2437.006826][ T395] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2437.014839][ T395] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 06:49:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0300000000ae1e"], 0x14}}, 0x0) 06:49:04 executing program 5 (fault-call:4 fault-nth:85): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2437.022804][ T395] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2437.030901][ T395] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2437.047029][ T408] device lo left promiscuous mode [ 2437.142084][ T407] ldm_validate_partition_table(): Disk read failed. 06:49:04 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x6c000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:04 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2437.185549][ T407] Dev loop0: unable to read RDB block 0 [ 2437.204200][ T407] loop0: unable to read partition table [ 2437.213813][ T407] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2437.256361][ T420] FAULT_INJECTION: forcing a failure. [ 2437.256361][ T420] name failslab, interval 1, probability 0, space 0, times 0 [ 2437.286496][ T420] CPU: 1 PID: 420 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2437.294417][ T420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2437.304483][ T420] Call Trace: [ 2437.307796][ T420] dump_stack+0x1d8/0x2f8 [ 2437.312140][ T420] should_fail+0x608/0x860 [ 2437.316568][ T420] ? setup_fault_attr+0x2b0/0x2b0 [ 2437.321612][ T420] __should_failslab+0x11a/0x160 [ 2437.326560][ T420] should_failslab+0x9/0x20 [ 2437.331138][ T420] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2437.336426][ T420] ? sctp_add_bind_addr+0x8c/0x350 [ 2437.341678][ T420] sctp_add_bind_addr+0x8c/0x350 [ 2437.346617][ T420] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2437.351989][ T420] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2437.357672][ T420] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2437.363833][ T420] sctp_copy_one_addr+0xad/0x610 [ 2437.368773][ T420] sctp_bind_addr_copy+0xc0/0x3c0 [ 2437.371170][ T426] device lo entered promiscuous mode [ 2437.373980][ T420] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2437.373995][ T420] __sctp_connect+0x8c9/0x1050 [ 2437.374010][ T420] ? __bfs+0x550/0x550 [ 2437.394426][ T420] ? sctp_v6_destroy_sock+0x20/0x20 [ 2437.399625][ T420] ? kasan_check_write+0x14/0x20 [ 2437.404549][ T420] ? _copy_from_user+0xe0/0x120 [ 2437.409396][ T420] ? security_sctp_bind_connect+0xaa/0xd0 [ 2437.415128][ T420] sctp_setsockopt+0x2bf5/0xf2b0 [ 2437.420317][ T420] ? sctp_shutdown+0x130/0x130 [ 2437.425068][ T420] ? __lock_acquire+0xcf7/0x1a40 [ 2437.429991][ T420] ? __bfs+0x550/0x550 [ 2437.434051][ T420] ? trace_lock_acquire+0x190/0x190 [ 2437.439358][ T420] ? __bfs+0x550/0x550 [ 2437.443416][ T420] ? register_lock_class+0xde/0x1110 [ 2437.448689][ T420] ? __lock_acquire+0xcf7/0x1a40 [ 2437.453632][ T420] ? trace_lock_acquire+0x190/0x190 [ 2437.459341][ T420] ? __might_fault+0xf9/0x160 [ 2437.464007][ T420] ? __bfs+0x550/0x550 [ 2437.468065][ T420] ? kstrtoull+0x3ba/0x4e0 [ 2437.472532][ T420] ? kasan_check_write+0x14/0x20 [ 2437.477459][ T420] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2437.483606][ T420] ? __lock_acquire+0xcf7/0x1a40 [ 2437.488538][ T420] ? trace_lock_acquire+0x190/0x190 [ 2437.493741][ T420] ? trace_lock_acquire+0x190/0x190 [ 2437.498928][ T420] ? __mutex_lock_common+0x56b/0x2fc0 [ 2437.504288][ T420] ? memset+0x31/0x40 [ 2437.508266][ T420] ? fsnotify+0x14b9/0x1580 [ 2437.512880][ T420] ? rcu_lock_release+0xd/0x30 [ 2437.517644][ T420] ? rcu_lock_release+0x26/0x30 [ 2437.522652][ T420] ? __fget+0x4fe/0x540 [ 2437.526823][ T420] ? fget_many+0x30/0x30 [ 2437.531193][ T420] sock_common_setsockopt+0x99/0xb0 [ 2437.536382][ T420] __sys_setsockopt+0x1e2/0x250 [ 2437.541328][ T420] __x64_sys_setsockopt+0xbf/0xd0 [ 2437.546341][ T420] do_syscall_64+0xfe/0x140 [ 2437.550962][ T420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2437.556851][ T420] RIP: 0033:0x4597c9 [ 2437.560805][ T420] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2437.580396][ T420] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2437.588794][ T420] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2437.596752][ T420] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2437.604710][ T420] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2437.612669][ T420] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2437.620682][ T420] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2437.720181][ T426] device lo left promiscuous mode 06:49:05 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\n', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0003000000ae1e"], 0x14}}, 0x0) 06:49:05 executing program 5 (fault-call:4 fault-nth:86): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:05 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:05 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x74000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2437.823911][ T407] ldm_validate_partition_table(): Disk read failed. [ 2437.832857][ T407] Dev loop0: unable to read RDB block 0 [ 2437.851773][ T407] loop0: unable to read partition table [ 2437.858066][ T407] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:05 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2437.953087][ T450] device lo entered promiscuous mode [ 2437.963911][ T442] FAULT_INJECTION: forcing a failure. [ 2437.963911][ T442] name failslab, interval 1, probability 0, space 0, times 0 [ 2437.982819][ T442] CPU: 1 PID: 442 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2437.990655][ T442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2438.000857][ T442] Call Trace: [ 2438.004154][ T442] dump_stack+0x1d8/0x2f8 [ 2438.008536][ T442] should_fail+0x608/0x860 [ 2438.012949][ T442] ? setup_fault_attr+0x2b0/0x2b0 [ 2438.018058][ T442] __should_failslab+0x11a/0x160 [ 2438.022994][ T442] should_failslab+0x9/0x20 [ 2438.027492][ T442] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2438.032773][ T442] ? sctp_add_bind_addr+0x8c/0x350 [ 2438.037910][ T442] sctp_add_bind_addr+0x8c/0x350 [ 2438.042844][ T442] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2438.048319][ T442] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2438.053950][ T442] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2438.060020][ T442] sctp_copy_one_addr+0xad/0x610 [ 2438.064958][ T442] sctp_bind_addr_copy+0xc0/0x3c0 [ 2438.070016][ T442] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2438.076382][ T442] __sctp_connect+0x8c9/0x1050 [ 2438.081141][ T442] ? __bfs+0x550/0x550 [ 2438.085351][ T442] ? sctp_v6_destroy_sock+0x20/0x20 [ 2438.090570][ T442] ? kasan_check_write+0x14/0x20 [ 2438.095504][ T442] ? _copy_from_user+0xe0/0x120 [ 2438.100352][ T442] ? security_sctp_bind_connect+0xaa/0xd0 [ 2438.106072][ T442] sctp_setsockopt+0x2bf5/0xf2b0 [ 2438.111010][ T442] ? sctp_shutdown+0x130/0x130 [ 2438.115770][ T442] ? __lock_acquire+0xcf7/0x1a40 [ 2438.120810][ T442] ? __bfs+0x550/0x550 [ 2438.124897][ T442] ? trace_lock_acquire+0x190/0x190 [ 2438.130089][ T442] ? __bfs+0x550/0x550 [ 2438.134153][ T442] ? register_lock_class+0xde/0x1110 [ 2438.139435][ T442] ? __lock_acquire+0xcf7/0x1a40 [ 2438.144378][ T442] ? trace_lock_acquire+0x190/0x190 [ 2438.149681][ T442] ? __might_fault+0xf9/0x160 [ 2438.154355][ T442] ? __bfs+0x550/0x550 [ 2438.158424][ T442] ? kstrtoull+0x3ba/0x4e0 [ 2438.162842][ T442] ? kasan_check_write+0x14/0x20 [ 2438.167949][ T442] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2438.174148][ T442] ? __lock_acquire+0xcf7/0x1a40 [ 2438.179090][ T442] ? trace_lock_acquire+0x190/0x190 [ 2438.184339][ T442] ? trace_lock_acquire+0x190/0x190 [ 2438.189536][ T442] ? __mutex_lock_common+0x56b/0x2fc0 [ 2438.194901][ T442] ? memset+0x31/0x40 [ 2438.198892][ T442] ? fsnotify+0x14b9/0x1580 [ 2438.203398][ T442] ? rcu_lock_release+0xd/0x30 [ 2438.208161][ T442] ? rcu_lock_release+0x26/0x30 [ 2438.213005][ T442] ? __fget+0x4fe/0x540 [ 2438.217162][ T442] ? fget_many+0x30/0x30 [ 2438.221406][ T442] sock_common_setsockopt+0x99/0xb0 [ 2438.226653][ T442] __sys_setsockopt+0x1e2/0x250 [ 2438.231500][ T442] __x64_sys_setsockopt+0xbf/0xd0 [ 2438.236521][ T442] do_syscall_64+0xfe/0x140 [ 2438.241053][ T442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.246936][ T442] RIP: 0033:0x4597c9 [ 2438.250826][ T442] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2438.270422][ T442] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2438.278826][ T442] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2438.286851][ T442] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2438.294819][ T442] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 06:49:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8cc00e000000ae1e"], 0x14}}, 0x0) [ 2438.302790][ T442] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2438.310820][ T442] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:05 executing program 5 (fault-call:4 fault-nth:87): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2438.351594][ T448] ldm_validate_partition_table(): Disk read failed. [ 2438.358693][ T450] device lo left promiscuous mode [ 2438.404227][ T448] Dev loop0: unable to read RDB block 0 [ 2438.440440][ T448] loop0: unable to read partition table 06:49:05 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:05 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x7a000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2438.463755][ T448] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:05 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2438.520245][ T466] FAULT_INJECTION: forcing a failure. [ 2438.520245][ T466] name failslab, interval 1, probability 0, space 0, times 0 [ 2438.542628][ T466] CPU: 0 PID: 466 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2438.550379][ T466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2438.560442][ T466] Call Trace: [ 2438.563747][ T466] dump_stack+0x1d8/0x2f8 [ 2438.568100][ T466] should_fail+0x608/0x860 [ 2438.572567][ T466] ? setup_fault_attr+0x2b0/0x2b0 [ 2438.577616][ T466] __should_failslab+0x11a/0x160 [ 2438.582561][ T466] should_failslab+0x9/0x20 [ 2438.587052][ T466] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2438.592332][ T466] ? sctp_add_bind_addr+0x8c/0x350 [ 2438.597448][ T466] sctp_add_bind_addr+0x8c/0x350 [ 2438.602372][ T466] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2438.607735][ T466] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2438.613444][ T466] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2438.619501][ T466] sctp_copy_one_addr+0xad/0x610 [ 2438.624438][ T466] sctp_bind_addr_copy+0xc0/0x3c0 [ 2438.629609][ T466] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2438.635847][ T466] __sctp_connect+0x8c9/0x1050 [ 2438.640613][ T466] ? __bfs+0x550/0x550 [ 2438.644675][ T466] ? sctp_v6_destroy_sock+0x20/0x20 [ 2438.649916][ T466] ? kasan_check_write+0x14/0x20 [ 2438.654837][ T466] ? _copy_from_user+0xe0/0x120 [ 2438.659675][ T466] ? security_sctp_bind_connect+0xaa/0xd0 [ 2438.665383][ T466] sctp_setsockopt+0x2bf5/0xf2b0 [ 2438.670323][ T466] ? sctp_shutdown+0x130/0x130 [ 2438.675075][ T466] ? __lock_acquire+0xcf7/0x1a40 [ 2438.680150][ T466] ? __bfs+0x550/0x550 [ 2438.684211][ T466] ? trace_lock_acquire+0x190/0x190 [ 2438.689445][ T466] ? __bfs+0x550/0x550 [ 2438.693498][ T466] ? register_lock_class+0xde/0x1110 [ 2438.698778][ T466] ? __lock_acquire+0xcf7/0x1a40 [ 2438.703878][ T466] ? trace_lock_acquire+0x190/0x190 [ 2438.709087][ T466] ? __might_fault+0xf9/0x160 [ 2438.713833][ T466] ? __bfs+0x550/0x550 [ 2438.717901][ T466] ? kstrtoull+0x3ba/0x4e0 [ 2438.722309][ T466] ? kasan_check_write+0x14/0x20 [ 2438.727229][ T466] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2438.733367][ T466] ? __lock_acquire+0xcf7/0x1a40 [ 2438.738306][ T466] ? trace_lock_acquire+0x190/0x190 [ 2438.743489][ T466] ? trace_lock_acquire+0x190/0x190 [ 2438.748685][ T466] ? __mutex_lock_common+0x56b/0x2fc0 [ 2438.754056][ T466] ? memset+0x31/0x40 [ 2438.758025][ T466] ? fsnotify+0x14b9/0x1580 [ 2438.762521][ T466] ? rcu_lock_release+0xd/0x30 [ 2438.767364][ T466] ? rcu_lock_release+0x26/0x30 [ 2438.772203][ T466] ? __fget+0x4fe/0x540 [ 2438.776350][ T466] ? fget_many+0x30/0x30 [ 2438.780584][ T466] sock_common_setsockopt+0x99/0xb0 [ 2438.785772][ T466] __sys_setsockopt+0x1e2/0x250 [ 2438.790626][ T466] __x64_sys_setsockopt+0xbf/0xd0 [ 2438.795655][ T466] do_syscall_64+0xfe/0x140 [ 2438.800146][ T466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.806176][ T466] RIP: 0033:0x4597c9 [ 2438.810143][ T466] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2438.829753][ T466] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2438.838146][ T466] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2438.846105][ T466] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2438.854068][ T466] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2438.862044][ T466] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2438.870018][ T466] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8cfb27000000ae1e"], 0x14}}, 0x0) 06:49:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\v', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:06 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:06 executing program 5 (fault-call:4 fault-nth:88): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2438.976344][ T476] device lo entered promiscuous mode 06:49:06 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xe80]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2439.063159][ T481] device lo left promiscuous mode [ 2439.079653][ T487] FAULT_INJECTION: forcing a failure. [ 2439.079653][ T487] name failslab, interval 1, probability 0, space 0, times 0 [ 2439.095034][ T487] CPU: 0 PID: 487 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2439.102771][ T487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2439.112834][ T487] Call Trace: [ 2439.116126][ T487] dump_stack+0x1d8/0x2f8 [ 2439.120460][ T487] should_fail+0x608/0x860 [ 2439.124872][ T487] ? setup_fault_attr+0x2b0/0x2b0 [ 2439.129899][ T487] __should_failslab+0x11a/0x160 [ 2439.134988][ T487] should_failslab+0x9/0x20 [ 2439.139486][ T487] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2439.144765][ T487] ? sctp_add_bind_addr+0x8c/0x350 [ 2439.149872][ T487] sctp_add_bind_addr+0x8c/0x350 [ 2439.154811][ T487] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2439.160184][ T487] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2439.165820][ T487] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2439.172024][ T487] sctp_copy_one_addr+0xad/0x610 [ 2439.176964][ T487] sctp_bind_addr_copy+0xc0/0x3c0 [ 2439.181986][ T487] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2439.188257][ T487] __sctp_connect+0x8c9/0x1050 [ 2439.193051][ T487] ? __bfs+0x550/0x550 [ 2439.197139][ T487] ? sctp_v6_destroy_sock+0x20/0x20 [ 2439.202343][ T487] ? kasan_check_write+0x14/0x20 [ 2439.207534][ T487] ? _copy_from_user+0xe0/0x120 [ 2439.213171][ T487] ? security_sctp_bind_connect+0xaa/0xd0 [ 2439.218891][ T487] sctp_setsockopt+0x2bf5/0xf2b0 [ 2439.223913][ T487] ? sctp_shutdown+0x130/0x130 [ 2439.228679][ T487] ? __lock_acquire+0xcf7/0x1a40 [ 2439.233607][ T487] ? __bfs+0x550/0x550 [ 2439.237677][ T487] ? trace_lock_acquire+0x190/0x190 [ 2439.242881][ T487] ? __bfs+0x550/0x550 [ 2439.246944][ T487] ? register_lock_class+0xde/0x1110 [ 2439.252230][ T487] ? __lock_acquire+0xcf7/0x1a40 [ 2439.257174][ T487] ? trace_lock_acquire+0x190/0x190 [ 2439.262901][ T487] ? __might_fault+0xf9/0x160 [ 2439.267576][ T487] ? __bfs+0x550/0x550 [ 2439.271642][ T487] ? kstrtoull+0x3ba/0x4e0 [ 2439.276064][ T487] ? kasan_check_write+0x14/0x20 [ 2439.280995][ T487] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2439.287149][ T487] ? __lock_acquire+0xcf7/0x1a40 [ 2439.292093][ T487] ? trace_lock_acquire+0x190/0x190 [ 2439.297288][ T487] ? trace_lock_acquire+0x190/0x190 [ 2439.302481][ T487] ? __mutex_lock_common+0x56b/0x2fc0 [ 2439.307986][ T487] ? memset+0x31/0x40 [ 2439.311964][ T487] ? fsnotify+0x14b9/0x1580 [ 2439.316472][ T487] ? rcu_lock_release+0xd/0x30 [ 2439.321234][ T487] ? rcu_lock_release+0x26/0x30 [ 2439.326079][ T487] ? __fget+0x4fe/0x540 [ 2439.330297][ T487] ? fget_many+0x30/0x30 [ 2439.334554][ T487] sock_common_setsockopt+0x99/0xb0 [ 2439.339752][ T487] __sys_setsockopt+0x1e2/0x250 [ 2439.344600][ T487] __x64_sys_setsockopt+0xbf/0xd0 [ 2439.349626][ T487] do_syscall_64+0xfe/0x140 [ 2439.354128][ T487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2439.360055][ T487] RIP: 0033:0x4597c9 [ 2439.363947][ T487] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2439.383662][ T487] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2439.392342][ T487] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2439.400307][ T487] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 06:49:06 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2439.408274][ T487] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2439.416256][ T487] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2439.424231][ T487] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:06 executing program 5 (fault-call:4 fault-nth:89): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0040000000ae1e"], 0x14}}, 0x0) [ 2439.506276][ C0] print_req_error: 910 callbacks suppressed [ 2439.506294][ C0] print_req_error: I/O error, dev loop0, sector 33664 flags 80700 [ 2439.530706][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2439.537905][ C0] buffer_io_error: 896 callbacks suppressed [ 2439.537912][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:06 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:06 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xc3ffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2439.551773][ C0] print_req_error: I/O error, dev loop0, sector 33664 flags 0 [ 2439.559286][ C0] Buffer I/O error on dev loop0, logical block 4208, async page read [ 2439.573658][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2439.580840][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2439.588709][ C0] print_req_error: I/O error, dev loop0, sector 33784 flags 80700 [ 2439.589155][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2439.604016][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2439.612102][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2439.612122][ C1] print_req_error: I/O error, dev loop0, sector 33784 flags 0 [ 2439.619289][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2439.626748][ C1] Buffer I/O error on dev loop0, logical block 4223, async page read [ 2439.642239][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2439.650044][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2439.658423][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2439.665611][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\f', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2439.719723][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2439.742723][ T509] FAULT_INJECTION: forcing a failure. [ 2439.742723][ T509] name failslab, interval 1, probability 0, space 0, times 0 [ 2439.756532][ C1] Buffer I/O error on dev loop0, logical block 1, async page read [ 2439.771503][ T492] ldm_validate_partition_table(): Disk read failed. [ 2439.792266][ T509] CPU: 0 PID: 509 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2439.800379][ T509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2439.810443][ T509] Call Trace: [ 2439.813836][ T509] dump_stack+0x1d8/0x2f8 [ 2439.818174][ T509] should_fail+0x608/0x860 [ 2439.822589][ T509] ? setup_fault_attr+0x2b0/0x2b0 [ 2439.827620][ T509] __should_failslab+0x11a/0x160 [ 2439.832560][ T509] should_failslab+0x9/0x20 [ 2439.837220][ T509] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2439.842588][ T509] ? sctp_add_bind_addr+0x8c/0x350 [ 2439.847699][ T509] sctp_add_bind_addr+0x8c/0x350 [ 2439.852776][ T509] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2439.858149][ T509] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2439.863779][ T509] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2439.869852][ T509] sctp_copy_one_addr+0xad/0x610 [ 2439.874787][ T509] sctp_bind_addr_copy+0xc0/0x3c0 [ 2439.879813][ T509] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2439.886048][ T509] __sctp_connect+0x8c9/0x1050 [ 2439.890812][ T509] ? __bfs+0x550/0x550 [ 2439.894887][ T509] ? sctp_v6_destroy_sock+0x20/0x20 [ 2439.900111][ T509] ? kasan_check_write+0x14/0x20 [ 2439.905055][ T509] ? _copy_from_user+0xe0/0x120 [ 2439.909994][ T509] ? security_sctp_bind_connect+0xaa/0xd0 [ 2439.915713][ T509] sctp_setsockopt+0x2bf5/0xf2b0 [ 2439.920654][ T509] ? sctp_shutdown+0x130/0x130 [ 2439.925575][ T509] ? __lock_acquire+0xcf7/0x1a40 [ 2439.930512][ T509] ? __bfs+0x550/0x550 [ 2439.934584][ T509] ? trace_lock_acquire+0x190/0x190 [ 2439.939781][ T509] ? __bfs+0x550/0x550 [ 2439.943846][ T509] ? register_lock_class+0xde/0x1110 [ 2439.949127][ T509] ? __lock_acquire+0xcf7/0x1a40 [ 2439.954120][ T509] ? trace_lock_acquire+0x190/0x190 [ 2439.959312][ T509] ? __might_fault+0xf9/0x160 [ 2439.964218][ T509] ? __bfs+0x550/0x550 [ 2439.968292][ T509] ? kstrtoull+0x3ba/0x4e0 [ 2439.972713][ T509] ? kasan_check_write+0x14/0x20 [ 2439.977711][ T509] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2439.983950][ T509] ? __lock_acquire+0xcf7/0x1a40 [ 2439.988893][ T509] ? trace_lock_acquire+0x190/0x190 [ 2439.994083][ T509] ? trace_lock_acquire+0x190/0x190 [ 2439.999283][ T509] ? __mutex_lock_common+0x56b/0x2fc0 [ 2440.004662][ T509] ? memset+0x31/0x40 [ 2440.008645][ T509] ? fsnotify+0x14b9/0x1580 [ 2440.013153][ T509] ? rcu_lock_release+0xd/0x30 [ 2440.017918][ T509] ? rcu_lock_release+0x26/0x30 [ 2440.022815][ T509] ? __fget+0x4fe/0x540 [ 2440.026974][ T509] ? fget_many+0x30/0x30 [ 2440.031221][ T509] sock_common_setsockopt+0x99/0xb0 [ 2440.036420][ T509] __sys_setsockopt+0x1e2/0x250 [ 2440.041270][ T509] __x64_sys_setsockopt+0xbf/0xd0 [ 2440.046304][ T509] do_syscall_64+0xfe/0x140 [ 2440.050811][ T509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2440.056756][ T509] RIP: 0033:0x4597c9 [ 2440.060645][ T509] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2440.080242][ T509] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2440.088663][ T509] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2440.096629][ T509] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2440.104593][ T509] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2440.112561][ T509] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2440.120526][ T509] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2440.133173][ T518] device lo entered promiscuous mode [ 2440.152104][ T492] Dev loop0: unable to read RDB block 0 06:49:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0ec0000000ae1e"], 0x14}}, 0x0) 06:49:07 executing program 5 (fault-call:4 fault-nth:90): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:07 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3580]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2440.171254][ T492] loop0: unable to read partition table [ 2440.190891][ T492] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\r', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2440.366762][ T534] FAULT_INJECTION: forcing a failure. [ 2440.366762][ T534] name failslab, interval 1, probability 0, space 0, times 0 06:49:07 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:07 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xfdfdffff}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2440.450121][ T534] CPU: 1 PID: 534 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2440.457880][ T534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2440.467944][ T534] Call Trace: [ 2440.471252][ T534] dump_stack+0x1d8/0x2f8 [ 2440.475607][ T534] should_fail+0x608/0x860 [ 2440.480042][ T534] ? setup_fault_attr+0x2b0/0x2b0 [ 2440.485096][ T534] __should_failslab+0x11a/0x160 [ 2440.490049][ T534] should_failslab+0x9/0x20 [ 2440.494575][ T534] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2440.499886][ T534] ? sctp_add_bind_addr+0x8c/0x350 [ 2440.505012][ T534] sctp_add_bind_addr+0x8c/0x350 [ 2440.510076][ T534] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2440.515474][ T534] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2440.521120][ T534] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2440.521145][ T534] sctp_copy_one_addr+0xad/0x610 [ 2440.521161][ T534] sctp_bind_addr_copy+0xc0/0x3c0 [ 2440.521177][ T534] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2440.532201][ T534] __sctp_connect+0x8c9/0x1050 [ 2440.532214][ T534] ? __bfs+0x550/0x550 [ 2440.532238][ T534] ? sctp_v6_destroy_sock+0x20/0x20 [ 2440.532261][ T534] ? kasan_check_write+0x14/0x20 [ 2440.562647][ T534] ? _copy_from_user+0xe0/0x120 [ 2440.567515][ T534] ? security_sctp_bind_connect+0xaa/0xd0 [ 2440.573252][ T534] sctp_setsockopt+0x2bf5/0xf2b0 [ 2440.573273][ T534] ? sctp_shutdown+0x130/0x130 [ 2440.573296][ T534] ? __lock_acquire+0xcf7/0x1a40 [ 2440.573306][ T534] ? __bfs+0x550/0x550 [ 2440.573326][ T534] ? trace_lock_acquire+0x190/0x190 [ 2440.573338][ T534] ? __bfs+0x550/0x550 [ 2440.587979][ T534] ? register_lock_class+0xde/0x1110 [ 2440.587994][ T534] ? __lock_acquire+0xcf7/0x1a40 [ 2440.588017][ T534] ? trace_lock_acquire+0x190/0x190 [ 2440.588026][ T534] ? __might_fault+0xf9/0x160 [ 2440.588040][ T534] ? __bfs+0x550/0x550 [ 2440.588052][ T534] ? kstrtoull+0x3ba/0x4e0 [ 2440.588071][ T534] ? kasan_check_write+0x14/0x20 [ 2440.634837][ T534] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2440.640991][ T534] ? __lock_acquire+0xcf7/0x1a40 [ 2440.645931][ T534] ? trace_lock_acquire+0x190/0x190 [ 2440.651125][ T534] ? trace_lock_acquire+0x190/0x190 [ 2440.656332][ T534] ? __mutex_lock_common+0x56b/0x2fc0 [ 2440.661704][ T534] ? memset+0x31/0x40 [ 2440.665686][ T534] ? fsnotify+0x14b9/0x1580 [ 2440.670194][ T534] ? rcu_lock_release+0xd/0x30 [ 2440.674955][ T534] ? rcu_lock_release+0x26/0x30 [ 2440.679801][ T534] ? __fget+0x4fe/0x540 [ 2440.683962][ T534] ? fget_many+0x30/0x30 [ 2440.688205][ T534] sock_common_setsockopt+0x99/0xb0 [ 2440.693406][ T534] __sys_setsockopt+0x1e2/0x250 [ 2440.698431][ T534] __x64_sys_setsockopt+0xbf/0xd0 [ 2440.703456][ T534] do_syscall_64+0xfe/0x140 [ 2440.707964][ T534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2440.713853][ T534] RIP: 0033:0x4597c9 [ 2440.717742][ T534] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2440.737340][ T534] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:49:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c27fb000000ae1e"], 0x14}}, 0x0) 06:49:08 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:08 executing program 5 (fault-call:4 fault-nth:91): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2440.745742][ T534] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2440.753706][ T534] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2440.761672][ T534] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2440.769638][ T534] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2440.777603][ T534] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:08 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4305]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2440.923972][ T551] ldm_validate_partition_table(): Disk read failed. [ 2440.947482][ T551] Dev loop0: unable to read RDB block 0 [ 2440.953898][ T551] loop0: unable to read partition table [ 2440.960550][ T551] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2441.000074][ T567] FAULT_INJECTION: forcing a failure. [ 2441.000074][ T567] name failslab, interval 1, probability 0, space 0, times 0 [ 2441.013025][ T567] CPU: 0 PID: 567 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2441.020769][ T567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2441.030825][ T567] Call Trace: [ 2441.030861][ T567] dump_stack+0x1d8/0x2f8 [ 2441.030879][ T567] should_fail+0x608/0x860 [ 2441.030895][ T567] ? setup_fault_attr+0x2b0/0x2b0 [ 2441.030918][ T567] __should_failslab+0x11a/0x160 [ 2441.030933][ T567] should_failslab+0x9/0x20 [ 2441.030943][ T567] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2441.030962][ T567] ? sctp_add_bind_addr+0x8c/0x350 [ 2441.067962][ T567] sctp_add_bind_addr+0x8c/0x350 [ 2441.067974][ T567] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2441.067991][ T567] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2441.068007][ T567] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2441.068029][ T567] sctp_copy_one_addr+0xad/0x610 [ 2441.068051][ T567] sctp_bind_addr_copy+0xc0/0x3c0 [ 2441.078356][ T567] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2441.078371][ T567] __sctp_connect+0x8c9/0x1050 [ 2441.078382][ T567] ? kasan_check_write+0x14/0x20 [ 2441.078407][ T567] ? sctp_v6_destroy_sock+0x20/0x20 [ 2441.078428][ T567] ? kasan_check_write+0x14/0x20 [ 2441.078439][ T567] ? _copy_from_user+0xe0/0x120 [ 2441.078452][ T567] ? security_sctp_bind_connect+0xaa/0xd0 [ 2441.078467][ T567] sctp_setsockopt+0x2bf5/0xf2b0 [ 2441.141742][ T567] ? sctp_shutdown+0x130/0x130 06:49:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x0e', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:08 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xfe800000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2441.146522][ T567] ? __lock_acquire+0xcf7/0x1a40 [ 2441.151470][ T567] ? __bfs+0x550/0x550 [ 2441.155553][ T567] ? trace_lock_acquire+0x190/0x190 [ 2441.160762][ T567] ? __bfs+0x550/0x550 [ 2441.164842][ T567] ? register_lock_class+0xde/0x1110 [ 2441.170139][ T567] ? __lock_acquire+0xcf7/0x1a40 [ 2441.175097][ T567] ? trace_lock_acquire+0x190/0x190 [ 2441.180307][ T567] ? __might_fault+0xf9/0x160 [ 2441.184998][ T567] ? __bfs+0x550/0x550 [ 2441.189080][ T567] ? kstrtoull+0x3ba/0x4e0 [ 2441.193506][ T567] ? kasan_check_write+0x14/0x20 06:49:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0040030000ae1e"], 0x14}}, 0x0) [ 2441.198452][ T567] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2441.204622][ T567] ? __lock_acquire+0xcf7/0x1a40 [ 2441.210023][ T567] ? trace_lock_acquire+0x190/0x190 [ 2441.215233][ T567] ? trace_lock_acquire+0x190/0x190 [ 2441.220447][ T567] ? __mutex_lock_common+0x56b/0x2fc0 [ 2441.225829][ T567] ? memset+0x31/0x40 [ 2441.229823][ T567] ? fsnotify+0x14b9/0x1580 [ 2441.234351][ T567] ? rcu_lock_release+0xd/0x30 [ 2441.239130][ T567] ? rcu_lock_release+0x26/0x30 [ 2441.243994][ T567] ? __fget+0x4fe/0x540 [ 2441.248223][ T567] ? fget_many+0x30/0x30 [ 2441.248239][ T567] sock_common_setsockopt+0x99/0xb0 [ 2441.248255][ T567] __sys_setsockopt+0x1e2/0x250 [ 2441.248269][ T567] __x64_sys_setsockopt+0xbf/0xd0 [ 2441.248293][ T567] do_syscall_64+0xfe/0x140 [ 2441.248309][ T567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2441.278628][ T567] RIP: 0033:0x4597c9 06:49:08 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2441.282539][ T567] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2441.302533][ T567] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2441.310969][ T567] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2441.318942][ T567] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2441.326914][ T567] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2441.334886][ T567] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2441.342853][ T567] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:08 executing program 5 (fault-call:4 fault-nth:92): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0003400000ae1e"], 0x14}}, 0x0) 06:49:08 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2441.435753][ T576] device lo left promiscuous mode 06:49:08 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xfeffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2441.513570][ T588] FAULT_INJECTION: forcing a failure. [ 2441.513570][ T588] name failslab, interval 1, probability 0, space 0, times 0 [ 2441.558838][ T588] CPU: 1 PID: 588 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2441.566667][ T588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2441.576897][ T588] Call Trace: [ 2441.580193][ T588] dump_stack+0x1d8/0x2f8 [ 2441.584531][ T588] should_fail+0x608/0x860 [ 2441.588957][ T588] ? setup_fault_attr+0x2b0/0x2b0 [ 2441.593998][ T588] __should_failslab+0x11a/0x160 [ 2441.598935][ T588] should_failslab+0x9/0x20 [ 2441.603518][ T588] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2441.608806][ T588] ? sctp_add_bind_addr+0x8c/0x350 [ 2441.613917][ T588] sctp_add_bind_addr+0x8c/0x350 [ 2441.618856][ T588] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2441.624283][ T588] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2441.630011][ T588] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2441.636141][ T588] sctp_copy_one_addr+0xad/0x610 [ 2441.641075][ T588] sctp_bind_addr_copy+0xc0/0x3c0 [ 2441.646097][ T588] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2441.652337][ T588] __sctp_connect+0x8c9/0x1050 [ 2441.657184][ T588] ? __bfs+0x550/0x550 [ 2441.661285][ T588] ? sctp_v6_destroy_sock+0x20/0x20 [ 2441.666554][ T588] ? kasan_check_write+0x14/0x20 [ 2441.671491][ T588] ? _copy_from_user+0xe0/0x120 [ 2441.676356][ T588] ? security_sctp_bind_connect+0xaa/0xd0 [ 2441.682076][ T588] sctp_setsockopt+0x2bf5/0xf2b0 [ 2441.687013][ T588] ? sctp_shutdown+0x130/0x130 [ 2441.691771][ T588] ? __lock_acquire+0xcf7/0x1a40 [ 2441.696858][ T588] ? __bfs+0x550/0x550 [ 2441.700928][ T588] ? trace_lock_acquire+0x190/0x190 [ 2441.706119][ T588] ? __bfs+0x550/0x550 [ 2441.710182][ T588] ? register_lock_class+0xde/0x1110 [ 2441.715465][ T588] ? __lock_acquire+0xcf7/0x1a40 [ 2441.720406][ T588] ? trace_lock_acquire+0x190/0x190 [ 2441.725649][ T588] ? __might_fault+0xf9/0x160 [ 2441.730333][ T588] ? __bfs+0x550/0x550 [ 2441.734395][ T588] ? kstrtoull+0x3ba/0x4e0 [ 2441.738816][ T588] ? kasan_check_write+0x14/0x20 [ 2441.743746][ T588] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2441.749902][ T588] ? __lock_acquire+0xcf7/0x1a40 [ 2441.754842][ T588] ? trace_lock_acquire+0x190/0x190 [ 2441.760169][ T588] ? trace_lock_acquire+0x190/0x190 [ 2441.765361][ T588] ? __mutex_lock_common+0x56b/0x2fc0 [ 2441.770728][ T588] ? memset+0x31/0x40 [ 2441.774705][ T588] ? fsnotify+0x14b9/0x1580 [ 2441.779214][ T588] ? rcu_lock_release+0xd/0x30 [ 2441.783978][ T588] ? rcu_lock_release+0x26/0x30 [ 2441.788823][ T588] ? __fget+0x4fe/0x540 [ 2441.792978][ T588] ? fget_many+0x30/0x30 [ 2441.797246][ T588] sock_common_setsockopt+0x99/0xb0 [ 2441.802664][ T588] __sys_setsockopt+0x1e2/0x250 [ 2441.807512][ T588] __x64_sys_setsockopt+0xbf/0xd0 [ 2441.812534][ T588] do_syscall_64+0xfe/0x140 [ 2441.817040][ T588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2441.822925][ T588] RIP: 0033:0x4597c9 [ 2441.826814][ T588] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2441.846414][ T588] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:49:09 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000100ae1e"], 0x14}}, 0x0) [ 2441.854817][ T588] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2441.862792][ T588] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2441.871021][ T588] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2441.878986][ T588] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2441.886950][ T588] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:09 executing program 5 (fault-call:4 fault-nth:93): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2441.986574][ T598] device lo entered promiscuous mode [ 2442.003009][ T595] ldm_validate_partition_table(): Disk read failed. 06:49:09 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5800]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2442.065621][ T595] Dev loop0: unable to read RDB block 0 [ 2442.074811][ T595] loop0: unable to read partition table [ 2442.094291][ T611] FAULT_INJECTION: forcing a failure. [ 2442.094291][ T611] name failslab, interval 1, probability 0, space 0, times 0 06:49:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x10', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000200ae1e"], 0x14}}, 0x0) [ 2442.111696][ T595] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2442.122187][ T611] CPU: 0 PID: 611 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2442.129915][ T611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2442.139963][ T611] Call Trace: [ 2442.143231][ T611] dump_stack+0x1d8/0x2f8 [ 2442.147599][ T611] should_fail+0x608/0x860 [ 2442.152002][ T611] ? setup_fault_attr+0x2b0/0x2b0 [ 2442.157007][ T611] __should_failslab+0x11a/0x160 [ 2442.161920][ T611] should_failslab+0x9/0x20 [ 2442.166409][ T611] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2442.171681][ T611] ? sctp_add_bind_addr+0x8c/0x350 [ 2442.176791][ T611] sctp_add_bind_addr+0x8c/0x350 [ 2442.181735][ T611] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2442.187094][ T611] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2442.192716][ T611] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2442.198762][ T611] sctp_copy_one_addr+0xad/0x610 [ 2442.203683][ T611] sctp_bind_addr_copy+0xc0/0x3c0 [ 2442.208700][ T611] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2442.214916][ T611] __sctp_connect+0x8c9/0x1050 [ 2442.219655][ T611] ? __bfs+0x550/0x550 [ 2442.223703][ T611] ? sctp_v6_destroy_sock+0x20/0x20 [ 2442.228897][ T611] ? kasan_check_write+0x14/0x20 [ 2442.233824][ T611] ? _copy_from_user+0xe0/0x120 [ 2442.238677][ T611] ? security_sctp_bind_connect+0xaa/0xd0 [ 2442.244389][ T611] sctp_setsockopt+0x2bf5/0xf2b0 [ 2442.249309][ T611] ? sctp_shutdown+0x130/0x130 [ 2442.254048][ T611] ? __lock_acquire+0xcf7/0x1a40 [ 2442.258958][ T611] ? __bfs+0x550/0x550 [ 2442.263004][ T611] ? trace_lock_acquire+0x190/0x190 [ 2442.268183][ T611] ? __bfs+0x550/0x550 [ 2442.272236][ T611] ? register_lock_class+0xde/0x1110 [ 2442.277497][ T611] ? __lock_acquire+0xcf7/0x1a40 [ 2442.282415][ T611] ? trace_lock_acquire+0x190/0x190 [ 2442.287594][ T611] ? __might_fault+0xf9/0x160 [ 2442.292261][ T611] ? __bfs+0x550/0x550 [ 2442.296322][ T611] ? kstrtoull+0x3ba/0x4e0 [ 2442.300724][ T611] ? kasan_check_write+0x14/0x20 [ 2442.305644][ T611] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2442.311787][ T611] ? __lock_acquire+0xcf7/0x1a40 [ 2442.316719][ T611] ? trace_lock_acquire+0x190/0x190 [ 2442.321899][ T611] ? trace_lock_acquire+0x190/0x190 [ 2442.327085][ T611] ? __mutex_lock_common+0x56b/0x2fc0 [ 2442.332442][ T611] ? memset+0x31/0x40 [ 2442.336413][ T611] ? fsnotify+0x14b9/0x1580 [ 2442.340925][ T611] ? rcu_lock_release+0xd/0x30 [ 2442.345678][ T611] ? rcu_lock_release+0x26/0x30 [ 2442.350511][ T611] ? __fget+0x4fe/0x540 [ 2442.354676][ T611] ? fget_many+0x30/0x30 [ 2442.358900][ T611] sock_common_setsockopt+0x99/0xb0 [ 2442.364074][ T611] __sys_setsockopt+0x1e2/0x250 [ 2442.368902][ T611] __x64_sys_setsockopt+0xbf/0xd0 [ 2442.373904][ T611] do_syscall_64+0xfe/0x140 [ 2442.378404][ T611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2442.384296][ T611] RIP: 0033:0x4597c9 [ 2442.388181][ T611] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2442.407772][ T611] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:49:09 executing program 5 (fault-call:4 fault-nth:94): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2442.416176][ T611] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2442.424132][ T611] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2442.432079][ T611] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2442.440026][ T611] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2442.447981][ T611] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:09 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xfffffdfd}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:09 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6488]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:10 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2442.671514][ T631] FAULT_INJECTION: forcing a failure. [ 2442.671514][ T631] name failslab, interval 1, probability 0, space 0, times 0 06:49:10 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6600]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2442.727573][ T631] CPU: 0 PID: 631 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2442.735318][ T631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2442.745367][ T631] Call Trace: [ 2442.748659][ T631] dump_stack+0x1d8/0x2f8 [ 2442.752979][ T631] should_fail+0x608/0x860 [ 2442.757383][ T631] ? setup_fault_attr+0x2b0/0x2b0 [ 2442.762411][ T631] __should_failslab+0x11a/0x160 [ 2442.767354][ T631] should_failslab+0x9/0x20 [ 2442.771860][ T631] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2442.777146][ T631] ? sctp_add_bind_addr+0x8c/0x350 [ 2442.782244][ T631] sctp_add_bind_addr+0x8c/0x350 [ 2442.787159][ T631] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2442.792509][ T631] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2442.798167][ T631] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2442.804225][ T631] sctp_copy_one_addr+0xad/0x610 [ 2442.809143][ T631] sctp_bind_addr_copy+0xc0/0x3c0 [ 2442.814149][ T631] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2442.820378][ T631] __sctp_connect+0x8c9/0x1050 [ 2442.825118][ T631] ? __bfs+0x550/0x550 [ 2442.829170][ T631] ? sctp_v6_destroy_sock+0x20/0x20 [ 2442.834350][ T631] ? kasan_check_write+0x14/0x20 [ 2442.839274][ T631] ? _copy_from_user+0xe0/0x120 [ 2442.844125][ T631] ? security_sctp_bind_connect+0xaa/0xd0 [ 2442.849845][ T631] sctp_setsockopt+0x2bf5/0xf2b0 [ 2442.854773][ T631] ? sctp_shutdown+0x130/0x130 [ 2442.859523][ T631] ? __lock_acquire+0xcf7/0x1a40 [ 2442.864449][ T631] ? __bfs+0x550/0x550 [ 2442.868524][ T631] ? trace_lock_acquire+0x190/0x190 [ 2442.873710][ T631] ? __bfs+0x550/0x550 [ 2442.877765][ T631] ? register_lock_class+0xde/0x1110 [ 2442.883038][ T631] ? __lock_acquire+0xcf7/0x1a40 [ 2442.887956][ T631] ? trace_lock_acquire+0x190/0x190 [ 2442.893126][ T631] ? __might_fault+0xf9/0x160 [ 2442.897787][ T631] ? __bfs+0x550/0x550 [ 2442.901844][ T631] ? kstrtoull+0x3ba/0x4e0 [ 2442.906257][ T631] ? kasan_check_write+0x14/0x20 [ 2442.911378][ T631] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2442.917530][ T631] ? __lock_acquire+0xcf7/0x1a40 [ 2442.922459][ T631] ? trace_lock_acquire+0x190/0x190 [ 2442.927650][ T631] ? trace_lock_acquire+0x190/0x190 [ 2442.932832][ T631] ? __mutex_lock_common+0x56b/0x2fc0 [ 2442.938194][ T631] ? memset+0x31/0x40 [ 2442.942164][ T631] ? fsnotify+0x14b9/0x1580 [ 2442.946669][ T631] ? rcu_lock_release+0xd/0x30 [ 2442.951412][ T631] ? rcu_lock_release+0x26/0x30 [ 2442.956250][ T631] ? __fget+0x4fe/0x540 [ 2442.960402][ T631] ? fget_many+0x30/0x30 [ 2442.964637][ T631] sock_common_setsockopt+0x99/0xb0 [ 2442.969815][ T631] __sys_setsockopt+0x1e2/0x250 [ 2442.974644][ T631] __x64_sys_setsockopt+0xbf/0xd0 [ 2442.979656][ T631] do_syscall_64+0xfe/0x140 [ 2442.984147][ T631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2442.990016][ T631] RIP: 0033:0x4597c9 [ 2442.993886][ T631] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2443.013468][ T631] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 06:49:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000300ae1e"], 0x14}}, 0x0) 06:49:10 executing program 5 (fault-call:4 fault-nth:95): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2443.021873][ T631] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2443.029821][ T631] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2443.037772][ T631] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2443.045734][ T631] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2443.053710][ T631] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:10 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800e]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:10 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x11', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2443.250484][ T656] FAULT_INJECTION: forcing a failure. [ 2443.250484][ T656] name failslab, interval 1, probability 0, space 0, times 0 [ 2443.271698][ T656] CPU: 0 PID: 656 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2443.279424][ T656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2443.289474][ T656] Call Trace: [ 2443.292769][ T656] dump_stack+0x1d8/0x2f8 [ 2443.297105][ T656] should_fail+0x608/0x860 [ 2443.301513][ T656] ? setup_fault_attr+0x2b0/0x2b0 [ 2443.306535][ T656] __should_failslab+0x11a/0x160 [ 2443.311460][ T656] should_failslab+0x9/0x20 [ 2443.315946][ T656] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2443.321221][ T656] ? sctp_add_bind_addr+0x8c/0x350 [ 2443.326326][ T656] sctp_add_bind_addr+0x8c/0x350 [ 2443.331252][ T656] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2443.336615][ T656] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2443.342224][ T656] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2443.348313][ T656] sctp_copy_one_addr+0xad/0x610 [ 2443.353238][ T656] sctp_bind_addr_copy+0xc0/0x3c0 [ 2443.358242][ T656] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2443.364508][ T656] __sctp_connect+0x8c9/0x1050 [ 2443.369270][ T656] ? __bfs+0x550/0x550 [ 2443.373337][ T656] ? sctp_v6_destroy_sock+0x20/0x20 [ 2443.378534][ T656] ? kasan_check_write+0x14/0x20 [ 2443.383488][ T656] ? _copy_from_user+0xe0/0x120 [ 2443.388331][ T656] ? security_sctp_bind_connect+0xaa/0xd0 [ 2443.394387][ T656] sctp_setsockopt+0x2bf5/0xf2b0 [ 2443.399313][ T656] ? sctp_shutdown+0x130/0x130 [ 2443.404051][ T656] ? __lock_acquire+0xcf7/0x1a40 [ 2443.408969][ T656] ? __bfs+0x550/0x550 [ 2443.413035][ T656] ? trace_lock_acquire+0x190/0x190 [ 2443.418236][ T656] ? __bfs+0x550/0x550 [ 2443.422303][ T656] ? register_lock_class+0xde/0x1110 [ 2443.427583][ T656] ? __lock_acquire+0xcf7/0x1a40 [ 2443.432513][ T656] ? trace_lock_acquire+0x190/0x190 [ 2443.437686][ T656] ? __might_fault+0xf9/0x160 [ 2443.442351][ T656] ? __bfs+0x550/0x550 [ 2443.446424][ T656] ? kstrtoull+0x3ba/0x4e0 [ 2443.450827][ T656] ? kasan_check_write+0x14/0x20 [ 2443.455757][ T656] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2443.461900][ T656] ? __lock_acquire+0xcf7/0x1a40 [ 2443.466830][ T656] ? trace_lock_acquire+0x190/0x190 [ 2443.472029][ T656] ? trace_lock_acquire+0x190/0x190 [ 2443.477220][ T656] ? __mutex_lock_common+0x56b/0x2fc0 [ 2443.482568][ T656] ? memset+0x31/0x40 [ 2443.486536][ T656] ? fsnotify+0x14b9/0x1580 [ 2443.491048][ T656] ? rcu_lock_release+0xd/0x30 [ 2443.495810][ T656] ? rcu_lock_release+0x26/0x30 [ 2443.500646][ T656] ? __fget+0x4fe/0x540 [ 2443.504798][ T656] ? fget_many+0x30/0x30 [ 2443.509040][ T656] sock_common_setsockopt+0x99/0xb0 [ 2443.514225][ T656] __sys_setsockopt+0x1e2/0x250 [ 2443.519050][ T656] __x64_sys_setsockopt+0xbf/0xd0 [ 2443.524051][ T656] do_syscall_64+0xfe/0x140 [ 2443.528551][ T656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2443.534431][ T656] RIP: 0033:0x4597c9 [ 2443.538299][ T656] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2443.557879][ T656] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2443.566273][ T656] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2443.574235][ T656] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2443.582181][ T656] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2443.590166][ T656] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 06:49:10 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xffffffc3}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2443.598134][ T656] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000004000ae1e"], 0x14}}, 0x0) 06:49:11 executing program 5 (fault-call:4 fault-nth:96): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:11 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8035]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2443.760801][ T676] FAULT_INJECTION: forcing a failure. [ 2443.760801][ T676] name failslab, interval 1, probability 0, space 0, times 0 [ 2443.778803][ T676] CPU: 1 PID: 676 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2443.786518][ T676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2443.796569][ T676] Call Trace: [ 2443.799862][ T676] dump_stack+0x1d8/0x2f8 [ 2443.804192][ T676] should_fail+0x608/0x860 [ 2443.808609][ T676] ? setup_fault_attr+0x2b0/0x2b0 [ 2443.813627][ T676] __should_failslab+0x11a/0x160 [ 2443.818546][ T676] should_failslab+0x9/0x20 [ 2443.823021][ T676] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2443.828292][ T676] ? sctp_add_bind_addr+0x8c/0x350 [ 2443.833379][ T676] sctp_add_bind_addr+0x8c/0x350 [ 2443.838293][ T676] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2443.843654][ T676] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2443.849290][ T676] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2443.855347][ T676] sctp_copy_one_addr+0xad/0x610 [ 2443.860262][ T676] sctp_bind_addr_copy+0xc0/0x3c0 [ 2443.865269][ T676] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2443.871486][ T676] __sctp_connect+0x8c9/0x1050 [ 2443.876238][ T676] ? __bfs+0x550/0x550 [ 2443.880296][ T676] ? sctp_v6_destroy_sock+0x20/0x20 [ 2443.885477][ T676] ? kasan_check_write+0x14/0x20 [ 2443.890390][ T676] ? _copy_from_user+0xe0/0x120 [ 2443.895228][ T676] ? security_sctp_bind_connect+0xaa/0xd0 [ 2443.900948][ T676] sctp_setsockopt+0x2bf5/0xf2b0 [ 2443.905876][ T676] ? sctp_shutdown+0x130/0x130 [ 2443.910613][ T676] ? __lock_acquire+0xcf7/0x1a40 [ 2443.915534][ T676] ? __bfs+0x550/0x550 [ 2443.919593][ T676] ? trace_lock_acquire+0x190/0x190 [ 2443.924849][ T676] ? __bfs+0x550/0x550 [ 2443.928890][ T676] ? register_lock_class+0xde/0x1110 [ 2443.934153][ T676] ? __lock_acquire+0xcf7/0x1a40 [ 2443.939068][ T676] ? trace_lock_acquire+0x190/0x190 [ 2443.944240][ T676] ? __might_fault+0xf9/0x160 [ 2443.948892][ T676] ? __bfs+0x550/0x550 [ 2443.952943][ T676] ? kstrtoull+0x3ba/0x4e0 [ 2443.957349][ T676] ? kasan_check_write+0x14/0x20 [ 2443.962262][ T676] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2443.968395][ T676] ? __lock_acquire+0xcf7/0x1a40 [ 2443.973312][ T676] ? trace_lock_acquire+0x190/0x190 [ 2443.978500][ T676] ? trace_lock_acquire+0x190/0x190 [ 2443.983674][ T676] ? __mutex_lock_common+0x56b/0x2fc0 [ 2443.989020][ T676] ? memset+0x31/0x40 [ 2443.992980][ T676] ? fsnotify+0x14b9/0x1580 [ 2443.997473][ T676] ? rcu_lock_release+0xd/0x30 [ 2444.002223][ T676] ? rcu_lock_release+0x26/0x30 [ 2444.007045][ T676] ? __fget+0x4fe/0x540 [ 2444.011195][ T676] ? fget_many+0x30/0x30 [ 2444.015433][ T676] sock_common_setsockopt+0x99/0xb0 [ 2444.020612][ T676] __sys_setsockopt+0x1e2/0x250 [ 2444.025439][ T676] __x64_sys_setsockopt+0xbf/0xd0 [ 2444.030445][ T676] do_syscall_64+0xfe/0x140 [ 2444.034942][ T676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2444.040836][ T676] RIP: 0033:0x4597c9 [ 2444.044705][ T676] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2444.064295][ T676] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2444.072714][ T676] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2444.080662][ T676] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2444.088608][ T676] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2444.096554][ T676] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2444.104501][ T676] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8cffffff9e00ae1e"], 0x14}}, 0x0) 06:49:11 executing program 5 (fault-call:4 fault-nth:97): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2444.126996][ T659] ldm_validate_partition_table(): Disk read failed. [ 2444.137036][ T659] Dev loop0: unable to read RDB block 0 [ 2444.172652][ T659] loop0: unable to read partition table [ 2444.185506][ T659] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2444.229439][ T685] FAULT_INJECTION: forcing a failure. [ 2444.229439][ T685] name failslab, interval 1, probability 0, space 0, times 0 [ 2444.242489][ T685] CPU: 0 PID: 685 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2444.250205][ T685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2444.260583][ T685] Call Trace: [ 2444.263850][ T685] dump_stack+0x1d8/0x2f8 [ 2444.268157][ T685] should_fail+0x608/0x860 [ 2444.272546][ T685] ? setup_fault_attr+0x2b0/0x2b0 [ 2444.277565][ T685] __should_failslab+0x11a/0x160 [ 2444.282488][ T685] should_failslab+0x9/0x20 [ 2444.286962][ T685] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2444.292222][ T685] ? sctp_add_bind_addr+0x8c/0x350 [ 2444.297316][ T685] sctp_add_bind_addr+0x8c/0x350 [ 2444.302235][ T685] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2444.307597][ T685] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2444.313214][ T685] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2444.319263][ T685] sctp_copy_one_addr+0xad/0x610 [ 2444.324175][ T685] sctp_bind_addr_copy+0xc0/0x3c0 [ 2444.329173][ T685] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2444.335397][ T685] __sctp_connect+0x8c9/0x1050 [ 2444.340144][ T685] ? __bfs+0x550/0x550 [ 2444.344191][ T685] ? sctp_v6_destroy_sock+0x20/0x20 [ 2444.349374][ T685] ? kasan_check_write+0x14/0x20 [ 2444.354287][ T685] ? _copy_from_user+0xe0/0x120 [ 2444.359122][ T685] ? security_sctp_bind_connect+0xaa/0xd0 [ 2444.364816][ T685] sctp_setsockopt+0x2bf5/0xf2b0 [ 2444.369730][ T685] ? sctp_shutdown+0x130/0x130 [ 2444.374468][ T685] ? __lock_acquire+0xcf7/0x1a40 [ 2444.379375][ T685] ? __bfs+0x550/0x550 [ 2444.383420][ T685] ? trace_lock_acquire+0x190/0x190 [ 2444.388589][ T685] ? __bfs+0x550/0x550 [ 2444.392629][ T685] ? register_lock_class+0xde/0x1110 [ 2444.397899][ T685] ? __lock_acquire+0xcf7/0x1a40 [ 2444.402823][ T685] ? trace_lock_acquire+0x190/0x190 [ 2444.408015][ T685] ? __might_fault+0xf9/0x160 [ 2444.412665][ T685] ? __bfs+0x550/0x550 [ 2444.416714][ T685] ? kstrtoull+0x3ba/0x4e0 [ 2444.421128][ T685] ? kasan_check_write+0x14/0x20 [ 2444.426048][ T685] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2444.432185][ T685] ? __lock_acquire+0xcf7/0x1a40 [ 2444.437115][ T685] ? trace_lock_acquire+0x190/0x190 [ 2444.442295][ T685] ? trace_lock_acquire+0x190/0x190 [ 2444.447468][ T685] ? __mutex_lock_common+0x56b/0x2fc0 [ 2444.452812][ T685] ? memset+0x31/0x40 [ 2444.456779][ T685] ? fsnotify+0x14b9/0x1580 [ 2444.461280][ T685] ? rcu_lock_release+0xd/0x30 [ 2444.466030][ T685] ? rcu_lock_release+0x26/0x30 [ 2444.470865][ T685] ? __fget+0x4fe/0x540 [ 2444.474995][ T685] ? fget_many+0x30/0x30 [ 2444.479213][ T685] sock_common_setsockopt+0x99/0xb0 [ 2444.484381][ T685] __sys_setsockopt+0x1e2/0x250 [ 2444.489205][ T685] __x64_sys_setsockopt+0xbf/0xd0 [ 2444.494205][ T685] do_syscall_64+0xfe/0x140 [ 2444.498683][ T685] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2444.504544][ T685] RIP: 0033:0x4597c9 [ 2444.508419][ T685] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:49:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c00000ec000ae1e"], 0x14}}, 0x0) [ 2444.527995][ T685] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2444.536384][ T685] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2444.544336][ T685] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2444.552283][ T685] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2444.560226][ T685] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2444.568170][ T685] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:11 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xfffffffe}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2444.589298][ C1] print_req_error: 466 callbacks suppressed [ 2444.589306][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 80700 [ 2444.605337][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 0 [ 2444.612800][ C1] buffer_io_error: 460 callbacks suppressed [ 2444.612807][ C1] Buffer I/O error on dev loop0, logical block 4208, async page read 06:49:12 executing program 5 (fault-call:4 fault-nth:98): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2444.632642][ C1] print_req_error: I/O error, dev loop0, sector 33784 flags 80700 06:49:12 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:12 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x12', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2444.665368][ C1] print_req_error: I/O error, dev loop0, sector 33784 flags 0 [ 2444.672852][ C1] Buffer I/O error on dev loop0, logical block 4223, async page read [ 2444.748859][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2444.756045][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2444.788779][ T698] FAULT_INJECTION: forcing a failure. 06:49:12 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8847]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2444.788779][ T698] name failslab, interval 1, probability 0, space 0, times 0 [ 2444.790140][ C1] print_req_error: I/O error, dev loop0, sector 8 flags 0 [ 2444.808592][ C1] Buffer I/O error on dev loop0, logical block 1, async page read [ 2444.823863][ T698] CPU: 1 PID: 698 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2444.831591][ T698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2444.841669][ T698] Call Trace: [ 2444.844951][ T698] dump_stack+0x1d8/0x2f8 [ 2444.849273][ T698] should_fail+0x608/0x860 [ 2444.853677][ T698] ? setup_fault_attr+0x2b0/0x2b0 [ 2444.858694][ T698] __should_failslab+0x11a/0x160 [ 2444.863623][ T698] should_failslab+0x9/0x20 [ 2444.868111][ T698] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2444.873399][ T698] ? sctp_add_bind_addr+0x8c/0x350 [ 2444.878493][ T698] sctp_add_bind_addr+0x8c/0x350 [ 2444.883410][ T698] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2444.888770][ T698] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2444.894396][ T698] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2444.900455][ T698] sctp_copy_one_addr+0xad/0x610 [ 2444.905378][ T698] sctp_bind_addr_copy+0xc0/0x3c0 [ 2444.910402][ T698] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2444.916638][ T698] __sctp_connect+0x8c9/0x1050 [ 2444.921385][ T698] ? __bfs+0x550/0x550 [ 2444.925461][ T698] ? sctp_v6_destroy_sock+0x20/0x20 [ 2444.930649][ T698] ? kasan_check_write+0x14/0x20 [ 2444.935572][ T698] ? _copy_from_user+0xe0/0x120 [ 2444.940408][ T698] ? security_sctp_bind_connect+0xaa/0xd0 [ 2444.946114][ T698] sctp_setsockopt+0x2bf5/0xf2b0 [ 2444.951039][ T698] ? sctp_shutdown+0x130/0x130 [ 2444.955790][ T698] ? __lock_acquire+0xcf7/0x1a40 [ 2444.960708][ T698] ? __bfs+0x550/0x550 [ 2444.964765][ T698] ? trace_lock_acquire+0x190/0x190 [ 2444.969952][ T698] ? __bfs+0x550/0x550 [ 2444.974006][ T698] ? register_lock_class+0xde/0x1110 [ 2444.979275][ T698] ? __lock_acquire+0xcf7/0x1a40 [ 2444.984205][ T698] ? trace_lock_acquire+0x190/0x190 [ 2444.989387][ T698] ? __might_fault+0xf9/0x160 [ 2444.994048][ T698] ? __bfs+0x550/0x550 [ 2444.998115][ T698] ? kstrtoull+0x3ba/0x4e0 [ 2445.002525][ T698] ? kasan_check_write+0x14/0x20 [ 2445.007454][ T698] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2445.013594][ T698] ? __lock_acquire+0xcf7/0x1a40 [ 2445.018531][ T698] ? trace_lock_acquire+0x190/0x190 [ 2445.023711][ T698] ? trace_lock_acquire+0x190/0x190 [ 2445.028896][ T698] ? __mutex_lock_common+0x56b/0x2fc0 [ 2445.034253][ T698] ? memset+0x31/0x40 [ 2445.038221][ T698] ? fsnotify+0x14b9/0x1580 [ 2445.042716][ T698] ? rcu_lock_release+0xd/0x30 [ 2445.047469][ T698] ? rcu_lock_release+0x26/0x30 [ 2445.052301][ T698] ? __fget+0x4fe/0x540 [ 2445.056446][ T698] ? fget_many+0x30/0x30 [ 2445.060677][ T698] sock_common_setsockopt+0x99/0xb0 [ 2445.065868][ T698] __sys_setsockopt+0x1e2/0x250 [ 2445.070705][ T698] __x64_sys_setsockopt+0xbf/0xd0 [ 2445.075721][ T698] do_syscall_64+0xfe/0x140 [ 2445.080212][ T698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.086088][ T698] RIP: 0033:0x4597c9 [ 2445.089968][ T698] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2445.109558][ T698] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2445.117951][ T698] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2445.125906][ T698] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2445.133889][ T698] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2445.141860][ T698] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 06:49:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8cffffffef00ae1e"], 0x14}}, 0x0) [ 2445.149811][ T698] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 [ 2445.179977][ C1] print_req_error: I/O error, dev loop0, sector 33800 flags 0 [ 2445.187498][ C1] Buffer I/O error on dev loop0, logical block 4225, async page read 06:49:12 executing program 5 (fault-call:4 fault-nth:99): r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2445.200565][ C1] print_req_error: I/O error, dev loop0, sector 33800 flags 0 [ 2445.208159][ C1] Buffer I/O error on dev loop0, logical block 4225, async page read [ 2445.229158][ C1] print_req_error: I/O error, dev loop0, sector 33800 flags 0 [ 2445.236732][ C1] Buffer I/O error on dev loop0, logical block 4225, async page read 06:49:12 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8848]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:12 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2445.287630][ C1] print_req_error: I/O error, dev loop0, sector 33800 flags 0 [ 2445.295140][ C1] Buffer I/O error on dev loop0, logical block 4225, async page read [ 2445.345906][ T723] FAULT_INJECTION: forcing a failure. [ 2445.345906][ T723] name failslab, interval 1, probability 0, space 0, times 0 [ 2445.350338][ C1] Buffer I/O error on dev loop0, logical block 4225, async page read [ 2445.367087][ C1] Buffer I/O error on dev loop0, logical block 4225, async page read [ 2445.368685][ T723] CPU: 0 PID: 723 Comm: syz-executor.5 Not tainted 5.2.0-rc7 #12 [ 2445.382855][ T723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:49:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8cfffffff000ae1e"], 0x14}}, 0x0) [ 2445.393174][ T723] Call Trace: [ 2445.396478][ T723] dump_stack+0x1d8/0x2f8 [ 2445.400815][ T723] should_fail+0x608/0x860 [ 2445.405233][ T723] ? setup_fault_attr+0x2b0/0x2b0 [ 2445.410263][ T723] __should_failslab+0x11a/0x160 [ 2445.415200][ T723] should_failslab+0x9/0x20 [ 2445.419706][ T723] kmem_cache_alloc_trace+0x5d/0x2c0 [ 2445.424983][ T723] ? sctp_add_bind_addr+0x8c/0x350 [ 2445.430072][ T723] sctp_add_bind_addr+0x8c/0x350 [ 2445.435000][ T723] ? sctp_bind_addr_state+0x26b/0x2d0 [ 2445.440345][ T723] sctp_copy_local_addr_list+0x30d/0x4a0 [ 2445.445953][ T723] ? sctp_do_8_2_transport_strike+0x790/0x790 [ 2445.451997][ T723] sctp_copy_one_addr+0xad/0x610 [ 2445.456912][ T723] sctp_bind_addr_copy+0xc0/0x3c0 [ 2445.461912][ T723] sctp_assoc_set_bind_addr_from_ep+0x108/0x160 [ 2445.468129][ T723] __sctp_connect+0x8c9/0x1050 [ 2445.472868][ T723] ? __bfs+0x550/0x550 [ 2445.476936][ T723] ? sctp_v6_destroy_sock+0x20/0x20 [ 2445.482146][ T723] ? kasan_check_write+0x14/0x20 [ 2445.487072][ T723] ? _copy_from_user+0xe0/0x120 [ 2445.491913][ T723] ? security_sctp_bind_connect+0xaa/0xd0 [ 2445.497608][ T723] sctp_setsockopt+0x2bf5/0xf2b0 [ 2445.502523][ T723] ? sctp_shutdown+0x130/0x130 [ 2445.507272][ T723] ? __lock_acquire+0xcf7/0x1a40 [ 2445.512187][ T723] ? __bfs+0x550/0x550 [ 2445.516241][ T723] ? trace_lock_acquire+0x190/0x190 [ 2445.521430][ T723] ? __bfs+0x550/0x550 [ 2445.525483][ T723] ? register_lock_class+0xde/0x1110 [ 2445.530753][ T723] ? __lock_acquire+0xcf7/0x1a40 [ 2445.535679][ T723] ? trace_lock_acquire+0x190/0x190 [ 2445.540849][ T723] ? __might_fault+0xf9/0x160 [ 2445.545505][ T723] ? __bfs+0x550/0x550 [ 2445.549558][ T723] ? kstrtoull+0x3ba/0x4e0 [ 2445.553972][ T723] ? kasan_check_write+0x14/0x20 [ 2445.558897][ T723] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 2445.565025][ T723] ? __lock_acquire+0xcf7/0x1a40 [ 2445.569950][ T723] ? trace_lock_acquire+0x190/0x190 [ 2445.575122][ T723] ? trace_lock_acquire+0x190/0x190 [ 2445.580396][ T723] ? __mutex_lock_common+0x56b/0x2fc0 [ 2445.585745][ T723] ? memset+0x31/0x40 [ 2445.589706][ T723] ? fsnotify+0x14b9/0x1580 [ 2445.594190][ T723] ? rcu_lock_release+0xd/0x30 [ 2445.598931][ T723] ? rcu_lock_release+0x26/0x30 [ 2445.603754][ T723] ? __fget+0x4fe/0x540 [ 2445.607918][ T723] ? fget_many+0x30/0x30 [ 2445.612143][ T723] sock_common_setsockopt+0x99/0xb0 [ 2445.617322][ T723] __sys_setsockopt+0x1e2/0x250 [ 2445.622161][ T723] __x64_sys_setsockopt+0xbf/0xd0 [ 2445.627165][ T723] do_syscall_64+0xfe/0x140 [ 2445.631646][ T723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.637510][ T723] RIP: 0033:0x4597c9 [ 2445.641381][ T723] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2445.660958][ T723] RSP: 002b:00007fbfcf7b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 2445.669342][ T723] RAX: ffffffffffffffda RBX: 00007fbfcf7b3c90 RCX: 00000000004597c9 [ 2445.677291][ T723] RDX: 000000000000006b RSI: 0000000000000084 RDI: 0000000000000004 [ 2445.685245][ T723] RBP: 000000000075bf20 R08: 000000000000001c R09: 0000000000000000 [ 2445.693209][ T723] R10: 000000002055bfe4 R11: 0000000000000246 R12: 00007fbfcf7b46d4 [ 2445.701154][ T723] R13: 00000000004cf6b0 R14: 00000000004dddf0 R15: 0000000000000005 06:49:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:13 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x1000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:13 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8864]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c000027fb00ae1e"], 0x14}}, 0x0) 06:49:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs%', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:13 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8906]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2445.905919][ T740] device lo left promiscuous mode [ 2445.921650][ T728] ldm_validate_partition_table(): Disk read failed. [ 2445.961202][ T740] device lo entered promiscuous mode [ 2445.966369][ T728] Dev loop0: unable to read RDB block 0 [ 2445.984560][ T728] loop0: unable to read partition table [ 2446.022840][ T728] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:13 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c7fffffff00ae1e"], 0x14}}, 0x0) [ 2446.154327][ T757] device lo left promiscuous mode 06:49:13 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x2, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:13 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x100000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:13 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfsH', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x3, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c9effffff00ae1e"], 0x14}}, 0x0) [ 2446.426665][ T778] device lo entered promiscuous mode 06:49:13 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2446.452185][ T777] ldm_validate_partition_table(): Disk read failed. [ 2446.462114][ T777] Dev loop0: unable to read RDB block 0 [ 2446.468762][ T777] loop0: unable to read partition table [ 2446.474534][ T777] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2446.485112][ T784] device lo left promiscuous mode 06:49:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8cefffffff00ae1e"], 0x14}}, 0x0) 06:49:13 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x200000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:14 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:14 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x4, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8cf0ffffff00ae1e"], 0x14}}, 0x0) 06:49:14 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2446.816263][ T807] device lo entered promiscuous mode 06:49:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x5, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2446.898551][ T821] device lo left promiscuous mode [ 2446.957949][ T813] ldm_validate_partition_table(): Disk read failed. 06:49:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfsL', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0002000000ae1e"], 0x14}}, 0x0) 06:49:14 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x300000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:14 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2447.011283][ T813] Dev loop0: unable to read RDB block 0 [ 2447.038205][ T813] loop0: unable to read partition table [ 2447.043995][ T813] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0003000000ae1e"], 0x14}}, 0x0) [ 2447.205749][ T837] device lo entered promiscuous mode [ 2447.217776][ T843] ldm_validate_partition_table(): Disk read failed. 06:49:14 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2447.267652][ T843] Dev loop0: unable to read RDB block 0 [ 2447.277070][ T856] device lo left promiscuous mode [ 2447.292003][ T843] loop0: unable to read partition table [ 2447.323682][ T843] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:14 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000030000ae1e"], 0x14}}, 0x0) 06:49:14 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x400000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:14 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\\', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c00c00e0000ae1e"], 0x14}}, 0x0) 06:49:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x8, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2447.543953][ T875] device lo entered promiscuous mode [ 2447.602541][ T875] device lo left promiscuous mode 06:49:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x9, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:15 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x500000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c00fb270000ae1e"], 0x14}}, 0x0) [ 2447.761062][ T884] ldm_validate_partition_table(): Disk read failed. 06:49:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xa, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2447.823148][ T884] Dev loop0: unable to read RDB block 0 [ 2447.878469][ T906] device lo entered promiscuous mode [ 2447.888405][ T884] loop0: unable to read partition table [ 2447.900209][ T884] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2447.940892][ T906] device lo left promiscuous mode 06:49:15 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:15 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000400000ae1e"], 0x14}}, 0x0) 06:49:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xb, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:15 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x600000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfsh', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:15 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xc, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c000ec00000ae1e"], 0x14}}, 0x0) 06:49:15 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0xd, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2448.331127][ T944] device lo entered promiscuous mode 06:49:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0027fb0000ae1e"], 0x14}}, 0x0) [ 2448.368138][ T927] ldm_validate_partition_table(): Disk read failed. [ 2448.391780][ T927] Dev loop0: unable to read RDB block 0 [ 2448.399491][ T944] device lo left promiscuous mode [ 2448.446989][ T927] loop0: unable to read partition table [ 2448.471187][ T927] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:15 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:15 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x700000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x10, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfsl', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000400300ae1e"], 0x14}}, 0x0) 06:49:16 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2448.686441][ T969] device lo entered promiscuous mode 06:49:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x11, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2448.790856][ T985] device lo left promiscuous mode 06:49:16 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000034000ae1e"], 0x14}}, 0x0) 06:49:16 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x800000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2448.928630][ T982] ldm_validate_partition_table(): Disk read failed. 06:49:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x12, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2448.993951][ T982] Dev loop0: unable to read RDB block 0 06:49:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfst', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2449.041167][ T1003] device lo entered promiscuous mode [ 2449.054429][ T982] loop0: unable to read partition table [ 2449.066214][ T982] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2449.114928][ T1003] device lo left promiscuous mode [ 2449.231490][ T1012] ldm_validate_partition_table(): Disk read failed. [ 2449.262096][ T1012] Dev loop0: unable to read RDB block 0 [ 2449.273098][ T1012] loop0: unable to read partition table [ 2449.279722][ T1012] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:16 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x13, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:16 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000001ae1e"], 0x14}}, 0x0) 06:49:16 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x900000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfsz', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:16 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x58000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x14, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2449.453881][ T1037] device lo entered promiscuous mode 06:49:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000002ae1e"], 0x14}}, 0x0) [ 2449.546228][ T1037] device lo left promiscuous mode 06:49:17 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xa00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:17 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x66000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000003ae1e"], 0x14}}, 0x0) [ 2449.646815][ C0] print_req_error: 1352 callbacks suppressed [ 2449.646824][ C0] print_req_error: I/O error, dev loop0, sector 33664 flags 80700 [ 2449.745576][ C0] print_req_error: I/O error, dev loop0, sector 33664 flags 0 [ 2449.753098][ C0] buffer_io_error: 1332 callbacks suppressed [ 2449.753105][ C0] Buffer I/O error on dev loop0, logical block 4208, async page read [ 2449.767220][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2449.774337][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2449.797567][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2449.804688][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2449.812590][ C0] print_req_error: I/O error, dev loop0, sector 33784 flags 80700 [ 2449.817360][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2449.827569][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2449.835657][ C0] print_req_error: I/O error, dev loop0, sector 33784 flags 0 [ 2449.843169][ C0] Buffer I/O error on dev loop0, logical block 4223, async page read [ 2449.844375][ T1073] device lo entered promiscuous mode [ 2449.851302][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2449.851313][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2449.851580][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2449.863852][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2449.879135][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2449.893843][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2449.910937][ C0] Buffer I/O error on dev loop0, logical block 1, async page read [ 2449.918863][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2449.934906][ T1041] ldm_validate_partition_table(): Disk read failed. [ 2449.981429][ T1041] Dev loop0: unable to read RDB block 0 [ 2449.991857][ T1041] loop0: unable to read partition table [ 2449.998047][ T1041] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2450.008851][ T1073] device lo left promiscuous mode 06:49:17 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x15, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000040ae1e"], 0x14}}, 0x0) 06:49:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:17 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:17 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xb00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x16, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c00ffffff9eae1e"], 0x14}}, 0x0) 06:49:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x17, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:17 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000ec0ae1e"], 0x14}}, 0x0) [ 2450.501957][ T1114] device lo entered promiscuous mode [ 2450.584155][ T1114] device lo left promiscuous mode 06:49:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:18 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x18, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:18 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:18 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xc00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c00ffffffefae1e"], 0x14}}, 0x0) 06:49:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x19, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:18 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2450.886731][ T1152] device lo entered promiscuous mode [ 2450.916918][ T1143] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:49:18 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2450.981479][ T1162] device lo left promiscuous mode 06:49:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c00fffffff0ae1e"], 0x14}}, 0x0) 06:49:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x1e, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:18 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xd00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2451.083353][ T1160] ldm_validate_partition_table(): Disk read failed. [ 2451.143547][ T1160] Dev loop0: unable to read RDB block 0 [ 2451.198999][ T1160] loop0: unable to read partition table [ 2451.205849][ T1160] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2451.216830][ T1185] device lo entered promiscuous mode 06:49:18 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:18 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c00000027fbae1e"], 0x14}}, 0x0) 06:49:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x21, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2451.291006][ T1185] device lo left promiscuous mode 06:49:18 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:18 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xe00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x22, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:18 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x23, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c007fffffffae1e"], 0x14}}, 0x0) [ 2451.536002][ T1204] loop_set_status: loop0 () has still dirty pages (nrpages=1) [ 2451.550860][ T1212] device lo entered promiscuous mode 06:49:19 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2451.619593][ T1217] device lo left promiscuous mode 06:49:19 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:19 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xf00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x24, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c009effffffae1e"], 0x14}}, 0x0) 06:49:19 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x64, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c00efffffffae1e"], 0x14}}, 0x0) [ 2451.971059][ T1250] device lo entered promiscuous mode 06:49:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x65, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:19 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2452.031497][ T1250] device lo left promiscuous mode [ 2452.048010][ T1248] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:49:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:19 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x1000000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2452.318908][ T1276] device lo entered promiscuous mode [ 2452.364537][ T1284] device lo left promiscuous mode [ 2452.369970][ T1277] ldm_validate_partition_table(): Disk read failed. [ 2452.377643][ T1277] Dev loop0: unable to read RDB block 0 [ 2452.384178][ T1277] loop0: unable to read partition table [ 2452.391878][ T1277] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:19 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x1100000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c00f0ffffffae1e"], 0x14}}, 0x0) 06:49:19 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:19 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000020000ae1e"], 0x14}}, 0x0) 06:49:19 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2452.660366][ T1297] device lo entered promiscuous mode 06:49:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x71, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:20 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000030000ae1e"], 0x14}}, 0x0) [ 2452.749373][ T1317] device lo left promiscuous mode 06:49:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:20 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x1200000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2452.854649][ T1300] ldm_validate_partition_table(): Disk read failed. 06:49:20 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2452.943162][ T1300] Dev loop0: unable to read RDB block 0 [ 2452.971482][ T1300] loop0: unable to read partition table [ 2452.988870][ T1300] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2453.036450][ T1334] device lo entered promiscuous mode [ 2453.101286][ T1343] device lo left promiscuous mode 06:49:20 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x72, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000300ae1e"], 0x14}}, 0x0) 06:49:20 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:20 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x1600000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:20 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x75, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000c00e00ae1e"], 0x14}}, 0x0) [ 2453.327813][ T1360] ldm_validate_partition_table(): Disk read failed. [ 2453.345193][ T1360] Dev loop0: unable to read RDB block 0 [ 2453.374704][ T1360] loop0: unable to read partition table [ 2453.381534][ T1360] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2453.394088][ T1369] device lo entered promiscuous mode 06:49:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x76, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000fb2700ae1e"], 0x14}}, 0x0) 06:49:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2453.498081][ T1377] device lo left promiscuous mode 06:49:20 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:20 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:20 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x1800000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x77, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000004000ae1e"], 0x14}}, 0x0) [ 2453.747141][ T1414] device lo entered promiscuous mode 06:49:21 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x78, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c00000ec000ae1e"], 0x14}}, 0x0) [ 2453.827144][ T1414] device lo left promiscuous mode [ 2453.840719][ T1412] ldm_validate_partition_table(): Disk read failed. 06:49:21 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2453.899982][ T1412] Dev loop0: unable to read RDB block 0 [ 2453.913451][ T1412] loop0: unable to read partition table [ 2453.923979][ T1412] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:21 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x1f00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs&', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x79, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2454.120785][ T1412] ldm_validate_partition_table(): Disk read failed. [ 2454.167071][ T1412] Dev loop0: unable to read RDB block 0 [ 2454.186080][ T1443] device lo entered promiscuous mode [ 2454.188559][ T1412] loop0: unable to read partition table [ 2454.233316][ T1412] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2454.245898][ T1450] device lo left promiscuous mode 06:49:21 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000ffff", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:21 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c000027fb00ae1e"], 0x14}}, 0x0) 06:49:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs ', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:21 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x2000000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7c, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:21 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000200ae1e"], 0x14}}, 0x0) [ 2454.536085][ T1471] device lo entered promiscuous mode [ 2454.560344][ T1474] ldm_validate_partition_table(): Disk read failed. [ 2454.571211][ T1474] Dev loop0: unable to read RDB block 0 06:49:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x7d, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:21 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2454.581150][ T1474] loop0: unable to read partition table [ 2454.589121][ T1474] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2454.607650][ T1483] device lo left promiscuous mode [ 2454.655398][ C0] print_req_error: 1160 callbacks suppressed [ 2454.655406][ C0] print_req_error: I/O error, dev loop0, sector 64 flags 0 06:49:22 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2454.712320][ C0] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 2454.742545][ C0] print_req_error: I/O error, dev loop0, sector 64 flags 0 06:49:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x2, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:22 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2454.756782][ C0] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 2454.764046][ C0] buffer_io_error: 1146 callbacks suppressed [ 2454.764054][ C0] Buffer I/O error on dev loop0, logical block 8, async page read [ 2454.782375][ C0] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 2454.789609][ C0] Buffer I/O error on dev loop0, logical block 8, async page read [ 2454.798694][ C0] print_req_error: I/O error, dev loop0, sector 64 flags 0 06:49:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000300ae1e"], 0x14}}, 0x0) 06:49:22 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x2500000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2454.805926][ C0] Buffer I/O error on dev loop0, logical block 8, async page read [ 2454.823149][ C0] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 2454.830386][ C0] Buffer I/O error on dev loop0, logical block 8, async page read [ 2454.838560][ C1] print_req_error: I/O error, dev loop0, sector 64 flags 0 [ 2454.845816][ C1] Buffer I/O error on dev loop0, logical block 8, async page read 06:49:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x3, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2454.859324][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2454.866488][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2454.875746][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2454.882874][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2454.890912][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2454.899315][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2454.941077][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:22 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000003ae1e"], 0x14}}, 0x0) 06:49:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x4, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2455.071100][ T1527] device lo entered promiscuous mode [ 2455.107839][ T1530] device lo left promiscuous mode 06:49:22 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:22 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c000000c00eae1e"], 0x14}}, 0x0) 06:49:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x5, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:22 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x3f00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:22 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c000000fb27ae1e"], 0x14}}, 0x0) 06:49:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x6, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2455.468159][ T1565] device lo entered promiscuous mode [ 2455.477467][ T1553] ldm_validate_partition_table(): Disk read failed. 06:49:22 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:22 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x4000000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2455.526406][ T1565] device lo left promiscuous mode [ 2455.531687][ T1553] Dev loop0: unable to read RDB block 0 [ 2455.552421][ T1553] loop0: unable to read partition table [ 2455.559057][ T1553] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:23 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x7, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2455.707486][ T1579] device lo entered promiscuous mode [ 2455.746158][ T1573] ldm_validate_partition_table(): Disk read failed. [ 2455.769582][ T1573] Dev loop0: unable to read RDB block 0 [ 2455.796696][ T1590] device lo left promiscuous mode [ 2455.815787][ T1573] loop0: unable to read partition table [ 2455.845605][ T1573] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x8, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:23 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:23 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000040ae1e"], 0x14}}, 0x0) 06:49:23 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x4800000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:23 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000ec0ae1e"], 0x14}}, 0x0) 06:49:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0x9, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2456.106789][ T1606] device lo entered promiscuous mode [ 2456.140044][ T1618] device lo left promiscuous mode 06:49:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:23 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x4c00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:23 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2456.251297][ T1617] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:49:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c00000027fbae1e"], 0x14}}, 0x0) 06:49:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xfffffffd, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:23 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:23 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x2, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2456.409292][ T1639] device lo entered promiscuous mode [ 2456.493602][ T1649] device lo left promiscuous mode 06:49:23 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:23 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x5c00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x10', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000002ae1e"], 0x14}}, 0x0) 06:49:24 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6600000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:24 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2456.840651][ T1678] device lo entered promiscuous mode 06:49:24 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2456.952437][ T1682] device lo left promiscuous mode 06:49:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:24 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x6000000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2457.000750][ T1688] ldm_validate_partition_table(): Disk read failed. [ 2457.019235][ T1688] Dev loop0: unable to read RDB block 0 [ 2457.037755][ T1688] loop0: unable to read partition table 06:49:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000003ae1e"], 0x14}}, 0x0) [ 2457.048443][ T1688] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:24 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2457.149566][ T1702] device lo entered promiscuous mode 06:49:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x10}}, 0x0) [ 2457.264548][ T1713] device lo left promiscuous mode 06:49:24 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0xc0}}, 0x0) 06:49:24 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x4, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:24 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x6800000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x0f', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:24 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0xec0}}, 0x0) [ 2457.595425][ T1743] device lo entered promiscuous mode [ 2457.657883][ T1737] ldm_validate_partition_table(): Disk read failed. [ 2457.695880][ T1737] Dev loop0: unable to read RDB block 0 06:49:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x5, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2457.718327][ T1743] device lo left promiscuous mode [ 2457.726290][ T1737] loop0: unable to read partition table [ 2457.741074][ T1737] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:25 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:25 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x6c00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x33fe0}}, 0x0) [ 2457.936050][ T1765] device lo entered promiscuous mode 06:49:25 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2458.015728][ T1774] device lo left promiscuous mode 06:49:25 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x6, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:25 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x7400000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:25 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x200003d4}}, 0x0) 06:49:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2458.227843][ T1810] device lo entered promiscuous mode 06:49:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x7ffff000}}, 0x0) 06:49:25 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2458.309949][ T1810] device lo left promiscuous mode [ 2458.315823][ T1809] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:49:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x2}, 0x0) 06:49:25 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x7a00000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x7, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x8}, 0x0) 06:49:25 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2458.538852][ T1834] device lo entered promiscuous mode 06:49:25 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2458.646061][ T1847] device lo left promiscuous mode 06:49:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:26 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x8, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:26 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xc3ffffff00000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2458.786967][ T1853] ldm_validate_partition_table(): Disk read failed. [ 2458.814743][ T1853] Dev loop0: unable to read RDB block 0 06:49:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x300}, 0x0) [ 2458.840478][ T1853] loop0: unable to read partition table [ 2458.861248][ T1853] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0xffffff1f}, 0x0) [ 2458.937770][ T1873] device lo entered promiscuous mode 06:49:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:26 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2459.016613][ T1873] device lo left promiscuous mode 06:49:26 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xfdfdffff00000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:26 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2459.093261][ T1878] ldm_validate_partition_table(): Disk read failed. [ 2459.109745][ T1878] Dev loop0: unable to read RDB block 0 [ 2459.126186][ T1878] loop0: unable to read partition table [ 2459.136507][ T1878] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x9, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x2}, 0x0) 06:49:26 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000007", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2459.263179][ T1902] device lo entered promiscuous mode 06:49:26 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2459.351585][ T1902] device lo left promiscuous mode [ 2459.352696][ T1907] ldm_validate_partition_table(): Disk read failed. [ 2459.364229][ T1907] Dev loop0: unable to read RDB block 0 [ 2459.381332][ T1907] loop0: unable to read partition table [ 2459.387624][ T1907] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:26 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xfe80000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x3}, 0x0) 06:49:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xa, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:26 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2459.576911][ T1925] device lo entered promiscuous mode 06:49:27 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000007fff", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2459.682155][ T1940] device lo left promiscuous mode 06:49:27 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:27 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xfeffffff00000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x300}, 0x0) 06:49:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xb, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:27 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2459.866754][ C0] print_req_error: 1248 callbacks suppressed [ 2459.866763][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2459.879992][ C0] buffer_io_error: 1233 callbacks suppressed [ 2459.880000][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2459.919442][ T1955] device lo entered promiscuous mode [ 2459.941168][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2459.948372][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2460.006955][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2460.014099][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xec0}, 0x0) 06:49:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xe, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2460.058828][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2460.065989][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2460.085388][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2460.092518][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2460.100733][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2460.107885][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2460.116701][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2460.123818][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2460.131948][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2460.139113][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2460.147059][ T1943] ldm_validate_partition_table(): Disk read failed. [ 2460.153826][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2460.161042][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2460.173600][ T1970] device lo left promiscuous mode [ 2460.220069][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2460.227275][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x27fb}, 0x0) 06:49:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2460.292539][ T1943] Dev loop0: unable to read RDB block 0 [ 2460.299496][ T1943] loop0: unable to read partition table [ 2460.309291][ T1943] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2460.658517][ T1999] ldm_validate_partition_table(): Disk read failed. [ 2460.690868][ T1999] Dev loop0: unable to read RDB block 0 [ 2460.710103][ T1999] loop0: unable to read partition table [ 2460.720335][ T1999] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:28 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000ffff", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:28 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0xffffffff00000000}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:28 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x10, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x4000}, 0x0) 06:49:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xc00e}, 0x0) 06:49:28 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2460.898532][ T2020] device lo entered promiscuous mode 06:49:28 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x01', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x18, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2461.030825][ T2037] device lo left promiscuous mode [ 2461.045313][ T2026] ldm_validate_partition_table(): Disk read failed. 06:49:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xfb27}, 0x0) [ 2461.092821][ T2026] Dev loop0: unable to read RDB block 0 [ 2461.142461][ T2026] loop0: unable to read partition table [ 2461.184861][ T2026] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:28 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000002", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:28 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:28 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x34000}, 0x0) 06:49:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x44, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:28 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2461.533135][ T2073] device lo entered promiscuous mode [ 2461.576558][ T2073] device lo left promiscuous mode 06:49:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x400300}, 0x0) 06:49:29 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2461.675089][ T2077] ldm_validate_partition_table(): Disk read failed. 06:49:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x60, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:29 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2461.722773][ T2077] Dev loop0: unable to read RDB block 0 [ 2461.762881][ T2077] loop0: unable to read partition table 06:49:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x1000000}, 0x0) [ 2461.773773][ T2077] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2461.896087][ T2104] device lo entered promiscuous mode [ 2461.988128][ T2104] device lo left promiscuous mode [ 2461.994025][ T2105] ldm_validate_partition_table(): Disk read failed. [ 2462.023571][ T2105] Dev loop0: unable to read RDB block 0 [ 2462.034091][ T2105] loop0: unable to read partition table [ 2462.048329][ T2105] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:29 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000003", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:29 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x02', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x2000000}, 0x0) 06:49:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x61, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:29 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2462.218963][ T2128] device lo entered promiscuous mode 06:49:29 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x3000000}, 0x0) [ 2462.300649][ T2128] device lo left promiscuous mode 06:49:29 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x78, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2462.349466][ T2132] ldm_validate_partition_table(): Disk read failed. [ 2462.385982][ T2132] Dev loop0: unable to read RDB block 0 06:49:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:29 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2462.433664][ T2132] loop0: unable to read partition table [ 2462.449893][ T2132] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2462.559670][ T2153] device lo entered promiscuous mode 06:49:29 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000004", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x40000000}, 0x0) 06:49:29 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2462.614991][ T2159] device lo left promiscuous mode 06:49:30 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:30 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x9effffff}, 0x0) 06:49:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:30 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:30 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfc, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2462.894556][ T2173] ldm_validate_partition_table(): Disk read failed. [ 2462.965576][ T2192] device lo entered promiscuous mode [ 2462.977817][ T2173] Dev loop0: unable to read RDB block 0 06:49:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xc00e0000}, 0x0) [ 2463.028220][ T2173] loop0: unable to read partition table [ 2463.035841][ T2173] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2463.092503][ T2192] device lo left promiscuous mode 06:49:30 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2463.218740][ T2206] ldm_validate_partition_table(): Disk read failed. [ 2463.266416][ T2206] Dev loop0: unable to read RDB block 0 [ 2463.275703][ T2206] loop0: unable to read partition table [ 2463.286148][ T2206] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2463.321071][ T2218] device lo entered promiscuous mode [ 2463.357028][ T2218] device lo left promiscuous mode 06:49:30 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000005", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:30 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:30 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x12c, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xefffffff}, 0x0) 06:49:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:30 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:30 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xf0ffffff}, 0x0) [ 2463.631513][ T2240] device lo entered promiscuous mode 06:49:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x1f4, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2463.684252][ T2241] ldm_validate_partition_table(): Disk read failed. [ 2463.706507][ T2247] device lo left promiscuous mode [ 2463.716428][ T2241] Dev loop0: unable to read RDB block 0 [ 2463.725719][ T2241] loop0: unable to read partition table [ 2463.731774][ T2241] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xfb270000}, 0x0) 06:49:31 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:31 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000006", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:31 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xffffff7f}, 0x0) 06:49:31 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2464.028403][ T2273] device lo entered promiscuous mode 06:49:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x300, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:31 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2464.139235][ T2286] device lo left promiscuous mode 06:49:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xffffff9e}, 0x0) 06:49:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2464.207158][ T2283] ldm_validate_partition_table(): Disk read failed. [ 2464.232241][ T2283] Dev loop0: unable to read RDB block 0 06:49:31 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2464.278522][ T2283] loop0: unable to read partition table [ 2464.344087][ T2283] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:31 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xffffffef}, 0x0) 06:49:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3e8, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2464.456093][ T2307] device lo entered promiscuous mode [ 2464.506946][ T2312] device lo left promiscuous mode 06:49:32 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000007", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:32 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:32 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xfffffff0}, 0x0) 06:49:32 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2464.793468][ T2335] device lo entered promiscuous mode 06:49:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2464.879037][ T2346] device lo left promiscuous mode 06:49:32 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x10000000000}, 0x0) 06:49:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x500, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2464.939850][ C0] print_req_error: 1519 callbacks suppressed [ 2464.939858][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2464.953047][ C0] buffer_io_error: 1500 callbacks suppressed [ 2464.953055][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2464.967351][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2464.974465][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2464.982509][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 06:49:32 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2464.989661][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2464.998167][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2465.005355][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2465.014889][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2465.022035][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2465.055300][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2465.062465][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x40030000000000}, 0x0) [ 2465.136429][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2465.143604][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2465.176502][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2465.183631][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2465.191558][ T2347] ldm_validate_partition_table(): Disk read failed. [ 2465.199838][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2465.207008][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2465.215501][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2465.221115][ T2365] device lo entered promiscuous mode [ 2465.222617][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2465.223413][ T2347] Dev loop0: unable to read RDB block 0 [ 2465.261562][ T2347] loop0: unable to read partition table [ 2465.293089][ T2347] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2465.352080][ T2365] device lo left promiscuous mode 06:49:32 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000008", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x600, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:32 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x100000000000000}, 0x0) 06:49:32 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:32 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x200000000000000}, 0x0) 06:49:32 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x638, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2465.633902][ T2382] ldm_validate_partition_table(): Disk read failed. 06:49:33 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2465.727014][ T2382] Dev loop0: unable to read RDB block 0 [ 2465.746994][ T2403] device lo entered promiscuous mode [ 2465.765354][ T2382] loop0: unable to read partition table 06:49:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x300000000000000}, 0x0) [ 2465.796259][ T2382] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2465.834329][ T2403] device lo left promiscuous mode 06:49:33 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:33 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5800]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x700, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:33 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000009", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x4000000000000000}, 0x0) 06:49:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:33 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x8000000000000000}, 0x0) [ 2466.177207][ T2439] device lo entered promiscuous mode 06:49:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x900, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2466.281466][ T2439] device lo left promiscuous mode [ 2466.306288][ T2437] ldm_validate_partition_table(): Disk read failed. 06:49:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x9effffff00000000}, 0x0) [ 2466.391414][ T2437] Dev loop0: unable to read RDB block 0 06:49:33 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:33 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2466.438103][ T2437] loop0: unable to read partition table [ 2466.444056][ T2437] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xc00e000000000000}, 0x0) 06:49:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xa00, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2466.696975][ T2467] device lo entered promiscuous mode [ 2466.759390][ T2468] ldm_validate_partition_table(): Disk read failed. [ 2466.822949][ T2468] Dev loop0: unable to read RDB block 0 [ 2466.833285][ T2484] device lo left promiscuous mode [ 2466.839158][ T2468] loop0: unable to read partition table [ 2466.845070][ T2468] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:34 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000000a", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:34 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xefffffff00000000}, 0x0) 06:49:34 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xb00, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:34 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xf0ffffff00000000}, 0x0) [ 2467.174890][ T2506] device lo entered promiscuous mode [ 2467.239869][ T2513] device lo left promiscuous mode 06:49:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xe00, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:34 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xfb27000000000000}, 0x0) [ 2467.339506][ T2517] ldm_validate_partition_table(): Disk read failed. [ 2467.400494][ T2517] Dev loop0: unable to read RDB block 0 [ 2467.415988][ T2517] loop0: unable to read partition table [ 2467.421840][ T2517] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:34 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:34 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000000b", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:34 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf00, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xffffff7f00000000}, 0x0) [ 2467.660808][ T2550] device lo entered promiscuous mode 06:49:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:35 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2467.802252][ T2566] device lo left promiscuous mode 06:49:35 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0xffffffff00000000}, 0x0) [ 2467.856747][ T2556] ldm_validate_partition_table(): Disk read failed. 06:49:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x1290, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2467.926348][ T2556] Dev loop0: unable to read RDB block 0 [ 2467.954421][ T2556] loop0: unable to read partition table [ 2467.969929][ T2556] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2468.016726][ T2584] device lo entered promiscuous mode 06:49:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:35 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2468.092699][ T2584] device lo left promiscuous mode 06:49:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x2}, 0x0) 06:49:35 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000000c", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:35 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x12a0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x3}, 0x0) 06:49:35 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2468.390160][ T2616] device lo entered promiscuous mode [ 2468.407754][ T2611] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:49:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x300}, 0x0) 06:49:35 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2468.479100][ T2621] device lo left promiscuous mode 06:49:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xec0}, 0x0) 06:49:35 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x1800, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2468.610113][ T2636] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:49:36 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000000d", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:36 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x27fb}, 0x0) [ 2468.738656][ T2648] device lo entered promiscuous mode 06:49:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x4000}, 0x0) 06:49:36 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x1f00, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2468.879095][ T2663] device lo left promiscuous mode 06:49:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xc00e}, 0x0) [ 2468.956084][ T2657] ldm_validate_partition_table(): Disk read failed. 06:49:36 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2468.999107][ T2657] Dev loop0: unable to read RDB block 0 [ 2469.022271][ T2657] loop0: unable to read partition table [ 2469.029798][ T2657] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:36 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xfb27}, 0x0) [ 2469.127410][ T2683] device lo entered promiscuous mode 06:49:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x1fff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2469.227112][ T2688] ldm_validate_partition_table(): Disk read failed. [ 2469.244785][ T2690] device lo left promiscuous mode [ 2469.291439][ T2688] Dev loop0: unable to read RDB block 0 [ 2469.304392][ T2688] loop0: unable to read partition table [ 2469.346276][ T2688] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:36 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000000e", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x34000}, 0x0) 06:49:36 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:36 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x2000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:37 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x400300}, 0x0) [ 2469.636421][ T2728] device lo entered promiscuous mode [ 2469.722094][ T2735] device lo left promiscuous mode 06:49:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x2c01, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:37 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x1000000}, 0x0) [ 2469.755356][ T2734] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:49:37 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2469.881570][ T2744] ldm_validate_partition_table(): Disk read failed. [ 2469.939210][ T2744] Dev loop0: unable to read RDB block 0 [ 2469.981221][ T2754] device lo entered promiscuous mode [ 2469.988266][ C1] print_req_error: 1229 callbacks suppressed [ 2469.988275][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2470.002199][ C1] buffer_io_error: 1210 callbacks suppressed [ 2470.002213][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2470.062554][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2470.069734][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2470.104518][ C1] print_req_error: I/O error, dev loop0, sector 24 flags 0 [ 2470.111878][ C1] Buffer I/O error on dev loop0, logical block 3, async page read [ 2470.120100][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2470.127284][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2470.136178][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2470.143307][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2470.151372][ T2744] loop0: unable to read partition table [ 2470.157072][ T2764] device lo left promiscuous mode [ 2470.163610][ T2744] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2470.174690][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 80700 [ 2470.193574][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 0 06:49:37 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000000f", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x2000000}, 0x0) 06:49:37 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3806, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2470.201085][ C1] Buffer I/O error on dev loop0, logical block 4208, async page read [ 2470.209499][ C1] print_req_error: I/O error, dev loop0, sector 33784 flags 80700 06:49:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x3000000}, 0x0) [ 2470.254981][ C1] print_req_error: I/O error, dev loop0, sector 33784 flags 0 [ 2470.264886][ C1] Buffer I/O error on dev loop0, logical block 4223, async page read 06:49:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:37 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2470.302622][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2470.309836][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2470.337067][ C1] Buffer I/O error on dev loop0, logical block 1, async page read 06:49:37 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2470.345571][ C1] Buffer I/O error on dev loop0, logical block 4225, async page read 06:49:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x40000000}, 0x0) 06:49:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3f00, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2470.520389][ T2795] device lo entered promiscuous mode 06:49:37 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2470.616907][ T2804] device lo left promiscuous mode 06:49:38 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000010", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x9effffff}, 0x0) 06:49:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:38 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xc00e0000}, 0x0) 06:49:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3fff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xefffffff}, 0x0) [ 2470.926398][ T2828] device lo entered promiscuous mode [ 2470.951446][ T2816] ldm_validate_partition_table(): Disk read failed. 06:49:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2470.996883][ T2816] Dev loop0: unable to read RDB block 0 [ 2471.037168][ T2816] loop0: unable to read partition table [ 2471.062595][ T2834] device lo left promiscuous mode [ 2471.099450][ T2816] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:38 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2471.291182][ T2853] ldm_validate_partition_table(): Disk read failed. [ 2471.298653][ T2860] device lo entered promiscuous mode [ 2471.328796][ T2853] Dev loop0: unable to read RDB block 0 06:49:38 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000011", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x4000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xf0ffffff}, 0x0) 06:49:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xfb270000}, 0x0) [ 2471.339447][ T2853] loop0: unable to read partition table [ 2471.347865][ T2853] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2471.367829][ T2863] device lo left promiscuous mode 06:49:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:38 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xffffff7f}, 0x0) 06:49:38 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x4400, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2471.671012][ T2891] device lo entered promiscuous mode [ 2471.697724][ T2888] ldm_validate_partition_table(): Disk read failed. [ 2471.788329][ T2888] Dev loop0: unable to read RDB block 0 [ 2471.801504][ T2888] loop0: unable to read partition table [ 2471.807607][ T2888] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2471.821160][ T2907] device lo left promiscuous mode 06:49:39 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000012", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xffffff9e}, 0x0) 06:49:39 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x6000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:39 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:39 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xffffffef}, 0x0) [ 2472.061102][ T2930] device lo entered promiscuous mode 06:49:39 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x6100, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2472.129080][ T2930] device lo left promiscuous mode [ 2472.148066][ T2932] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:49:39 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 2472.356362][ T2945] device lo entered promiscuous mode 06:49:39 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000025", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x10000000000}, 0x0) 06:49:39 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2472.536355][ T2960] device lo left promiscuous mode 06:49:39 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x7800, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x40030000000000}, 0x0) 06:49:39 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2472.630603][ T2964] ldm_validate_partition_table(): Disk read failed. [ 2472.646627][ T2964] Dev loop0: unable to read RDB block 0 [ 2472.682608][ T2964] loop0: unable to read partition table 06:49:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x100000000000000}, 0x0) 06:49:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2472.742443][ T2964] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2472.777089][ T2984] device lo entered promiscuous mode 06:49:40 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2472.877048][ T2993] device lo left promiscuous mode 06:49:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x200000000000000}, 0x0) [ 2472.946341][ T2992] ldm_validate_partition_table(): Disk read failed. [ 2472.971502][ T2992] Dev loop0: unable to read RDB block 0 [ 2472.983871][ T2992] loop0: unable to read partition table [ 2472.989737][ T2992] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:40 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000048", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:40 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:40 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:40 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x7f00, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x300000000000000}, 0x0) 06:49:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x4000000000000000}, 0x0) 06:49:40 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2473.276237][ T3020] device lo entered promiscuous mode 06:49:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x8000000000000000}, 0x0) 06:49:40 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2473.372628][ T3027] device lo left promiscuous mode [ 2473.379056][ T3029] ldm_validate_partition_table(): Disk read failed. [ 2473.446917][ T3029] Dev loop0: unable to read RDB block 0 06:49:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 06:49:40 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2473.495466][ T3029] loop0: unable to read partition table [ 2473.560135][ T3029] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2473.646463][ T3056] device lo entered promiscuous mode [ 2473.716923][ T3063] device lo left promiscuous mode [ 2473.731390][ T3059] ldm_validate_partition_table(): Disk read failed. [ 2473.756157][ T3059] Dev loop0: unable to read RDB block 0 [ 2473.762993][ T3059] loop0: unable to read partition table [ 2473.781857][ T3059] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x80fe, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xc00e000000000000}, 0x0) 06:49:41 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:41 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000004c", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:41 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xefffffff00000000}, 0x0) 06:49:41 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x9012, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2474.008186][ T3095] device lo entered promiscuous mode 06:49:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) [ 2474.080230][ T3091] ldm_validate_partition_table(): Disk read failed. [ 2474.091580][ T3095] device lo left promiscuous mode 06:49:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:41 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2474.139534][ T3091] Dev loop0: unable to read RDB block 0 06:49:41 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xfb27000000000000}, 0x0) [ 2474.211445][ T3091] loop0: unable to read partition table [ 2474.249176][ T3091] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2474.287982][ T3124] device lo entered promiscuous mode [ 2474.337778][ T3133] device lo left promiscuous mode 06:49:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xa012, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:41 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:41 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000005c", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 06:49:41 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:41 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xb8ff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2474.552043][ T3149] device lo entered promiscuous mode [ 2474.598868][ T3152] device lo left promiscuous mode 06:49:42 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 06:49:42 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2474.806876][ T3171] ldm_validate_partition_table(): Disk read failed. [ 2474.830607][ T3171] Dev loop0: unable to read RDB block 0 06:49:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x0) 06:49:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2474.869025][ T3171] loop0: unable to read partition table [ 2474.887209][ T3188] device lo entered promiscuous mode 06:49:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xbcff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2474.915577][ T3171] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2475.019241][ T3202] device lo left promiscuous mode [ 2475.094143][ C1] print_req_error: 1239 callbacks suppressed [ 2475.094151][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 80700 [ 2475.108099][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2475.115247][ C1] buffer_io_error: 1220 callbacks suppressed [ 2475.115254][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2475.124072][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 0 [ 2475.136624][ C1] Buffer I/O error on dev loop0, logical block 4208, async page read [ 2475.144731][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2475.144743][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2475.177615][ C1] print_req_error: I/O error, dev loop0, sector 33784 flags 80700 [ 2475.185486][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2475.185667][ C0] print_req_error: I/O error, dev loop0, sector 33784 flags 0 [ 2475.192593][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2475.200876][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2475.207909][ C0] Buffer I/O error on dev loop0, logical block 4223, async page read [ 2475.223088][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2475.231165][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2475.238312][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2475.246479][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2475.253608][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2475.262010][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2475.270386][ C1] Buffer I/O error on dev loop0, logical block 1, async page read [ 2475.278963][ T3204] ldm_validate_partition_table(): Disk read failed. [ 2475.299696][ T3204] Dev loop0: unable to read RDB block 0 [ 2475.315729][ T3204] loop0: unable to read partition table [ 2475.326887][ T3204] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x0) 06:49:42 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:42 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000068", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xe803, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:42 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:42 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x300}, 0x0) [ 2475.485692][ T3237] device lo entered promiscuous mode [ 2475.570766][ T3237] device lo left promiscuous mode 06:49:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf401, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:43 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:43 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xec0}, 0x0) [ 2475.779177][ T3247] ldm_validate_partition_table(): Disk read failed. 06:49:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfc00, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2475.825786][ T3247] Dev loop0: unable to read RDB block 0 [ 2475.847424][ T3247] loop0: unable to read partition table [ 2475.860016][ T3282] device lo entered promiscuous mode 06:49:43 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2475.884575][ T3247] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2475.936436][ T3282] device lo left promiscuous mode 06:49:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x27fb}, 0x0) 06:49:43 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000006c", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:43 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:43 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfe80, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 2476.198613][ T3300] device lo entered promiscuous mode 06:49:43 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2476.278752][ T3314] device lo left promiscuous mode [ 2476.285907][ T3309] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:49:43 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:43 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:43 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000074", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2476.557018][ T3347] device lo entered promiscuous mode 06:49:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xc00e}, 0x0) 06:49:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff00, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2476.660524][ T3357] device lo left promiscuous mode 06:49:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2476.733088][ T3356] ldm_validate_partition_table(): Disk read failed. 06:49:44 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2476.805355][ T3356] Dev loop0: unable to read RDB block 0 [ 2476.823669][ T3356] loop0: unable to read partition table [ 2476.829803][ T3356] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xfb27}, 0x0) 06:49:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2476.967044][ T3388] device lo entered promiscuous mode [ 2477.028762][ T3388] device lo left promiscuous mode 06:49:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff01, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2477.057212][ T3380] ldm_validate_partition_table(): Disk read failed. [ 2477.096601][ T3380] Dev loop0: unable to read RDB block 0 06:49:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2477.112754][ T3380] loop0: unable to read partition table [ 2477.149039][ T3380] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:44 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 06:49:44 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000007a", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff03, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2477.444327][ T3419] device lo entered promiscuous mode 06:49:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x400300}, 0x0) [ 2477.568248][ T3419] device lo left promiscuous mode 06:49:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff07, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2477.596520][ T3423] ldm_validate_partition_table(): Disk read failed. [ 2477.603779][ T3423] Dev loop0: unable to read RDB block 0 [ 2477.610235][ T3423] loop0: unable to read partition table [ 2477.621031][ T3423] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:45 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:45 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 06:49:45 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2477.878694][ T3451] device lo entered promiscuous mode 06:49:45 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2478.006842][ T3468] device lo left promiscuous mode 06:49:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 06:49:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff0f, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2478.043131][ T3463] ldm_validate_partition_table(): Disk read failed. [ 2478.062529][ T3463] Dev loop0: unable to read RDB block 0 06:49:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xf9', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:45 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:45 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2478.173488][ T3463] loop0: unable to read partition table 06:49:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 06:49:45 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2478.287465][ T3463] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2478.299025][ T3490] device lo entered promiscuous mode 06:49:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff1f, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2478.348919][ T3490] device lo left promiscuous mode 06:49:45 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:45 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:45 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) 06:49:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff3f, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xfd', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2478.639252][ T3510] device lo entered promiscuous mode [ 2478.706888][ T3520] device lo left promiscuous mode 06:49:46 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 06:49:46 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2478.862604][ T3515] ldm_validate_partition_table(): Disk read failed. 06:49:46 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2478.904673][ T3515] Dev loop0: unable to read RDB block 0 [ 2478.926707][ T3515] loop0: unable to read partition table [ 2478.946556][ T3536] device lo entered promiscuous mode 06:49:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff7f, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2478.956671][ T3515] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x8c', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2479.043458][ T3543] device lo left promiscuous mode 06:49:46 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xc00e0000}, 0x0) [ 2479.317227][ T3556] ldm_validate_partition_table(): Disk read failed. [ 2479.327949][ T3556] Dev loop0: unable to read RDB block 0 [ 2479.355050][ T3556] loop0: unable to read partition table [ 2479.370326][ T3556] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:46 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:46 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:46 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xffb8, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xefffffff}, 0x0) 06:49:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) [ 2479.520052][ T3586] device lo entered promiscuous mode 06:49:46 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2479.560869][ T3586] device lo left promiscuous mode 06:49:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xffbc, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:47 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2479.655514][ T3581] ldm_validate_partition_table(): Disk read failed. 06:49:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x97', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2479.737521][ T3581] Dev loop0: unable to read RDB block 0 [ 2479.750804][ T3581] loop0: unable to read partition table [ 2479.756806][ T3581] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2479.853031][ T3610] device lo entered promiscuous mode 06:49:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2479.946331][ T3610] device lo left promiscuous mode 06:49:47 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xfb270000}, 0x0) 06:49:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x1ffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:47 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 06:49:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xeb', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2480.229379][ T3639] device lo entered promiscuous mode [ 2480.288227][ C1] print_req_error: 1506 callbacks suppressed [ 2480.288236][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 80700 [ 2480.316553][ T3639] device lo left promiscuous mode 06:49:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3ffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2480.385828][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 0 [ 2480.393370][ C1] buffer_io_error: 1483 callbacks suppressed [ 2480.393378][ C1] Buffer I/O error on dev loop0, logical block 4208, async page read [ 2480.399442][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2480.414606][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2480.446649][ C1] print_req_error: I/O error, dev loop0, sector 33784 flags 80700 [ 2480.454564][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2480.461749][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2480.470169][ C1] print_req_error: I/O error, dev loop0, sector 33784 flags 0 [ 2480.477679][ C1] Buffer I/O error on dev loop0, logical block 4223, async page read 06:49:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 2480.493810][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2480.500998][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2480.514197][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2480.521381][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2480.529650][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2480.536822][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:47 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2480.550142][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2480.557290][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2480.566124][ C1] Buffer I/O error on dev loop0, logical block 1, async page read [ 2480.573974][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2480.588403][ T3637] ldm_validate_partition_table(): Disk read failed. [ 2480.603957][ T3637] Dev loop0: unable to read RDB block 0 [ 2480.671227][ T3637] loop0: unable to read partition table [ 2480.724735][ T3637] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2480.743722][ T3669] device lo entered promiscuous mode [ 2480.811681][ T3669] device lo left promiscuous mode [ 2480.867946][ T3637] ldm_validate_partition_table(): Disk read failed. [ 2480.897685][ T3637] Dev loop0: unable to read RDB block 0 [ 2480.920120][ T3637] loop0: unable to read partition table [ 2480.937706][ T3637] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:48 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x7ffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xf6', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xffffffef}, 0x0) 06:49:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:48 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2481.130874][ T3704] device lo entered promiscuous mode 06:49:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 2481.207489][ T3704] device lo left promiscuous mode 06:49:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xfd', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2481.293528][ T3714] ldm_validate_partition_table(): Disk read failed. [ 2481.319293][ T3714] Dev loop0: unable to read RDB block 0 [ 2481.329369][ T3714] loop0: unable to read partition table 06:49:48 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2481.335545][ T3714] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:48 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x10000000000}, 0x0) [ 2481.512036][ T3736] device lo entered promiscuous mode 06:49:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x100000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2481.617968][ T3736] device lo left promiscuous mode 06:49:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 06:49:49 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:49 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x1fffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2481.845950][ T3760] device lo entered promiscuous mode [ 2481.911948][ T3766] device lo left promiscuous mode [ 2481.916243][ T3749] ldm_validate_partition_table(): Disk read failed. [ 2481.943349][ T3749] Dev loop0: unable to read RDB block 0 06:49:49 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2481.973558][ T3749] loop0: unable to read partition table [ 2481.984207][ T3749] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 06:49:49 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2482.187102][ T3749] ldm_validate_partition_table(): Disk read failed. [ 2482.216898][ T3749] Dev loop0: unable to read RDB block 0 [ 2482.226194][ T3787] device lo entered promiscuous mode [ 2482.246340][ T3749] loop0: unable to read partition table [ 2482.256627][ T3749] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:49 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3fffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 06:49:49 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2482.313355][ T3792] device lo left promiscuous mode 06:49:49 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:49 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) 06:49:49 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x7fffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2482.518543][ T3808] loop_set_status: loop0 () has still dirty pages (nrpages=1) [ 2482.528147][ T3816] device lo entered promiscuous mode [ 2482.586536][ T3818] device lo left promiscuous mode 06:49:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) [ 2482.746268][ T3823] ldm_validate_partition_table(): Disk read failed. [ 2482.822460][ T3823] Dev loop0: unable to read RDB block 0 [ 2482.831412][ T3823] loop0: unable to read partition table [ 2482.841438][ T3823] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:50 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:50 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:50 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x8000000000000000}, 0x0) 06:49:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2482.969427][ T3847] device lo entered promiscuous mode 06:49:50 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) [ 2483.099732][ T3858] device lo left promiscuous mode [ 2483.121822][ T3854] ldm_validate_partition_table(): Disk read failed. 06:49:50 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:50 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2483.237339][ T3854] Dev loop0: unable to read RDB block 0 [ 2483.253350][ T3854] loop0: unable to read partition table 06:49:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x1000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2483.376411][ T3873] device lo entered promiscuous mode [ 2483.439482][ T3854] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2483.449934][ T3884] device lo left promiscuous mode 06:49:50 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xc00e000000000000}, 0x0) 06:49:50 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:50 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:51 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x1ffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:51 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2483.746734][ T3905] device lo entered promiscuous mode [ 2483.777693][ T3906] ldm_validate_partition_table(): Disk read failed. 06:49:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xefffffff00000000}, 0x0) 06:49:51 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2483.801709][ T3906] Dev loop0: unable to read RDB block 0 [ 2483.821346][ T3906] loop0: unable to read partition table [ 2483.845820][ T3919] device lo left promiscuous mode [ 2483.872425][ T3906] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:51 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:51 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2484.078086][ T3933] device lo entered promiscuous mode 06:49:51 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:51 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x2000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) [ 2484.178841][ T3945] device lo left promiscuous mode 06:49:51 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xfb27000000000000}, 0x0) 06:49:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:51 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:51 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:51 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2484.404429][ T3956] ldm_validate_partition_table(): Disk read failed. [ 2484.452763][ T3956] Dev loop0: unable to read RDB block 0 [ 2484.476475][ T3965] device lo entered promiscuous mode [ 2484.479484][ T3956] loop0: unable to read partition table 06:49:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 2484.511962][ T3956] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2484.567861][ T3973] device lo left promiscuous mode 06:49:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:52 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:52 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:52 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3ffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0xffffffff00000000}, 0x0) 06:49:52 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:52 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2484.988509][ T4012] device lo entered promiscuous mode 06:49:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x4000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2485.046648][ T4012] device lo left promiscuous mode [ 2485.083280][ T4014] ldm_validate_partition_table(): Disk read failed. 06:49:52 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:52 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2485.205312][ T4014] Dev loop0: unable to read RDB block 0 [ 2485.211576][ T4014] loop0: unable to read partition table [ 2485.217632][ T4014] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2485.368261][ T4043] device lo entered promiscuous mode [ 2485.407068][ T4043] device lo left promiscuous mode 06:49:52 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000026", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:52 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x5000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:52 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:52 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2485.595782][ T4058] loop_set_status: loop0 () has still dirty pages (nrpages=1) [ 2485.690642][ T4063] device lo entered promiscuous mode 06:49:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x6000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:53 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2485.812973][ T4069] device lo left promiscuous mode 06:49:53 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:53 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:53 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x7000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2486.142687][ C1] print_req_error: 1654 callbacks suppressed [ 2486.142696][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2486.155970][ C1] buffer_io_error: 1634 callbacks suppressed [ 2486.155977][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2486.171242][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2486.178409][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:53 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2486.178759][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2486.186829][ T4108] device lo entered promiscuous mode [ 2486.193517][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2486.193863][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2486.213802][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2486.222129][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2486.229322][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2486.276366][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2486.283513][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2486.336659][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2486.343815][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2486.353321][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2486.360475][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2486.368427][ T4096] ldm_validate_partition_table(): Disk read failed. 06:49:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2486.382477][ T4108] device lo left promiscuous mode [ 2486.403923][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2486.411156][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2486.420027][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2486.427271][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 06:49:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x7ffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2486.436024][ T4096] Dev loop0: unable to read RDB block 0 [ 2486.449514][ T4096] loop0: unable to read partition table [ 2486.455720][ T4096] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:53 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:53 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:53 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2486.717212][ T4133] device lo entered promiscuous mode [ 2486.727840][ T4135] ldm_validate_partition_table(): Disk read failed. [ 2486.742855][ T4135] Dev loop0: unable to read RDB block 0 06:49:54 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:54 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x8000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2486.772506][ T4135] loop0: unable to read partition table [ 2486.779229][ T4142] device lo left promiscuous mode [ 2486.788984][ T4135] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:54 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:54 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:54 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:54 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5800]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2487.076223][ T4169] device lo entered promiscuous mode 06:49:54 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x9000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2487.176945][ T4163] ldm_validate_partition_table(): Disk read failed. [ 2487.198654][ T4177] device lo left promiscuous mode [ 2487.214457][ T4163] Dev loop0: unable to read RDB block 0 06:49:54 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:54 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2487.252297][ T4163] loop0: unable to read partition table [ 2487.279460][ T4163] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2487.386256][ T4189] device lo entered promiscuous mode 06:49:54 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:54 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xa000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2487.511048][ T4203] device lo left promiscuous mode 06:49:54 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2487.570542][ T4198] ldm_validate_partition_table(): Disk read failed. [ 2487.605955][ T4198] Dev loop0: unable to read RDB block 0 [ 2487.628452][ T4198] loop0: unable to read partition table [ 2487.664169][ T4198] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2487.728213][ T4217] device lo entered promiscuous mode 06:49:55 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:55 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2487.815600][ T4217] device lo left promiscuous mode 06:49:55 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xb000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:55 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:55 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:55 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:55 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2488.191824][ T4252] device lo entered promiscuous mode 06:49:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:55 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2488.390562][ T4256] device lo left promiscuous mode 06:49:55 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xe000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:55 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400000000000f", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:55 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:55 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2488.687295][ T4287] ldm_validate_partition_table(): Disk read failed. [ 2488.751822][ T4287] Dev loop0: unable to read RDB block 0 [ 2488.758039][ T4300] device lo entered promiscuous mode 06:49:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:56 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2488.829629][ T4287] loop0: unable to read partition table [ 2488.859438][ T4300] device lo left promiscuous mode [ 2488.870069][ T4287] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:56 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:56 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2489.064722][ T4313] ldm_validate_partition_table(): Disk read failed. [ 2489.075972][ T4322] device lo entered promiscuous mode 06:49:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2489.117430][ T4313] Dev loop0: unable to read RDB block 0 [ 2489.127476][ T4328] device lo left promiscuous mode [ 2489.186760][ T4313] loop0: unable to read partition table [ 2489.204053][ T4313] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:56 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:56 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:56 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2489.530289][ T4351] device lo entered promiscuous mode 06:49:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x10000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:56 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2489.620455][ T4351] device lo left promiscuous mode [ 2489.655371][ T4355] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:49:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:57 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:57 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2489.863096][ T4367] ldm_validate_partition_table(): Disk read failed. [ 2489.870803][ T4374] device lo entered promiscuous mode 06:49:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2489.914155][ T4367] Dev loop0: unable to read RDB block 0 [ 2489.937813][ T4380] device lo left promiscuous mode [ 2489.946722][ T4367] loop0: unable to read partition table [ 2489.955900][ T4367] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:57 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x10000120, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:57 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:57 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:57 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x18000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2490.218406][ T4396] device lo entered promiscuous mode 06:49:57 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2490.327037][ T4413] device lo left promiscuous mode 06:49:57 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2490.412611][ T4410] ldm_validate_partition_table(): Disk read failed. [ 2490.443455][ T4410] Dev loop0: unable to read RDB block 0 [ 2490.546142][ T4410] loop0: unable to read partition table [ 2490.565164][ T4432] device lo entered promiscuous mode [ 2490.619257][ T4432] device lo left promiscuous mode [ 2490.626184][ T4410] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:58 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:58 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x1f000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:58 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2490.845127][ T4456] device lo entered promiscuous mode 06:49:58 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2490.910370][ T4456] device lo left promiscuous mode 06:49:58 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x1fffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:58 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2490.997497][ T4463] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:49:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2491.092956][ T4477] device lo entered promiscuous mode [ 2491.175960][ C1] print_req_error: 1352 callbacks suppressed [ 2491.175968][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 80700 [ 2491.203045][ T4477] device lo left promiscuous mode [ 2491.221771][ C1] print_req_error: I/O error, dev loop0, sector 33664 flags 0 [ 2491.229341][ C1] buffer_io_error: 1332 callbacks suppressed [ 2491.229348][ C1] Buffer I/O error on dev loop0, logical block 4208, async page read [ 2491.243498][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2491.250714][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2491.260140][ C1] print_req_error: I/O error, dev loop0, sector 33784 flags 80700 [ 2491.268413][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2491.275623][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2491.283940][ C1] print_req_error: I/O error, dev loop0, sector 33784 flags 0 [ 2491.291493][ C1] Buffer I/O error on dev loop0, logical block 4223, async page read [ 2491.299645][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2491.306888][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2491.315092][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2491.322258][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2491.330540][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2491.337710][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2491.345593][ C1] print_req_error: I/O error, dev loop0, sector 8 flags 0 [ 2491.349484][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2491.352714][ C1] Buffer I/O error on dev loop0, logical block 1, async page read [ 2491.361506][ C0] Buffer I/O error on dev loop0, logical block 4225, async page read [ 2491.388291][ T4480] ldm_validate_partition_table(): Disk read failed. [ 2491.439561][ T4480] Dev loop0: unable to read RDB block 0 [ 2491.451966][ T4480] loop0: unable to read partition table [ 2491.458076][ T4480] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:58 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:58 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x20000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:58 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:59 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2491.623463][ T4508] device lo entered promiscuous mode 06:49:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2491.713775][ T4508] device lo left promiscuous mode 06:49:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x20010010, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:59 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:59 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2491.838943][ T4515] ldm_validate_partition_table(): Disk read failed. [ 2491.920428][ T4515] Dev loop0: unable to read RDB block 0 [ 2491.934488][ T4515] loop0: unable to read partition table [ 2491.941703][ T4515] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2491.952710][ T4533] device lo entered promiscuous mode [ 2492.056634][ T4543] device lo left promiscuous mode 06:49:59 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:49:59 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x2c010000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:49:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:49:59 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:59 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2492.329899][ T4566] device lo entered promiscuous mode 06:49:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x38060000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2492.414205][ T4568] ldm_validate_partition_table(): Disk read failed. [ 2492.421590][ T4566] device lo left promiscuous mode 06:49:59 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2492.461436][ T4568] Dev loop0: unable to read RDB block 0 [ 2492.478485][ T4568] loop0: unable to read partition table [ 2492.493571][ T4568] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:49:59 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:49:59 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:49:59 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:49:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:50:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3f000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2492.720740][ T4591] device lo entered promiscuous mode 06:50:00 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2492.819532][ T4609] device lo left promiscuous mode 06:50:00 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:00 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2492.951218][ T4605] ldm_validate_partition_table(): Disk read failed. [ 2492.966066][ T4605] Dev loop0: unable to read RDB block 0 06:50:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2493.017506][ T4605] loop0: unable to read partition table [ 2493.062787][ T4605] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2493.116248][ T4626] device lo entered promiscuous mode 06:50:00 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2493.196827][ T4633] device lo left promiscuous mode 06:50:00 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x3fffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:50:00 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:00 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2493.459063][ T4655] device lo entered promiscuous mode 06:50:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2493.555837][ T4655] device lo left promiscuous mode 06:50:00 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2493.630351][ T4656] ldm_validate_partition_table(): Disk read failed. 06:50:01 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2493.683845][ T4656] Dev loop0: unable to read RDB block 0 [ 2493.699967][ T4656] loop0: unable to read partition table 06:50:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x40000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2493.742473][ T4656] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:01 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2493.806401][ T4677] device lo entered promiscuous mode [ 2493.900416][ T4686] device lo left promiscuous mode 06:50:01 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:50:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:01 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:01 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2494.067809][ T4697] ldm_validate_partition_table(): Disk read failed. [ 2494.100936][ T4697] Dev loop0: unable to read RDB block 0 [ 2494.107516][ T4697] loop0: unable to read partition table 06:50:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x44000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2494.113646][ T4697] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:01 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2494.260357][ T4721] device lo entered promiscuous mode 06:50:01 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x4e29b3da, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:01 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 2494.373588][ T4721] device lo left promiscuous mode 06:50:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:01 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2494.472187][ T4733] ldm_validate_partition_table(): Disk read failed. [ 2494.518230][ T4733] Dev loop0: unable to read RDB block 0 06:50:01 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2494.566535][ T4733] loop0: unable to read partition table [ 2494.585713][ T4733] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2494.628686][ T4751] device lo entered promiscuous mode 06:50:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:50:02 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x60000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:02 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a34103340000000000ff", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2494.706478][ T4751] device lo left promiscuous mode 06:50:02 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2494.917364][ T4779] device lo entered promiscuous mode 06:50:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 06:50:02 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2494.989240][ T4775] ldm_validate_partition_table(): Disk read failed. [ 2495.022149][ T4779] device lo left promiscuous mode [ 2495.022535][ T4775] Dev loop0: unable to read RDB block 0 [ 2495.072029][ T4775] loop0: unable to read partition table 06:50:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x61000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2495.126159][ T4775] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:02 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x2) 06:50:02 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2495.325566][ T4775] ldm_validate_partition_table(): Disk read failed. [ 2495.341214][ T4807] device lo entered promiscuous mode [ 2495.370054][ T4775] Dev loop0: unable to read RDB block 0 [ 2495.399128][ T4775] loop0: unable to read partition table 06:50:02 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2495.419394][ T4775] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2495.446802][ T4807] device lo left promiscuous mode 06:50:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x3) 06:50:02 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x78000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:02 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:02 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x300) [ 2495.699460][ T4824] ldm_validate_partition_table(): Disk read failed. [ 2495.747186][ T4824] Dev loop0: unable to read RDB block 0 [ 2495.755804][ T4832] device lo entered promiscuous mode 06:50:03 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x7f000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2495.802549][ T4824] loop0: unable to read partition table [ 2495.834968][ T4824] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xec0) [ 2495.871750][ T4837] device lo left promiscuous mode 06:50:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:03 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:03 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:03 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000007", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:03 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x27fb) 06:50:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x8dffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:03 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x4000) [ 2496.265045][ T4879] device lo entered promiscuous mode 06:50:03 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2496.335513][ C0] print_req_error: 1658 callbacks suppressed [ 2496.335522][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2496.348867][ C0] buffer_io_error: 1634 callbacks suppressed [ 2496.348875][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 06:50:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xc00e) [ 2496.431081][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2496.438263][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2496.461541][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2496.468701][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 06:50:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x90120000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2496.477440][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2496.484562][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2496.493523][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2496.500656][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2496.500970][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2496.515629][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2496.516204][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2496.530641][ C0] Buffer I/O error on dev loop0, logical block 0, async page read 06:50:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xfb27) [ 2496.580283][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2496.587466][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2496.596500][ T4884] ldm_validate_partition_table(): Disk read failed. [ 2496.648762][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2496.656032][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2496.665283][ C0] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2496.672401][ C0] Buffer I/O error on dev loop0, logical block 0, async page read [ 2496.687911][ T4884] Dev loop0: unable to read RDB block 0 [ 2496.693634][ T4905] device lo left promiscuous mode 06:50:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xa0120000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2496.772206][ T4884] loop0: unable to read partition table [ 2496.815536][ T4884] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2497.026246][ T4884] ldm_validate_partition_table(): Disk read failed. [ 2497.049230][ T4884] Dev loop0: unable to read RDB block 0 [ 2497.059400][ T4884] loop0: unable to read partition table [ 2497.069331][ T4884] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:04 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x34000) 06:50:04 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:04 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xb8ff0000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:04 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2497.256262][ T4944] device lo entered promiscuous mode 06:50:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x400300) [ 2497.354175][ T4944] device lo left promiscuous mode [ 2497.390777][ T4943] ldm_validate_partition_table(): Disk read failed. [ 2497.413179][ T4943] Dev loop0: unable to read RDB block 0 06:50:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:04 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xbcff0000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2497.455116][ T4943] loop0: unable to read partition table [ 2497.519035][ T4943] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:04 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2497.578299][ T4967] device lo entered promiscuous mode [ 2497.645680][ T4967] device lo left promiscuous mode 06:50:05 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x1000000) 06:50:05 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xdab3294e, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:05 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:05 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2497.953003][ T4996] device lo entered promiscuous mode 06:50:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x2000000) [ 2497.978135][ T4988] ldm_validate_partition_table(): Disk read failed. [ 2498.002731][ T4988] Dev loop0: unable to read RDB block 0 [ 2498.014492][ T4988] loop0: unable to read partition table 06:50:05 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2498.026812][ T4996] device lo left promiscuous mode [ 2498.044548][ T4988] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:05 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xe0ffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x3000000) 06:50:05 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:05 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:05 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2498.416089][ T5033] device lo entered promiscuous mode 06:50:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x40000000) 06:50:05 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2498.476598][ T5033] device lo left promiscuous mode 06:50:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xe8030000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2498.497577][ T5034] ldm_validate_partition_table(): Disk read failed. [ 2498.513211][ T5034] Dev loop0: unable to read RDB block 0 06:50:05 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2498.568704][ T5034] loop0: unable to read partition table [ 2498.579235][ T5034] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x9effffff) 06:50:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:06 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:06 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) [ 2498.764425][ T5053] device lo entered promiscuous mode 06:50:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf4010000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2498.838064][ T5064] device lo left promiscuous mode 06:50:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xc00e0000) 06:50:06 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:06 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xefffffff) 06:50:06 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2499.047309][ T5078] ldm_validate_partition_table(): Disk read failed. 06:50:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2499.126022][ T5078] Dev loop0: unable to read RDB block 0 [ 2499.138119][ T5091] device lo entered promiscuous mode 06:50:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xf0ffffff) [ 2499.171056][ T5078] loop0: unable to read partition table [ 2499.213772][ T5078] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2499.231114][ T5091] device lo left promiscuous mode 06:50:06 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xfb270000) 06:50:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xf5ffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:06 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:06 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:06 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5800000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xffffff7f) 06:50:06 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2499.552440][ T5129] device lo entered promiscuous mode [ 2499.590925][ T5129] device lo left promiscuous mode 06:50:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x2, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfc000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:07 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2499.683150][ T5119] ldm_validate_partition_table(): Disk read failed. 06:50:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xffffff9e) [ 2499.727179][ T5119] Dev loop0: unable to read RDB block 0 [ 2499.733475][ T5119] loop0: unable to read partition table 06:50:07 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2499.816822][ T5119] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xffffffef) [ 2499.876351][ T5152] device lo entered promiscuous mode 06:50:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfdffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2499.943474][ T5152] device lo left promiscuous mode [ 2500.199191][ T5159] ldm_validate_partition_table(): Disk read failed. [ 2500.232731][ T5159] Dev loop0: unable to read RDB block 0 [ 2500.244194][ T5159] loop0: unable to read partition table [ 2500.251255][ T5159] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:07 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:07 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:07 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xfffffff0) 06:50:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfe800000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x3, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:07 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x10000000000) [ 2500.414120][ T5192] device lo entered promiscuous mode [ 2500.485179][ T5192] device lo left promiscuous mode 06:50:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfe80ffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2500.561542][ T5193] ldm_validate_partition_table(): Disk read failed. [ 2500.584630][ T5193] Dev loop0: unable to read RDB block 0 [ 2500.593213][ T5193] loop0: unable to read partition table 06:50:07 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2500.602550][ T5193] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x4, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:08 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:08 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a3410334000000000001", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x40030000000000) 06:50:08 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2500.873073][ T5226] device lo entered promiscuous mode 06:50:08 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x100000000000000) 06:50:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfec0ffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x5, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2500.976972][ T5226] device lo left promiscuous mode 06:50:08 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2501.068750][ T5236] ldm_validate_partition_table(): Disk read failed. [ 2501.107204][ T5236] Dev loop0: unable to read RDB block 0 06:50:08 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2501.131673][ T5236] loop0: unable to read partition table [ 2501.153581][ T5236] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x200000000000000) 06:50:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:08 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2501.332616][ T5259] device lo entered promiscuous mode [ 2501.377323][ T5265] device lo left promiscuous mode 06:50:08 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xfeffffff, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x300000000000000) 06:50:08 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:08 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x4000000000000000) [ 2501.650839][ C1] print_req_error: 1658 callbacks suppressed [ 2501.650847][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2501.664022][ C1] buffer_io_error: 1634 callbacks suppressed [ 2501.664029][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 06:50:09 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff000000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2501.703984][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2501.711151][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2501.728454][ T5298] device lo entered promiscuous mode [ 2501.739246][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2501.746490][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 06:50:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x8000000000000000) [ 2501.755175][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2501.762379][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2501.770888][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2501.778106][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2501.786298][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2501.793403][ C1] Buffer I/O error on dev loop0, logical block 0, async page read 06:50:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x7, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2501.802430][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2501.809581][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2501.818192][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2501.825358][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2501.833194][ T5282] ldm_validate_partition_table(): Disk read failed. [ 2501.842126][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2501.849322][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2501.865403][ T5298] device lo left promiscuous mode [ 2501.884856][ C1] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 2501.892078][ C1] Buffer I/O error on dev loop0, logical block 0, async page read [ 2501.910475][ T5282] Dev loop0: unable to read RDB block 0 [ 2501.917056][ T5282] loop0: unable to read partition table [ 2501.922905][ T5282] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x9effffff00000000) 06:50:09 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:09 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:09 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff010000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:09 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xc00e000000000000) [ 2502.189210][ T5317] device lo entered promiscuous mode 06:50:09 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) [ 2502.356585][ T5330] loop_set_status: loop0 () has still dirty pages (nrpages=1) 06:50:09 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2502.424508][ T5337] device lo left promiscuous mode 06:50:09 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) [ 2502.465160][ T5341] ldm_validate_partition_table(): Disk read failed. 06:50:09 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xefffffff00000000) 06:50:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff030000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2502.509624][ T5341] Dev loop0: unable to read RDB block 0 [ 2502.534878][ T5341] loop0: unable to read partition table [ 2502.547959][ T5341] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:10 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:10 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xf0ffffff00000000) [ 2502.721213][ T5369] device lo entered promiscuous mode [ 2502.814130][ T5369] device lo left promiscuous mode 06:50:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff070000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0xa, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:10 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:10 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2503.016539][ T5390] device lo entered promiscuous mode [ 2503.023539][ T5386] ldm_validate_partition_table(): Disk read failed. 06:50:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xfb27000000000000) 06:50:10 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2503.059643][ T5386] Dev loop0: unable to read RDB block 0 [ 2503.083381][ T5386] loop0: unable to read partition table [ 2503.094560][ T5386] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2503.119993][ T5400] device lo left promiscuous mode 06:50:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff0f0000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:10 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:10 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:10 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0xb, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:10 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2503.443803][ T5428] device lo entered promiscuous mode 06:50:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xffffff7f00000000) [ 2503.487771][ T5420] ldm_validate_partition_table(): Disk read failed. [ 2503.509787][ T5420] Dev loop0: unable to read RDB block 0 [ 2503.519601][ T5428] device lo left promiscuous mode 06:50:10 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff1f0000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2503.552919][ T5420] loop0: unable to read partition table [ 2503.559117][ T5420] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:10 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0xc, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:11 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2503.766292][ T5450] device lo entered promiscuous mode 06:50:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0xffffffff00000000) [ 2503.831195][ T5447] ldm_validate_partition_table(): Disk read failed. [ 2503.848352][ T5456] device lo left promiscuous mode [ 2503.871230][ T5447] Dev loop0: unable to read RDB block 0 06:50:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff3f0000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:11 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2503.898986][ T5447] loop0: unable to read partition table [ 2503.935380][ T5447] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 06:50:11 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0xd, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:11 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup3(r0, r0, 0x80000) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0x0, 0x5, {{0x2, 0xc300, 0x8000, 0x2, 0x1800, 0xfffffffffffffffa, 0xffffffff}}}, 0x60) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) 06:50:11 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:11 executing program 3: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x10000, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x4000000100, 0x800) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000100)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2504.225009][ T5488] device lo entered promiscuous mode [ 2504.337413][ T5488] device lo left promiscuous mode 06:50:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xff7f0000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0xe, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:11 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:11 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000140)=ANY=[@ANYBLOB="03006900ca00000000000000c5c132a6f8b5dce92912c2069f82eec53a2882706bc699bedd8c95b8f7dc74d52861af8735c0a8c09f08ed88ccef905987e3f43f80d99e036eff4c80207388274bd1e44d6370fe4bf3d2b73fe73a8d4f9d24ef41ca42c3dc2c5e4f6a0000000000"]) r2 = getpgid(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000480)=0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f00000004c0)={r1, r0, 0x9}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000340)) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14008c0000000000ae1e00"/20], 0x14}}, 0x0) rt_tgsigqueueinfo(r3, r3, 0x3c, &(0x7f0000000500)={0x3e, 0x3ff, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x117, 0xf}}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) ptrace$getsig(0x4202, r5, 0x6, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f00000002c0)={{0x5e, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x3, 'rr\x00', 0x1, 0x1, 0x11}, {@empty, 0x4e21, 0x0, 0x10001, 0x8}}, 0x44) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0), 0x2, {0xa, 0x4e20, 0x8, @mcast1, 0x100000001}, r4}}, 0x38) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000580), 0x5) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x2, 0xfffffffffffffffe, 0x6}) [ 2504.483365][ T5489] ldm_validate_partition_table(): Disk read failed. [ 2504.506950][ T5506] device lo entered promiscuous mode [ 2504.514556][ T5489] Dev loop0: unable to read RDB block 0 06:50:11 executing program 3: fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() r3 = getgid() getgroups(0x3, &(0x7f0000000340)=[0xee01, 0x0, 0xee00]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="02000000010000000000000002000100", @ANYRES32=r0, @ANYBLOB="040006000000000008000100", @ANYRES32=r1, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r2, @ANYBLOB="0800020006021bcb03cbb06a2bf48874a58411427b571195bd657a6634eea3ef2717810d696eb8e9c11ade09ed5af4719378b52e", @ANYRES32=r3, @ANYRES64=r4, @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r7, @ANYBLOB="10000000000000002000040000000000"], 0xf, 0x1) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) getgroups(0x9, &(0x7f0000000140)=[0x0, 0xee01, 0xee01, 0xee01, 0xee01, 0x0, 0x0, 0xee01, 0x0]) r10 = getgid() openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x0, 0x0) r11 = syz_open_dev$swradio(&(0x7f0000000600)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$bt_BT_SNDMTU(r11, 0x112, 0xc, &(0x7f0000000640)=0x7, 0x2) setregid(r9, r10) sendmsg$nl_netfilter(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) r12 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7ff, 0x1) ioctl$TIOCGPGRP(r12, 0x540f, &(0x7f0000000100)=0x0) r14 = getpgid(r13) write$FUSE_LK(r12, &(0x7f00000000c0)={0x28, 0x0, 0x2, {{0x8, 0xffffffffffff410e, 0x2, r14}}}, 0x28) [ 2504.549699][ T5489] loop0: unable to read partition table [ 2504.584280][ T5489] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2504.608427][ T5519] device lo left promiscuous mode 06:50:12 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:12 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xffff0000, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:12 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x10, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:12 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2504.899562][ T5537] ldm_validate_partition_table(): Disk read failed. [ 2504.918961][ T5548] device lo entered promiscuous mode 06:50:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ff15001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) [ 2504.943832][ T5537] Dev loop0: unable to read RDB block 0 [ 2504.950574][ T5537] loop0: unable to read partition table [ 2504.960025][ T5537] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2505.015645][ T5548] device lo left promiscuous mode 06:50:12 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x11, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:12 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:12 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xffff0100, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) 06:50:12 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3e, 0x601) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e21, 0x1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, 0x5}, {0xa, 0x4e20, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, 0x6, [0xfffffffffffffffe, 0x8, 0x3ff, 0x5, 0x3, 0xd12, 0x8, 0x4760]}, 0x5c) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x8c, r2, 0x200, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x9d}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x1, 0x7, 0x6, 0x6, 0x1ff]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xa6a}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x0, 0xa7, 0x6f2f80e]}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x7, 0x5, 0x8]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40884}, 0x40c4) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000301fffff31b7e4e8c0000000000ae1ef7cee28f419afb930e0cd258d43b4517b3fa230176b6058a556dee685cda6fd508d7626122137a712da2cded042cfef467853fe9a97d2d9605aa08c5f23d92aedcb06e82ef7dc804823cac4228d6f39fb9c324561bfdb6c7cb8e39a6dfbf470c030b63cca2d4dfdb1939f4eccedb3d830135fb5bb44033b64b41d39d2fd2cda519f326ee9c06b0bf8bffe0a90e39c299782ce5788ef8d8ac5dd98713a0cdfa39bf1e97162786a301dccedafe752ec2fd6b591a4573251caaddd34767f7d947e9500d078010a988a50be476ad7df55e58477da981e44ffcd663d960c0da4c6526ff0e10"], 0x14}}, 0x0) 06:50:12 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2505.254236][ T5577] device lo entered promiscuous mode [ 2505.315369][ T5576] loop_set_status: loop0 () has still dirty pages (nrpages=1) [ 2505.339339][ T5577] device lo left promiscuous mode 06:50:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ffff001c7e4e8c0000000000ae1e"], 0x14}}, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f00000000c0)={0x9, "6f758ddbf1ddcf9adc964b25f909341dedc01f7377f9b3485a54d5dd3e428b95", 0x0, 0x1, 0x6, 0x2, 0x2, 0x3, 0x7, 0x1}) io_uring_setup(0x615, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x1, 0x28f}) 06:50:12 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x12, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:12 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2505.581134][ T5576] ldm_validate_partition_table(): Disk read failed. [ 2505.630162][ T5576] Dev loop0: unable to read RDB block 0 [ 2505.633252][ T5605] device lo entered promiscuous mode 06:50:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xffff0300, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2505.681488][ T5576] loop0: unable to read partition table [ 2505.692707][ T5576] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2505.704598][ T5605] device lo left promiscuous mode 06:50:13 executing program 1: r0 = socket(0x100000000011, 0x2, 0xfffffffffffffffa) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00', 0x0}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x13\x00 \x00\x00\x00\x03\x00', 0x101}) 06:50:13 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000004c0)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x7a, 0x0, 0x7ffffffffffff, 0xffffffff00000000, 0x0, 0x57290300, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80006000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892516105829576914e70bfeb59800f97c97644ab8a7"}) 06:50:13 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 06:50:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$btrfs(&(0x7f0000000200)='btrfs\x00', &(0x7f0000000240)='./file0\x00', 0x25, 0x0, 0x0, 0x2008000, &(0x7f0000001640)={[{@nodatasum='nodatasum'}, {@nodiscard='nodiscard'}, {@notreelog='notreelog'}, {@notreelog='notreelog'}, {@nospace_cache='nospace_cache'}, {@ref_verify='ref_verify'}, {@space_cache_v2='space_cache=v2'}], [{@subj_user={'subj_user', 0x3d, 'proc'}}, {@seclabel='seclabel'}, {@subj_user={'subj_user', 0x3d, '/dev/snapshot\x00'}}]}) 06:50:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xffff0700, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2505.906575][ T5622] device lo entered promiscuous mode [ 2505.960031][ T5628] ldm_validate_partition_table(): Disk read failed. [ 2505.995811][ T5628] Dev loop0: unable to read RDB block 0 06:50:13 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x67, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 2506.016848][ T5637] device lo left promiscuous mode [ 2506.035503][ T5628] loop0: unable to read partition table 06:50:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xffff0f00, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) [ 2506.065447][ T5628] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 2660.385475][ T1044] INFO: task syz-executor.3:5599 blocked for more than 143 seconds. [ 2660.393686][ T1044] Not tainted 5.2.0-rc7 #12 [ 2660.399550][ T1044] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2660.408388][ T1044] syz-executor.3 D25760 5599 27492 0x00004004 [ 2660.414808][ T1044] Call Trace: [ 2660.418135][ T1044] __schedule+0x658/0x9e0 [ 2660.422450][ T1044] ? is_mmconf_reserved+0x410/0x410 [ 2660.427678][ T1044] ? is_dynamic_key+0x1c0/0x1c0 [ 2660.432552][ T1044] schedule+0x131/0x1d0 [ 2660.436721][ T1044] schedule_timeout+0x9a/0x2b0 [ 2660.441459][ T1044] ? console_conditional_schedule+0x40/0x40 [ 2660.447455][ T1044] ? _raw_spin_unlock_irq+0x27/0x80 [ 2660.452646][ T1044] do_wait_for_common+0x35e/0x5a0 [ 2660.457711][ T1044] ? console_conditional_schedule+0x40/0x40 [ 2660.463643][ T1044] ? wait_for_completion_killable_timeout+0x60/0x60 [ 2660.470360][ T1044] ? do_task_dead+0xc0/0xc0 [ 2660.474853][ T1044] ? wait_for_completion+0x29/0x60 [ 2660.480009][ T1044] wait_for_completion+0x47/0x60 [ 2660.484933][ T1044] kthread_stop+0xb4/0x150 [ 2660.489395][ T1044] io_ring_ctx_wait_and_kill+0x268/0x880 [ 2660.495012][ T1044] ? io_uring_fasync+0x60/0x60 [ 2660.499856][ T1044] ? fsnotify_nameremove+0x2a0/0x2a0 [ 2660.505136][ T1044] io_uring_release+0x5d/0x70 [ 2660.509853][ T1044] ? io_uring_mmap+0x2f0/0x2f0 [ 2660.514671][ T1044] __fput+0x2e4/0x740 [ 2660.518822][ T1044] ____fput+0x15/0x20 [ 2660.522790][ T1044] task_work_run+0x17e/0x1b0 [ 2660.527416][ T1044] prepare_exit_to_usermode+0x402/0x4f0 [ 2660.532956][ T1044] syscall_return_slowpath+0x110/0x440 [ 2660.538459][ T1044] do_syscall_64+0x126/0x140 [ 2660.543030][ T1044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2660.549065][ T1044] RIP: 0033:0x4134b1 [ 2660.552948][ T1044] Code: cf 48 c1 e9 03 4c 8b 05 85 0c 3b 01 48 c1 ef 05 49 29 f8 49 8d 78 ff 48 83 e1 03 48 83 fa 10 0f 84 a7 04 00 00 44 0f b6 43 17 <41> f6 c0 40 0f 85 58 04 00 00 4c 8b 03 48 8b 44 24 68 49 39 c0 0f [ 2660.572655][ T1044] RSP: 002b:00007ffcb6e7d330 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 2660.581089][ T1044] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00000000004134b1 [ 2660.589105][ T1044] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 2660.597087][ T1044] RBP: 0000000000000001 R08: 00000000db93fedb R09: 00000000db93fedf [ 2660.605036][ T1044] R10: 00007ffcb6e7d410 R11: 0000000000000293 R12: 000000000075bf20 [ 2660.613051][ T1044] R13: 0000000000263bb9 R14: 0000000000760a78 R15: ffffffffffffffff [ 2660.621071][ T1044] [ 2660.621071][ T1044] Showing all locks held in the system: [ 2660.628874][ T1044] 1 lock held by khungtaskd/1044: [ 2660.633869][ T1044] #0: 000000000499ee2c (rcu_read_lock){....}, at: rcu_lock_acquire+0x4/0x30 [ 2660.642705][ T1044] 1 lock held by rsyslogd/7777: [ 2660.647578][ T1044] #0: 00000000d898ae15 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x243/0x2e0 [ 2660.656350][ T1044] 2 locks held by getty/7867: [ 2660.661013][ T1044] #0: 000000002dc1e987 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 2660.670259][ T1044] #1: 00000000810f8059 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x2ee/0x1c80 [ 2660.679885][ T1044] 2 locks held by getty/7868: [ 2660.684542][ T1044] #0: 0000000004550c59 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 2660.693780][ T1044] #1: 0000000026af875a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x2ee/0x1c80 [ 2660.703396][ T1044] 2 locks held by getty/7869: [ 2660.708116][ T1044] #0: 00000000feb07f80 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 2660.717336][ T1044] #1: 00000000a1a9561e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x2ee/0x1c80 [ 2660.726935][ T1044] 2 locks held by getty/7870: [ 2660.731585][ T1044] #0: 00000000a19abf5b (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 2660.740852][ T1044] #1: 00000000cf71b3d9 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x2ee/0x1c80 [ 2660.750455][ T1044] 2 locks held by getty/7871: [ 2660.755103][ T1044] #0: 0000000024435ee3 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 2660.764322][ T1044] #1: 000000002595093b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x2ee/0x1c80 [ 2660.774016][ T1044] 2 locks held by getty/7872: [ 2660.778768][ T1044] #0: 0000000029be0013 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 2660.788002][ T1044] #1: 0000000014e85d3d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x2ee/0x1c80 [ 2660.797600][ T1044] 2 locks held by getty/7873: [ 2660.802357][ T1044] #0: 00000000a6bc1b06 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 2660.811648][ T1044] #1: 00000000cfdb1240 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x2ee/0x1c80 [ 2660.821233][ T1044] [ 2660.823536][ T1044] ============================================= [ 2660.823536][ T1044] [ 2660.831993][ T1044] NMI backtrace for cpu 1 [ 2660.837167][ T1044] CPU: 1 PID: 1044 Comm: khungtaskd Not tainted 5.2.0-rc7 #12 [ 2660.844598][ T1044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2660.854630][ T1044] Call Trace: [ 2660.857905][ T1044] dump_stack+0x1d8/0x2f8 [ 2660.862220][ T1044] nmi_cpu_backtrace+0x89/0x160 [ 2660.867057][ T1044] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 2660.873257][ T1044] nmi_trigger_cpumask_backtrace+0x125/0x230 [ 2660.879371][ T1044] arch_trigger_cpumask_backtrace+0x10/0x20 [ 2660.885248][ T1044] trigger_all_cpu_backtrace+0x17/0x20 [ 2660.890691][ T1044] watchdog+0xbb9/0xbd0 [ 2660.894836][ T1044] kthread+0x325/0x350 [ 2660.898882][ T1044] ? hungtask_pm_notify+0x50/0x50 [ 2660.903890][ T1044] ? kthread_blkcg+0xe0/0xe0 [ 2660.908458][ T1044] ret_from_fork+0x24/0x30 [ 2660.913038][ T1044] Sending NMI from CPU 1 to CPUs 0: [ 2660.918361][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 [ 2660.919306][ T1044] Kernel panic - not syncing: hung_task: blocked tasks [ 2660.933430][ T1044] CPU: 1 PID: 1044 Comm: khungtaskd Not tainted 5.2.0-rc7 #12 [ 2660.940851][ T1044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2660.950987][ T1044] Call Trace: [ 2660.954255][ T1044] dump_stack+0x1d8/0x2f8 [ 2660.958610][ T1044] panic+0x28a/0x7c9 [ 2660.962484][ T1044] ? find_next_bit+0x10c/0x120 [ 2660.967219][ T1044] ? nmi_trigger_cpumask_backtrace+0x1b9/0x230 [ 2660.973341][ T1044] ? nmi_panic+0x97/0x97 [ 2660.977783][ T1044] ? nmi_trigger_cpumask_backtrace+0x1c2/0x230 [ 2660.983915][ T1044] watchdog+0xbcc/0xbd0 [ 2660.988135][ T1044] kthread+0x325/0x350 [ 2660.992181][ T1044] ? hungtask_pm_notify+0x50/0x50 [ 2660.997175][ T1044] ? kthread_blkcg+0xe0/0xe0 [ 2661.001735][ T1044] ret_from_fork+0x24/0x30 [ 2661.007245][ T1044] Kernel Offset: disabled [ 2661.011574][ T1044] Rebooting in 86400 seconds..