Warning: Permanently added '10.128.0.117' (ECDSA) to the list of known hosts. 2018/10/23 15:09:17 fuzzer started [ 42.880373] audit: type=1400 audit(1540307357.824:36): avc: denied { map } for pid=5523 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/10/23 15:09:20 dialing manager at 10.128.0.26:42297 2018/10/23 15:09:20 syscalls: 1 2018/10/23 15:09:20 code coverage: enabled 2018/10/23 15:09:20 comparison tracing: enabled 2018/10/23 15:09:20 setuid sandbox: enabled 2018/10/23 15:09:20 namespace sandbox: enabled 2018/10/23 15:09:20 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/23 15:09:20 fault injection: enabled 2018/10/23 15:09:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/23 15:09:20 net packed injection: enabled 2018/10/23 15:09:20 net device setup: enabled 15:12:13 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x9) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x52000, 0x0) r2 = userfaultfd(0x80000) r3 = semget(0x2, 0x7, 0x2) semctl$GETPID(r3, 0x1, 0xb, &(0x7f0000000080)=""/1) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000ff4000/0xb000)=nil, 0xb000}, 0x1}) bind$alg(r1, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0x18, "fe4540fa4c66a977ec76a3c8b0a1c4a025fd6916356aa15a"}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r4, 0x5, 0x9, 0x484}, &(0x7f0000000240)=0x10) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x22fe4c905ae69a8b, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$UFFDIO_WAKE(r6, 0x8010aa02, &(0x7f0000000340)={&(0x7f0000ff4000/0xc000)=nil, 0xc000}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r6, 0x84, 0x1e, &(0x7f0000000380)=0x2, 0x4) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r7 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_netdev_private(r7, 0x89fd, &(0x7f0000000440)="8c050db75648804bbdae07de4081fb4ad2e2b8099e277cd8712d376a5026cc5293a4de1d48e4af6b36e793a9e607a3d11ad50d39857d4cb8de794a1b7f6447b5d8c4d473c3f451e58571cbc81ac28220b857e94b642d41b06add02b74e2f2c71bd94ec511bf0b32eecd84618474fefcea6e1") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000004c0)={r5, 0xd2, "2c2d1392915252719711faa6b8f0207cf3affc233d64e7bee4368f67c1ee7d7e17a656feb4fa73992de35b39688e4e27f25848e94d3f1add7240b083cc0bffb0e9d78a48ab9e7a6cbb8bd546cea1466facd56afc0cac62f9d3015e46beee84ce7da180ca9bd3b56e9dd3b0a81a37b8602d027cda910ffc196289b35bb3f3ee1452172ccf33521a44c2c20d58b4525c2df9040a3c189cf5ae9bf0e71fcee341e9518b6215c52ba8b30f090177e6c49111f353fa045167e597fbce38b4a2c1f0120c30fa63d07233991223671edf782bc415a4"}, &(0x7f00000005c0)=0xda) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f0000000600)={r5, 0xffffffff925fe39d}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000680)={r4, 0x7}, &(0x7f00000006c0)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000700)={r5, @in6={{0xa, 0x4e23, 0x78f, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}, 0x7ff}}}, 0x84) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000007c0)=0x40, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000800)=@assoc_value={r5, 0x7fff}, &(0x7f0000000840)=0x8) openat$cgroup(r1, &(0x7f0000000880)='syz1\x00', 0x200002, 0x0) userfaultfd(0x800) acct(&(0x7f00000008c0)='./file0\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000000a00)={r1, r6, 0xc, 0x8, &(0x7f0000000900)="472a04b5d48a99ed11d6dc8ce4e2b314b7a9643dd7e50ac0f2b81fe9ac17a9bce6972707b61a853ddb9c558adbc6af1f159fd1c7b50f02052615697810da85af6d2c96ce74446062e5e0c1466756bd95d788ba328e4a10e5f5e09816fbea52d0b80dec90f1df347cc2482d5a3ee3f07f8fc9b9d6cec5311de42bd32c43ae794c0becb937dca079612a6e38601cd6891544c0948642b87deb90bc040f820931c341fdb75452a626417a690b4c1fc4d970c3f277f751fbee6e47ec94178608d0bd5b9c64e79fb755c298ac4c532ca350636dddd0f0fe229e8747e7e210d293d5a16bc4b1b3a9f3d5", 0x8, 0x8, 0x9, 0x5, 0xdde9, 0x10000, 0x3, "30a140ec64b5e8717462aaf596fabe38d55fe541fad2a52e33bb7966d55cc66e8e8780c851d71e4f8834b8975fceea996fec65790ad2088ee61acc3cd238792fae3bd2e7dd63c088c4c8"}) ioctl$KVM_HAS_DEVICE_ATTR(r6, 0x4018aee3, &(0x7f0000000ac0)={0x0, 0x1, 0x3, &(0x7f0000000a80)=0xffffffffffffff00}) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f0000000b00)=0x6, 0x4) r8 = syz_open_dev$amidi(&(0x7f0000000b40)='/dev/amidi#\x00', 0x5, 0x244800) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r8, 0xc0305302, &(0x7f0000000b80)={0x4, 0x1, 0x8, 0x3, 0x401, 0x800}) [ 218.792563] audit: type=1400 audit(1540307533.734:37): avc: denied { map } for pid=5538 comm="syz-executor0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=72 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 218.885412] IPVS: ftp: loaded support on port[0] = 21 15:12:14 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x40000) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000040)=0x7) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000080)=0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x8, {0x2, 0x5a, @rand_addr=0xdb3f}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e23, @multicast1}, 0x0, 0x4, 0x0, 0x8, 0x5, &(0x7f00000000c0)='teql0\x00', 0xfffffffffffffffa, 0x9, 0x3f}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) fcntl$lock(r0, 0x7, &(0x7f0000000200)={0x3, 0x0, 0xb1, 0x3ff, r1}) ftruncate(r0, 0x1) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x4e20, 0x83c3, @local, 0x9}}, 0x3, 0x9, 0x6, "cbcfbaa3bb7b36c00481236dae0f285431b1383b8ad5d1d4bb0dc39a69beab7310ba11d80cd0220fd92c57c2512b08d3a5d142f8f5831d621e17cfb342f15d7d39d7f4cce7c574cd2db78cab632951a9"}, 0xd8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380)={0xffffffffffffffff}, 0x117, 0xc}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000400)={0x8, 0x120, 0xfa00, {0x1, {0xcb07, 0x0, "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", 0xfa, 0x2, 0x0, 0x0, 0x4, 0xa1a6, 0x1}, r3}}, 0x128) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000540)=0x1ff, 0x2) mkdirat$cgroup(r0, &(0x7f0000000580)='syz1\x00', 0x1ff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000005c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x979, @mcast2, 0x100000001}, {0xa, 0x4e22, 0x7, @remote, 0x24}, r3, 0x81}}, 0x48) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000640)={0xe, 0x401, {0x56, 0x1, 0x100000000, {0x8, 0x7}, {0x4, 0x9}, @ramp={0x2, 0x6, {0xffffffffffffe3e3, 0x100, 0x400, 0x16c}}}, {0x55, 0x5, 0x7, {0x100, 0x6b}, {0x7fffffff, 0x4}, @ramp={0x100000001, 0x7fff, {0x8000, 0xacb9, 0x10000, 0x2}}}}) r4 = openat$cgroup_ro(r0, &(0x7f00000006c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000700)=""/4096) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000001700)=""/69, &(0x7f0000001780)=0x45) writev(r0, &(0x7f0000001bc0)=[{&(0x7f00000017c0)="16bcb31c9dd526b38e4c6afebc0570dab75809511dc6647c7d7e74b1416f0b218925c5bed14d17c82503ec71ed34b25b5f9d54b84098e503e2b8ec6b0684a9bdfa587aecd8a1abe00cff82cfe12939b59e7b82478c4ff28d02d2a1a4c79bf7bcde3825c16c0e2f5301ec121a2c03d03cf2671a9ef421e0c33fcb416f7f2d1035241c5c8eca3001865dd10706932ef0d23ba1b530e90de47950", 0x99}, {&(0x7f0000001880)="b42dfe80cdd20fe7f8997f1fb8a4d95fa71d00772c91e85c975664fbe7a7e60071c1fad1babd5a941e020fe3cf57e42da18a3b3b0266437a32f87dbba9c3cd61de2e22b0f1ce1edd3d9c5f6de1714dddf2babb7b223665dc6857d06288da", 0x5e}, {&(0x7f0000001900)="940e6d305d9d0364489e05cb43823de866c27ef36de1546ced1f096e17306704da79a9331f6755b9b581deb649e428e4e88c2875b9147204061c20b83807d729ee17071d5021bda62f0777fdca67c2eaf79211e856b8f21aea5c5b33d2fef16b69e22a0b", 0x64}, {&(0x7f0000001980)="f3476ffff8dd75d1caf974b3b4e5339706d2fc39c83d299b6f0c8d4a2c80368598768a81234cac89fab6119e5e07f0a41b3d30b89b471fd13a42fa717e46f0f843f225984b6abd90c2d80935f51af4e208eac38749f1bfc812d928862ec7139e7011c09bfffff672df7c0194bdf6c58877249107afa9ed6a1e30c11c3026cfbe299fdb7b919e304fd07e0b6dc8d74a34e4f8e524a9a0e94f7315529205f18f6304", 0xa1}, {&(0x7f0000001a40)="3f0ce99ab264da8e6a9c18cc97b1ff63e62bc283a85699f0f8f56e81a92376326223efebfd4958db6b1d79c7c10ce6535556db5938de1010616c0ef20da66e05f0a0519957f830f24d81339a5b4067f8af5df0ff804090a8ce9c7256c8409eeaa89dd1bbf7dc439982147c5c6758c3ec7d6c8eb640d61bfed87aa305e41d9a213cb4af17cf2268ece780", 0x8a}, {&(0x7f0000001b00)="7d7a6d3910b8b20ea3740cf6d9f4c945c61d3db71d1700fa74f798ed01", 0x1d}, {&(0x7f0000001b40)="3680276aec0f842bb995e86d1bdc61f0373dc4745b0beccbe2151aed486607c051d50066416f75a0f0b126b01a858fb979aaeed9b6af81990f03fcbee557b9cb0e192ba8cefce57c", 0x48}], 0x7) setsockopt$inet_int(r4, 0x0, 0x0, &(0x7f0000001c40)=0x200, 0x4) write$P9_RSTATFS(r4, &(0x7f0000001c80)={0x43, 0x9, 0x1, {0x2, 0x4, 0xffffffffffff0000, 0x5, 0x3, 0x3, 0x9}}, 0x43) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r4, 0x10e, 0x8, &(0x7f0000001d00)=0x2129bde4, 0x4) write$smack_current(r4, &(0x7f0000001d40)='syz1\x00', 0x5) getsockname$packet(r0, &(0x7f0000003000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003040)=0x14) sendmsg$can_bcm(r4, &(0x7f0000003180)={&(0x7f0000003080)={0x1d, r5}, 0x10, &(0x7f0000003140)={&(0x7f00000030c0)={0x7, 0x500, 0xaa, {}, {0x77359400}, {0x4, 0x8001, 0xfffffffffffffff8, 0x3}, 0x1, @can={{0x0, 0x8, 0x0, 0x95}, 0x8, 0x2, 0x0, 0x0, "94cf00c2c127fa99"}}, 0x48}, 0x1, 0x0, 0x0, 0x885}, 0x20000000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000031c0)={0x0, @in={{0x2, 0x4e22}}, 0x9, 0xc5d1, 0x7, 0xffffffffffffadec, 0x42}, &(0x7f0000003280)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000032c0)={r6, 0xfffffffffffffe01}, &(0x7f0000003300)=0x8) openat$uhid(0xffffffffffffff9c, &(0x7f0000003340)='/dev/uhid\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f0000003380)={0x40002006}) [ 219.234390] IPVS: ftp: loaded support on port[0] = 21 15:12:14 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000040)={0x3, 0x7, 0xbe27, 'queue1\x00', 0x813a}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000380)={&(0x7f0000000300)={0x5, 0x22, 0xc70d, {r2, r3/1000+30000}, {0x0, 0x2710}, {0x4, 0x7f1e, 0x10000, 0x800}, 0x1, @can={{0x4, 0x75, 0x8, 0xc9ac}, 0x2, 0x3, 0x0, 0x0, "2d7e382a11163d86"}}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x4) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() r6 = getegid() setresgid(r4, r5, r6) ioctl$TUNSETGROUP(r0, 0x400454ce, r5) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000004c0)=0x0) get_robust_list(r7, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f0000000540)={&(0x7f0000000500)}, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)}}, &(0x7f0000000680)=0x18) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000006c0)={0x0, 0x8, 0x9, 0x2, 0x0, 0x7, 0x5, 0x1, {0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x800, 0x0, 0x7, 0x1, 0x8}}, &(0x7f0000000780)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000007c0)={r8, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}}, 0x8001, 0x4, 0x4b, 0x48d, 0x1}, 0x98) mq_notify(r0, &(0x7f00000009c0)={0x0, 0x34, 0x3, @thr={&(0x7f0000000880)="6621e27e6e3d4b465b84fd679a1be8b76c339110b208512fab65ac776a5121440a2b3638806f27b8b414689c2d92463d5412eba46d98b2ad9b7edeefbd294c2522cc010ee2695256edae7ef348d3d7a9500f6eebe422ae5b02b1a5a11beb0b08c5bb9f45353f14eda507734ff7d90557447054d16eeadbd3ee3ec2cae6ec7b9829b2ba", &(0x7f0000000940)="1876396ad2b0f259321127da8c7f4b0b86037c5afe24268d7ce2a0b8eb646cf2c4432c0c702d8260d99406410585eb9dc37855565d11936ad2686600b0b8c2a93231e72434e8b51d1c3638db190e683b70e75df47c93cc"}}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000a00)=0x832, 0x4) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000a40)={0x1, 0x5, 0x0, [{0x9, 0x1f, 0x1, 0x401, 0x16000000000, 0x10000, 0x4}, {0x7fff, 0x1, 0x58000000000000, 0x8, 0x5, 0x6, 0x1}, {0x2, 0x0, 0x8000, 0x0, 0x1, 0x9, 0x60000000000}, {0x105, 0x2, 0x20, 0x5, 0xe7, 0x9, 0xbd}, {0x10000, 0x612e, 0x1, 0x6, 0x1f, 0x3, 0x4}]}) fcntl$getflags(r0, 0x401) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000bc0)={{0x3b, @remote, 0x4e22, 0x2, 'nq\x00', 0xc, 0x9, 0xd}, {@multicast1, 0x4e23, 0x4, 0x8, 0x5, 0x1ff}}, 0x44) capset(&(0x7f0000000c40)={0x399f1336, r7}, &(0x7f0000000c80)={0x4000000000, 0xff, 0x0, 0x4, 0x3f, 0x8001}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000cc0)={0x1, 0x7, 0x81, 0x100000001, 0x5, 0x8}) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d40)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000fc0)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000d80)={0x1d0, r9, 0x220, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_1\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb4}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @remote}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_SERVICE={0x68, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x31}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x8}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7a}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) r10 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x1000) shmdt(r10) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000001000)={0x0, 0x7530}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001040)={r8, @in={{0x2, 0x4e20, @loopback}}, 0x101, 0x58b, 0x1, 0x9, 0x40}, &(0x7f0000001100)=0x98) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000001140)={0xffffffffffffffc1, {{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}}}, 0x108) [ 219.560346] IPVS: ftp: loaded support on port[0] = 21 15:12:14 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101400, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) rt_sigqueueinfo(r1, 0x1a, &(0x7f00000000c0)={0x8, 0x4, 0xffffffffffffff68, 0x9}) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000100)) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RSTATFS(r2, &(0x7f0000000180)={0x43, 0x9, 0x1, {0x7d66, 0x8a9b, 0x5, 0x7, 0x4, 0x6, 0xff, 0x5, 0x4000000000000}}, 0x43) set_tid_address(&(0x7f0000000200)) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000000240)={0x8, 0x2}) connect$vsock_dgram(r0, &(0x7f0000000280)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) statx(r2, &(0x7f00000002c0)='./file0\x00', 0x0, 0x200, &(0x7f0000000300)) write$binfmt_aout(r2, &(0x7f0000000400)={{0xcc, 0x5, 0x1f, 0x367, 0x99, 0x7c00000000000000, 0x146, 0x20}, "fcf8d14eb719adff45e298444a6ff4001ba1037a5a2c7f0bf7043589c95f9f11e20fd216533611f5d4c9d6cd252e05b55713b457e45b0a59b58db94167"}, 0x5d) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000480)={0x3, "29bb54"}, 0x4) fchmod(r0, 0x2c) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f00000004c0)={0x8, {{0xa, 0x4e20, 0xdd, @mcast2, 0x8b}}}, 0x88) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000580)={0x1000, 0x1ff}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f00000005c0)=0x18, 0x4) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000600)=0x56) ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000000740)={&(0x7f0000000640)=""/245, 0xf5}) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000780)={0xc511}) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000007c0)={0xa, [0x7, 0x9, 0x1, 0x41a, 0xfffffffffffffeff, 0x5e, 0xffff, 0x5, 0x3f, 0x200]}, &(0x7f0000000800)=0x18) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000840)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000880)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x8001}}}, &(0x7f0000000940)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000980)={r3, 0x8}, &(0x7f00000009c0)=0x8) ptrace$getenv(0x4201, r1, 0x9, &(0x7f0000000a00)) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000a40)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000b00)={{0x4, 0x5, 0xba94, 0x4, 'syz1\x00', 0x4}, 0x4, 0x10000000, 0xdc, r1, 0x5, 0x1, 'syz1\x00', &(0x7f0000000a80)=['mime_typeposix_acl_access/\x00', '}vboxnet1keyringselinuxGPL\x00', 'cpuacct.usage_percpu_user\x00', '/dev/rfkill\x00', 'md5sum$\x00'], 0x64, [], [0xffff, 0x7, 0x1, 0xe1]}) connect$vsock_dgram(r2, &(0x7f0000000c40)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) [ 219.990773] IPVS: ftp: loaded support on port[0] = 21 15:12:15 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) r1 = getpgid(0x0) ioprio_get$pid(0x3, r1) sched_rr_get_interval(r1, &(0x7f0000000080)) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x6, 0x802) getpeername$netlink(r2, &(0x7f0000000100), &(0x7f0000000140)=0xc) sched_setattr(r1, &(0x7f0000000180)={0x30, 0x6, 0x0, 0x91, 0x6, 0x41, 0x7, 0x7}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x4, &(0x7f00000001c0)=[{0x3, 0x26e8, 0x1, 0x8}, {0x6, 0x4, 0x97, 0x80}, {0x37b, 0x400000008000000, 0x64, 0xfffffffffffffffc}, {0x3, 0x1f, 0xe99d, 0x7ff}]}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x8000000000000000) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000240)={0x6, 0x1, 0x401}) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000280)={{0x2, 0x4e23, @broadcast}, {0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x40, {0x2, 0x4e20, @multicast2}, 'nr0\x00'}) pkey_alloc(0x0, 0x3) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, 0x122010, r0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xb0, r3, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x1a}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40000}, 0x44080) ioctl$KDSKBLED(r0, 0x4b65, 0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e21, 0x65, @mcast1, 0x800}}, [0x8, 0x7, 0xb65, 0xfffffffffffffffa, 0x1ff, 0x9, 0x6, 0xfffffffffffffc00, 0x100, 0xb7c6, 0x7, 0x9, 0x200, 0x909, 0x8]}, &(0x7f00000005c0)=0x100) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000600)={r4, 0xbf, "512496056c6762c723b8d66b5ae174a32efb6b0fd07cc5fe9f049a31301ace15bbf0c67e39156ce9d9caa1aedfb008fb7f0da16f388b5cc82293c1dfacad226011bbbcfeac438655d8afe050523b999aa7213198e13043ab913dd4d5485975c8b43da4ea044d1f8febd19f9044bc9058036209cc991aff997ec2f60d68b345aa11308eeed409992c02dd056b1205401b6b913de1ab4766a15553536aed7a45b02c31fedd795f3a830d0f5545bd68893ff7bdc5ea6466a5674ddef22bbe3948"}, &(0x7f0000000700)=0xc7) sendmsg$nl_generic(r0, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000780)={0xb4, 0x13, 0x1, 0x70bd2a, 0x25dfdbfd, {0x1e}, [@typed={0x8, 0x23, @pid=r1}, @generic="10832eeb89795412aef600f77aac79cfa66b3743573ce15eb8c8e8b62f2725bb45f96fd10ae9b09c478933b9c71f8493b6f6462705f3eba0c37758bdfb306f28378c11ba77dfa99dd55541d1110587f23aab63f2adf0c6725617d80e5702c68cc14660462b83aab47cde2e637c2d65c4280872d5d52dd0936e4b4c1b2678ffaef1c7d30ecb03cc16254bd6ccf215ad09b65db9bc9c3ac1"]}, 0xb4}, 0x1, 0x0, 0x0, 0x80}, 0x8004) mount$9p_fd(0x0, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x200000, 0xfffffffffffffffe) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000940)=[@in6={0xa, 0x4e22, 0x8, @empty, 0x8}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x11}}], 0x2c) r5 = accept$unix(r0, &(0x7f0000000980)=@abs, &(0x7f0000000a00)=0x6e) syz_open_dev$usbmon(&(0x7f0000000a40)='/dev/usbmon#\x00', 0x6, 0x404200) sendmsg$kcm(r2, &(0x7f0000002100)={&(0x7f0000000a80)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000000b00)="9eac20d8b809e7ed0ea8", 0xa}, {&(0x7f0000000b40)}, {&(0x7f0000000b80)="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", 0x1000}, {&(0x7f0000001b80)="b9d7c7c4b8c751a40bdafe723911d32bbabef91edca5b10d36fca68a6455c36a9f758588eaf5a3194fa568de844451e77623229c9ddfddb2ad33fde8b9f3da78f67ecb4108fe90cb719823c7eeb1679d2831aef0296cf1a27c3ef355", 0x5c}, {&(0x7f0000001c00)="18603b812f7629b6ca5af94eeb2f8bd17ab87db4863fbc8c887af9adfea2459b69119838b01ada47ea9c3a009f4a4e7b826daad57e38b069a66286d007fbe71d379c1d8e369514b7271d535e320f230d3469ad36d260b0d4256cb8ae9bce5e3c43e9205615899bea7fa806abed1b6dc7d161190a4024f8998854e91a09afe2eb48a6d94d1034a3ad0ddaab31ad7abcdf39be0c3cba7b04de66290c8ac5a85cee2d09435fb8b1c65835ad42ec0528bdbc9a365cf5a8ac3f77619744b03984ea9c0ba23ab4f08b4655097aa37036c14abd7bcac2356f89c0756a0b768531936a0cd3cd", 0xe2}, {&(0x7f0000001d00)="44e2f9acdd18e1d33e4c11bfb6c88c040876474f489cb5b6bb2f73510333f4a67e126f73880f2c568f0e26fbed686896e9f03d387e9a862e7a7850810169f198419210e9776acac18eda65b8ddd633b537f5df297c77cb201ad7f88b5e247d4ae9ea39dc6fa3e81599ea4a8732235d04fdde1b7852efb0b5ee8f1a1b144c2faf5d59daac18f548f20df6809446c969f781486b913c5815ef45ea660eac2d5e2de4dfc19e29640ddf5d2021ee524b4746e0fad5be5b8177fe39ec4da6f414d56d05d67c37ba09b732c90ca86dbf", 0xcd}], 0x6, &(0x7f0000001e80)=[{0xb8, 0x10f, 0x67, "ed1b7c114efc1eea672913f743162ab3d0d37f9738a2c6763c03b8ea474a3add335523834a5c724f0b005798d4c7723fffd19d30344ec26d849eeb0d22a9ca977e8d44cb5a1a532a460eeec78e5a2d0ffd51d14b301fa66f2f9a90ac5279c67072f1528b8c098cdde7780b72cb60c7a424068f771f45bd1d745284b569525c36a9183cb4c7c050c2a03eb9d2827521bc0c15a6b7db8db61b63f982417c03aac3b4"}, {0xf0, 0x3a, 0x7, "df41bf09d398c8d26f6be9e254a6c5f3ea37a85f922c7e7984d2c93307cb3cf75f3ec06dd3b882ac97de4d862424fa6b08c77a57bd0ce082dd5a9722f212bab486224620b6542be6361edafbe8ef69a585900550928d150da132b5f2e01e1d968c9ec7329ba6ac2d4074abd651080571d9f6e28bbc0400e0082245467c72a7e97d75c98109471aeed12861b1867fd9d1a8b38601d0b59fb88264896afc05598ac6a8c9bcdf278c26398343bcb298db8092d9649afd68c4eedc18a1399a49e0655bdb6ace4388a6e17a1201f7150362180c757f9f2e5553f14a71"}, {0xd8, 0x1ff, 0xfff, "ad20b2fb1709ec7757fae945d47954b1b294b8274e15c547ba88906777f0132b4a3cc36bec2710f8cf555791400b3d8a6114027cd359bf708781c49d613c696034b079b1f2af7f975c1237364ccbf836cc9681182af6c80c1005f3110289e069e47fbb761075e1c270a2153d62350284da438ff98714dd375bb27b119a965bf70c8fe99e472e38330ddc7704d5dec905da121f364900b515e4cef917d1dd084c46c102f804a2fee9a62369c270761e1d87f4a8a4986c90360c9ab55cf4c0c8ce3783"}], 0x280, 0x40c0}, 0x14) fcntl$notify(r5, 0x402, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002140)='/dev/ptmx\x00', 0x20000, 0x0) tee(r2, r0, 0x7fff, 0x3) write$P9_RREADDIR(r0, &(0x7f0000002180)={0x2a, 0x29, 0x2, {0x9, [{{0x4}, 0x3, 0x1ff, 0x7, './file0'}]}}, 0x2a) [ 220.451500] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.468137] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.475725] device bridge_slave_0 entered promiscuous mode [ 220.597432] IPVS: ftp: loaded support on port[0] = 21 [ 220.621246] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.634273] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.642333] device bridge_slave_1 entered promiscuous mode [ 220.842376] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 15:12:15 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x7a, "c7ab4e1891649a7b4176c53fd89fc357aaf396e7db9ef08a86e211d0f3911bdb76fa3810f07f77469b971a6314c645f5c8623c2e0a8fa71198d0d111501f15e95f4d8554f97d92374af37e4a60534609a6f8fc0e8ba6502bc344afcebe7508002ed511822d9bafab8bec76b067bca9a1f14df9a89211f65da96f"}, &(0x7f0000000100)=0x82) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1, 0x20}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r2, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r1, 0x5}, &(0x7f0000000280)=0x8) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000002c0)={0x1, 0x1, 0xa0, 0x0, 0x11}) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2) modify_ldt$read(0x0, &(0x7f0000000340)=""/220, 0xdc) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000440)={0x0, 0x9, 0x3, 0x1e, &(0x7f0000fff000/0x1000)=nil, 0x800}) bind$rds(r0, &(0x7f0000000480)={0x2, 0x4e24, @multicast2}, 0x10) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={r2, 0x6, 0x34, 0xffffffff, 0x2, 0x3f, 0x0, 0x3ff, {r1, @in6={{0xa, 0x4e23, 0x0, @empty, 0x4}}, 0x4, 0x3f, 0x4, 0x613, 0x20}}, &(0x7f0000000580)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x6, 0x14, 0x8000, 0x6, 0x100000000, 0x0, 0x9, 0x1, r2}, 0x20) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000600)={0x2d, 0x6}) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000640)={r4, 0x100, 0x30}, 0xc) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000680)={0x3, 0x3, 0xfffffffffffffcae, 0x3, 0x4}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000006c0)=[@in6={0xa, 0x4e21, 0x2, @mcast1, 0x7ce}, @in={0x2, 0x4e24, @rand_addr=0x3}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e24, 0xfce, @empty, 0x80000001}, @in={0x2, 0x4e22, @rand_addr=0x1}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x12}, 0x3}, @in6={0xa, 0x4e23, 0x0, @mcast1, 0x9}, @in={0x2, 0x4e21, @loopback}], 0xc0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000780)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000880)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000008c0)={@empty, @loopback, @loopback, 0x80, 0x5, 0x3ff, 0x400, 0x10001, 0x0, r5}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000940)={r2, 0x8, 0x1f}, &(0x7f0000000980)=0x8) getresgid(&(0x7f0000000a00), &(0x7f0000000a40)=0x0, &(0x7f0000000a80)) lchown(&(0x7f00000009c0)='./file0\x00', r6, r7) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000ac0)=0x298) syz_open_dev$vcsn(&(0x7f0000000b00)='/dev/vcs#\x00', 0x2240, 0x141000) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/sequencer2\x00', 0xc4100, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000b80)={r3, 0x8000, 0x4}, &(0x7f0000000bc0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f0000000c00)={0x9, 0x4, 0x2, 0x8, 0x3, 0xc, 0x7fffffff, 0x2, r9}, 0x20) r10 = gettid() perf_event_open(&(0x7f0000000c80)={0x1, 0x70, 0x63, 0xfffffffffffffffb, 0x9, 0xff, 0x0, 0x8, 0x0, 0x1, 0xffffffff, 0x1, 0x4, 0x2bc7, 0x40004000, 0xffff, 0x8, 0x5, 0x7fffffff, 0x1, 0x1ac, 0x1, 0x0, 0x2614, 0x2, 0x2, 0x7ff, 0xd0ab, 0x7, 0x80000000, 0x4, 0x4, 0x3, 0x80000000, 0x7fffffff, 0xfffffffffffffffa, 0xffff, 0x1, 0x0, 0x6, 0x3, @perf_bp={&(0x7f0000000c40), 0xa}, 0x10301, 0x9, 0x7, 0x7, 0x0, 0x100, 0xe785}, r10, 0xb, 0xffffffffffffffff, 0x8) [ 221.000762] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.201484] IPVS: ftp: loaded support on port[0] = 21 [ 221.510748] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.535077] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.559554] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.567143] device bridge_slave_0 entered promiscuous mode [ 221.658407] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.678304] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.684758] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.700261] device bridge_slave_1 entered promiscuous mode [ 221.873929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.011685] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.112521] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.149169] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.156688] device bridge_slave_0 entered promiscuous mode [ 222.305210] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.321360] team0: Port device team_slave_0 added [ 222.329583] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.336535] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.345476] device bridge_slave_1 entered promiscuous mode [ 222.409260] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.415651] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.449331] device bridge_slave_0 entered promiscuous mode [ 222.479296] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.487076] team0: Port device team_slave_1 added [ 222.495469] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.580519] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 222.600347] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.606897] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.615796] device bridge_slave_1 entered promiscuous mode [ 222.624437] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.637361] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.748865] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.760649] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 222.792568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.882498] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.899702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.939061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.985868] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.996658] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.032473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.048814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.076583] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.089409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.160648] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.174114] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.189850] device bridge_slave_0 entered promiscuous mode [ 223.225791] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.322879] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.346560] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.361462] device bridge_slave_1 entered promiscuous mode [ 223.423043] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.461138] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.476969] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.519980] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.546424] team0: Port device team_slave_0 added [ 223.589392] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.602580] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.624318] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.637631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.660352] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.666712] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.691477] device bridge_slave_0 entered promiscuous mode [ 223.704742] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.714745] team0: Port device team_slave_1 added [ 223.856233] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.868863] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.876346] device bridge_slave_1 entered promiscuous mode [ 223.896958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.007531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.021891] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 224.038270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.048522] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.082031] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.158577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.189881] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 224.197053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.215387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.231612] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.261208] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.271318] team0: Port device team_slave_0 added [ 224.289783] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 224.297119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.318347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.331547] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.357644] team0: Port device team_slave_0 added [ 224.385671] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 224.406056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.434393] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 224.449389] team0: Port device team_slave_1 added [ 224.508265] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 224.515801] team0: Port device team_slave_1 added [ 224.535071] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.561114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.569909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.581430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 224.608823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.619723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.667156] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.743252] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.769939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.793657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.823682] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.830232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.837149] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.843570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.860091] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.881010] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 224.896090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.910988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.933362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.956354] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 224.981698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.001611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.037041] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 225.045219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.061902] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.092193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.110276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.144084] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.166021] team0: Port device team_slave_0 added [ 225.172393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.222621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.246679] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.328233] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.358797] team0: Port device team_slave_1 added [ 225.454298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.481471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.490889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.523184] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.543156] team0: Port device team_slave_0 added [ 225.574756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.685805] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.698217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.713497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.729562] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.736951] team0: Port device team_slave_1 added [ 225.834244] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 225.851542] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.870536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.939372] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.946262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.958968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.035105] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.041557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.048274] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.054659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.095583] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 226.111458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.138682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.151162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.303466] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.318466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.326512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.454148] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.477020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.486964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.748852] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.755263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.762001] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.768409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.819943] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 226.830235] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.836621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.843363] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.849781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.860051] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 226.948787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.956099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.992962] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.359666] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.366089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.372819] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.379242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.392957] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 227.977613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.170836] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.177245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.183987] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.190417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.234350] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.008316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.542363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.028887] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.514914] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 231.530182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.537371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.594170] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.047646] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 232.086803] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.226852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.367321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.593346] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.614432] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 232.638354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.649469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.723471] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 232.920209] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.107636] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.132102] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.241735] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.247917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.255593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.410052] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.416251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.429496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.576804] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 233.606779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.628508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.816377] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.933770] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.054371] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.065531] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.574889] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 235.050489] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.056690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.069126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:12:30 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400000000040000, 0x0) ioctl$TCSETSF(r0, 0xc0045103, &(0x7f00000000c0)) 15:12:30 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 235.619693] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.629388] hrtimer: interrupt took 30900 ns [ 236.106622] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:31 executing program 1: ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='\x00') r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) socket$inet6(0xa, 0x7, 0x8) add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) io_setup(0x3, &(0x7f0000000240)) write$binfmt_misc(r1, &(0x7f0000000440)={'syz1'}, 0x1200e) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) modify_ldt$read(0x0, &(0x7f0000000380)=""/190, 0xbe) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in6=@loopback, 0x4e23, 0xffff, 0x0, 0x7ff, 0xa, 0x20, 0x20}, {0x0, 0x7bfb, 0x9, 0x401, 0x3, 0x48ec00000000}, {0xffffffff, 0x1, 0x7f, 0x7fffffff}, 0x5, 0xbe52, 0x0, 0x1, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x16}, 0x4d5}, 0xa, @in6=@dev, 0x0, 0x7, 0x3, 0xe, 0x458}}, 0xe8) [ 236.637060] audit: type=1400 audit(1540307551.574:38): avc: denied { map } for pid=7043 comm="syz-executor1" path="/dev/nullb0" dev="devtmpfs" ino=15128 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 236.992619] audit: type=1400 audit(1540307551.934:39): avc: denied { create } for pid=7076 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:12:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000040)='\x00', 0x0) getrlimit(0x0, &(0x7f0000002ff2)) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) pkey_mprotect(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x5, 0xffffffffffffffff) select(0x1f, &(0x7f0000000fc0)={0x20}, &(0x7f0000000180), &(0x7f0000002000), &(0x7f0000003000)={0x77359400}) [ 237.052533] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:32 executing program 2: socket$inet(0x2, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fchmod(0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@in, 0x7c) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280), 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80000, 0x2) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x24840, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000002c0)={0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000300)={0x0, r4, 0xfff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f00000001c0)=0xb9) keyctl$get_persistent(0x7, r5, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC(r7, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0xfffffffffffffe84) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f0000000180)=0x6000, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r1, r6, 0xc, 0x3}, 0x10) [ 237.163377] audit: type=1400 audit(1540307551.964:40): avc: denied { write } for pid=7076 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 237.206388] overlayfs: './file0' not a directory 15:12:32 executing program 3: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = socket$kcm(0x29, 0x400000000005, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x894c, &(0x7f0000000280)={r2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9, 0x800, 0x0, 0x0, 0x1, 0x4, 0x1ff, 0x1f, 0x1, 0x0, 0x0, 0x4, 0x7f, 0x297, 0x0, 0x1, 0x0, 0x605, 0x0, 0x80000001, 0x401, 0x7, 0x4, 0x8b3d, 0xfffffffffffffff7, 0x1, 0x8, 0x8000, 0xfffffffffffffff8, 0xfff, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000040), 0x1}, 0x2, 0x3fb, 0x6, 0x6, 0x100000000, 0x4}, 0x0, 0x1, r0, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f00000005c0)='./file1\x00', 0x0, 0x10002}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340), 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000006c0)=0xa10, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0xc0189436, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)="2e2f6367726f75702e6370752f2f2f7a3197", 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) set_thread_area(&(0x7f0000000680)={0x9, 0x0, 0x2400, 0x6, 0xfffffffffffffe00, 0x40, 0x6a30, 0x7, 0x8000, 0x4}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)=""/103, 0xb1, 0x67, 0x1}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400)=0x5, 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000840)=0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f00000002c0)) close(r3) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x200, 0x0, 0x3, 0x0, 0x80000000, 0x8040, 0xf, 0x80, 0x1, 0x80000000, 0x9, 0x4, 0x80000001, 0x0, 0x0, 0xfb3d, 0x82a7, 0x0, 0x0, 0x3, 0x2, 0x0, 0xfffffffffffffffa, 0x80000001, 0x6, 0x7, 0xd6d, 0x2, 0xffffffffffff968e, 0x0, 0x3f, 0x1, 0x0, 0x0, 0x1d2, 0x0, 0x8, 0x4, @perf_config_ext, 0x50, 0xb6, 0x0, 0x2, 0x100, 0x4, 0xffffffffffffff00}, 0x0, 0x6, 0xffffffffffffff9c, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r3, 0xfffffffffffffe08, &(0x7f0000000600)}, 0xabea4b059618c01) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40286608, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000480)=0x0) syz_open_procfs(r5, &(0x7f0000000640)='net/netfilter\x00') [ 237.347672] audit: type=1400 audit(1540307551.964:41): avc: denied { read } for pid=7076 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:12:32 executing program 4: clone(0x0, &(0x7f0000000000), &(0x7f0000008000), &(0x7f0000000ffc), &(0x7f0000000000)) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x6) prctl$intptr(0x24, 0x9) connect$bt_rfcomm(r0, &(0x7f0000000240)={0x1f, {0xffff, 0x7f, 0x8, 0x3, 0x2f1, 0x32}, 0x71b}, 0xa) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$xdp(r1, &(0x7f00000001c0)={&(0x7f0000000200)={0x2c, 0x1, r2, 0xf}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000080)="3e343c123364ec8216bca1b1621f10fbfed5f3462d714d2ddad122935adaa3c715d57cde581ca6126a2f934b9ce4d88e61769cb860a55a6dfb211dab4850d4debe8a29a15924ea165cb270c86a8a79c4a10453a6cea38c88d535bc9ca005ee82d6d5706939e77bc0fa3b0228525a7efd0bfa837de35fd16aac8a9be45a61ad934eae4466cb5b37d957c0ca0e19232fecc665b0f1c776f5f420f2ac6e38e10ca77ee5a955abe9bc3992323b931e7059b94caeec8abc377fe61dd08d40832341dca865819b9f", 0xc5}], 0x1, 0x0, 0x0, 0x804}, 0x4000000) prctl$intptr(0x24, 0xf90) 15:12:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x3, 0x3c) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x20100, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000180)=0x14) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000100)=0x78) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r4, 0x810c5701, &(0x7f0000000740)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) r5 = dup2(r2, r3) syz_init_net_socket$llc(0x1a, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="2173d0645ffdbdf000fcffff8169bb9b7417"], 0xfdef) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000480)={0x0, 0xffffffffffffff6a, 0xfa00, {0x8, &(0x7f00000003c0)={0xffffffffffffffff}, 0x117, 0xb}}, 0x29c) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r6, 0x1c, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r7 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x5, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000004c0)=0x6, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) ioctl$SG_GET_NUM_WAITING(r7, 0x227d, &(0x7f0000000300)) r9 = open(&(0x7f0000000500)='./file0\x00', 0x4000, 0x1) openat$cgroup_type(r9, &(0x7f0000000540)='cgroup.type\x00', 0x2, 0x0) r10 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x0, r8, 0x2a, r10}, 0x10) 15:12:32 executing program 2: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, "913fa7c292d3d3841feaa73b24735180b4fadafbd0ae8fdf06dc1c0fffaedf7b3cf0239733e29abbc5d501554cc12846eb3ebd34bab758954fc222777a53c4c0a8e473b6e9bb9bd5b5f2ee63c9774539"}, 0xd8) r1 = dup(0xffffffffffffffff) restart_syscall() setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000a00)={@in={{0x2, 0x0, @dev}}, 0x0, 0x0, 0x0, "a9bb6985f862ac1dad8d2b48855bee347e639abfb73f25e68f05f8bd746616146cdcc00fc52e0b4fac654b2b083ef46510a626c1c733f4fc346acd5001ea72ade16ae272eff6ceff7db90a2dbf8ea398"}, 0xfffffffffffffd12) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) bind$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, 0x6e) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000e77fff), 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/dev_mcast\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "1948074d07f8564d8ecee9f5719e0603cb4dddd689c31453731f10b427ff1b2197adcd3529853f5a572c6b2951b4658fe3f8dee9754347a5d751fbf6cc3785cb5937d850c705d6566d106edc96036a54"}, 0xd8) munlockall() setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000400)='reno\x00', 0x5) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000780)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000640)) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) ftruncate(r1, 0x7) [ 237.531205] audit: type=1400 audit(1540307551.994:42): avc: denied { associate } for pid=6961 comm="syz-executor0" name="file1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 237.699550] audit: type=1400 audit(1540307552.294:43): avc: denied { map } for pid=7112 comm="syz-executor4" path="/dev/null" dev="devtmpfs" ino=14711 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:null_device_t:s0 tclass=chr_file permissive=1 15:12:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={&(0x7f0000000040), 0xc, &(0x7f0000000640)={&(0x7f0000000500)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x3, @loopback}]}}}]}, 0x48}}, 0x0) r1 = semget(0x2, 0x7, 0x80) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000000)=[{0x3, 0x8000, 0x1000}, {0x3, 0x1, 0x800}, {0x3, 0x8, 0x1000}, {0x0, 0x4, 0x800}, {0x1, 0x101, 0x800}, {0x0, 0xcf10, 0x1000}], 0x6, &(0x7f00000000c0)={r2, r3+10000000}) 15:12:32 executing program 3: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) r2 = socket$kcm(0x29, 0x400000000005, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x894c, &(0x7f0000000280)={r2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9, 0x800, 0x0, 0x0, 0x1, 0x4, 0x1ff, 0x1f, 0x1, 0x0, 0x0, 0x4, 0x7f, 0x297, 0x0, 0x1, 0x0, 0x605, 0x0, 0x80000001, 0x401, 0x7, 0x4, 0x8b3d, 0xfffffffffffffff7, 0x1, 0x8, 0x8000, 0xfffffffffffffff8, 0xfff, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000040), 0x1}, 0x2, 0x3fb, 0x6, 0x6, 0x100000000, 0x4}, 0x0, 0x1, r0, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f00000005c0)='./file1\x00', 0x0, 0x10002}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000340), 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000006c0)=0xa10, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0xc0189436, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)="2e2f6367726f75702e6370752f2f2f7a3197", 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz1\x00', 0x200002, 0x0) set_thread_area(&(0x7f0000000680)={0x9, 0x0, 0x2400, 0x6, 0xfffffffffffffe00, 0x40, 0x6a30, 0x7, 0x8000, 0x4}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)=""/103, 0xb1, 0x67, 0x1}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000400)=0x5, 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000840)=0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f00000002c0)) close(r3) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x5, 0x200, 0x0, 0x3, 0x0, 0x80000000, 0x8040, 0xf, 0x80, 0x1, 0x80000000, 0x9, 0x4, 0x80000001, 0x0, 0x0, 0xfb3d, 0x82a7, 0x0, 0x0, 0x3, 0x2, 0x0, 0xfffffffffffffffa, 0x80000001, 0x6, 0x7, 0xd6d, 0x2, 0xffffffffffff968e, 0x0, 0x3f, 0x1, 0x0, 0x0, 0x1d2, 0x0, 0x8, 0x4, @perf_config_ext, 0x50, 0xb6, 0x0, 0x2, 0x100, 0x4, 0xffffffffffffff00}, 0x0, 0x6, 0xffffffffffffff9c, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r3, 0xfffffffffffffe08, &(0x7f0000000600)}, 0xabea4b059618c01) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40286608, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000480)=0x0) syz_open_procfs(r5, &(0x7f0000000640)='net/netfilter\x00') [ 237.953976] netlink: 'syz-executor4': attribute type 3 has an invalid length. [ 237.975386] netlink: 'syz-executor4': attribute type 3 has an invalid length. 15:12:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x6, 0x40040) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x2000000008808, &(0x7f00000002c0)=ANY=[@ANYRES32=r0]) 15:12:33 executing program 2: r0 = socket(0x11, 0x3, 0x6) socket$packet(0x11, 0xa, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x400000000000003, r1}, 0x14) r2 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r2, &(0x7f0000003f00)=[{{&(0x7f0000000700)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000940)=""/24, 0x18}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1ffa5095, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000300)={{0xfff, 0x8}, 'port0\x00', 0x0, 0x1020, 0x4, 0x8000, 0xffffffff, 0x7, 0x200, 0x0, 0x7, 0x8000}) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="56997ee7a77d00000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00'], 0x14}}, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") writev(r2, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400191009004beafd0d8c560284470080ffe006000000f0000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000000c0)) 15:12:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1ff, 0xc8000) write$eventfd(r1, &(0x7f0000000040)=0x5, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) eventfd2(0x0, 0x80004) 15:12:33 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x6, 0x209e22, 0x2, 0x1, 0xffffffffffffffff, 0x5}, 0xffffffffffffff54) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300)={0x4}, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r1 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3aa85ee, 0x84000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000340)={{0x3, 0x3, 0x7ff80000000, 0x0, 0xf9}, 0x7, 0x5}) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f0000000140)=""/130}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x0, &(0x7f0000000080)}, 0x30) fcntl$setown(r0, 0x8, r2) write$binfmt_misc(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="73797a31d6fc3dddf859feedcff7615e9be62f2b7e5690441b3ebab66da52a26b07224fc0fa40ef7e308383b4d"], 0x2e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000240), &(0x7f0000000280)=0xc) 15:12:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x3, 0x3c) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x20100, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000180)=0x14) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000100)=0x78) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r4, 0x810c5701, &(0x7f0000000740)) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) r5 = dup2(r2, r3) syz_init_net_socket$llc(0x1a, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="2173d0645ffdbdf000fcffff8169bb9b7417"], 0xfdef) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000480)={0x0, 0xffffffffffffff6a, 0xfa00, {0x8, &(0x7f00000003c0)={0xffffffffffffffff}, 0x117, 0xb}}, 0x29c) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000240)={0x14, 0x88, 0xfa00, {r6, 0x1c, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r7 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x5, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f00000004c0)=0x6, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) ioctl$SG_GET_NUM_WAITING(r7, 0x227d, &(0x7f0000000300)) r9 = open(&(0x7f0000000500)='./file0\x00', 0x4000, 0x1) openat$cgroup_type(r9, &(0x7f0000000540)='cgroup.type\x00', 0x2, 0x0) r10 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bind$xdp(r7, &(0x7f0000000100)={0x2c, 0x0, r8, 0x2a, r10}, 0x10) [ 238.491460] syz-executor1 (7132) used greatest stack depth: 15192 bytes left 15:12:33 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x3}}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) r5 = gettid() process_vm_writev(r5, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) accept4$alg(r2, 0x0, 0x0, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x7}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000240)={r6, 0x6}, &(0x7f00000002c0)=0x8) ioctl(r1, 0x800000000008982, &(0x7f0000000080)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xdd, 0xc000000000, 0x10001, 0x0, 0x5, 0x80000, 0x8, 0x800, 0xfffffffffffffffb, 0x20, 0x6, 0x8, 0x4, 0x100000000, 0x3, 0x9, 0x6, 0x7f, 0x1f, 0xffffffff, 0x7b, 0x57, 0x9, 0x635bd686, 0x80000001, 0x6, 0x5, 0xfffffffffffffffa, 0x5, 0x3, 0x0, 0x6, 0x100000000, 0x3, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0xfff, 0xd360}, 0x0, 0x100000001, 0x3ab, 0x0, 0x8, 0x1, 0x10000}, r5, 0x0, r2, 0x8) ioctl$int_out(0xffffffffffffffff, 0x5462, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) io_setup(0x9, &(0x7f0000000300)=0x0) io_cancel(r7, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x10000, r4, &(0x7f00000003c0), 0x0, 0x8, 0x0, 0x1}, &(0x7f0000000440)) close(r0) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000480)) mkdirat$cgroup(r0, &(0x7f0000000400)='syz0\x00', 0x1ff) [ 238.670906] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=32167 sclass=netlink_tcpdiag_socket pig=7202 comm=syz-executor2 15:12:33 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x8000) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000a004e2404000000fe80000000000000000000e8ffffff1203000000000000000000000000000000000000000000000000ae320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000037d9ffef4bb13a9100d8433cc113c39f6b00000000000000"], 0x90) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6(0xa, 0x0, 0x7f) ioctl(r1, 0x4800100000008912, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000000c0)={0x0, 0x0, 0xc145, 0x0, 0x0, 0x0, 0x7, 0x9, 0x300000000}) r2 = socket$inet6(0xa, 0x205, 0x8010000000000089) rt_sigprocmask(0x1, &(0x7f0000000080)={0x20}, &(0x7f0000000140), 0x8) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e24, 0x0, @loopback}, 0xe) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000240)) listen(r2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) write$tun(r3, &(0x7f0000000500)=ANY=[@ANYRESDEC=r3], 0x1) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r4) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 15:12:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="2c29bb9663bce3f1ded495a712d6244059854a3ba8f5dece0d9ca0150af27b3e9dea49a23f8e322d8262c4c22ccf8b49aa590a38aefaf2bb0680d9f2593bf5651a6d03624e95afbfa5a5393a1c10a13ddbee2928d5b309f156511890228b494b6d4b97223e655ce30db8fa902292292125de2e270235160fb4c118380935dc757c4a4704a38d15b40f03b3a06770add8203f8ae38f7e0c9cf24a611b9094fc4017cb4da1d12c6d92250be5edb4dc36b26dc7dce0a989577a318a2f40a288bd5c4e973a28ba9ce740bce0cf1cf83b47791669ee66c434291155eb4627a7d58dabc060b33bf162b5b0d83c8e8c5ea925c1cd19b648f7955889343428a19b44297455e2b89a026d32b4f28b4d"]) r0 = socket$inet6(0xa, 0x20800a2, 0x0) ioctl(r0, 0x0, &(0x7f00000007c0)="83ebe7ebf1d1722c00d6a09ffe8398ac33a1435d14f01273fe30d1ff0a9b2e21bdd1dd50008a09901fa05e5889991a1fdee4340ff1ff955f93e0504de159f2be8123bde65ca94066775ee81296a6a1c6f63f8b3b87240fecc7") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="2e2f6367726f75702e6370752f73797a30fe", 0x1ff) io_setup(0x5, &(0x7f0000000380)=0x0) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffd50) sendto$inet(r3, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r3, 0x1) timer_create(0x2, &(0x7f00000004c0)={0x0, 0x1b, 0x3}, &(0x7f0000000580)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timer_settime(r4, 0x1, &(0x7f0000000440)={{r5, r6+10000000}, {r7, r8+10000000}}, 0x0) io_destroy(r1) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000140)) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x64ca1839, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x0, 0x4, 0x7f, 0x9, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(r2, 0x8912, &(0x7f00000000c0)) r10 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r10, 0x6, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r11 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_ADD(r9, 0x4c80, r11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 238.796864] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=32167 sclass=netlink_tcpdiag_socket pig=7211 comm=syz-executor2 15:12:34 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000001c0)=0x800, 0x4) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8000000000, 0x40012, r1, 0x0) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1004, 0x0, 0x52, r1, 0x100000000) 15:12:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7}]}, 0x10) write$binfmt_elf32(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="a6f27babf5142b2ae1d62f3660bbcb6fc206fdfceda743274fe2d8fce8722229c12c31f79327835cb2ee8368ff625397375b0a0c03b1dc58ea3a6f976090e029b122aac336470806fa5394293b40a074a9f235d72f8e9c3b921ba95267f193a0568db43205ca5938e56284b70396458f8166f7d5f7c4d5ba62bfacb991319dd2ead14757e6a60f261c11aa692d9f6f1414d02a5bf2883fedf4c09cd3522c"], 0x1) sendmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00007ed000)=[{&(0x7f0000000140)='u', 0x1}], 0x1, &(0x7f00000002c0)}}], 0x1, 0x0) shutdown(r1, 0x1) [ 239.299392] syz-executor1 (7197) used greatest stack depth: 13128 bytes left [ 239.313406] audit: type=1400 audit(1540307554.254:44): avc: denied { map } for pid=7223 comm="syz-executor2" path="socket:[25199]" dev="sockfs" ino=25199 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=socket permissive=1 15:12:34 executing program 2: setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000280)=@v3={0x3000000, [{0x9, 0x5}, {0x7fffffff, 0x6}]}, 0x18, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) getpriority(0x0, r0) socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$pptp(r1, &(0x7f0000000200)={0x18, 0x2, {0x0, @loopback}}, 0x1e) sendto$inet6(r2, &(0x7f0000000040), 0xfe30, 0x20000016, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000700, 0x0, 0xe603000000000000]}}, 0x1c) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x8003, {{0x2, 0x0, @multicast1}}}, 0x88) mmap(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x200000c, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000e53fe8)) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) shutdown(0xffffffffffffffff, 0x1) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000040)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000300)=0x3000) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000140)) fallocate(0xffffffffffffffff, 0x0, 0x5e00, 0x800000002cbd) lseek(0xffffffffffffffff, 0x0, 0x4) 15:12:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="2c29bb9663bce3f1ded495a712d6244059854a3ba8f5dece0d9ca0150af27b3e9dea49a23f8e322d8262c4c22ccf8b49aa590a38aefaf2bb0680d9f2593bf5651a6d03624e95afbfa5a5393a1c10a13ddbee2928d5b309f156511890228b494b6d4b97223e655ce30db8fa902292292125de2e270235160fb4c118380935dc757c4a4704a38d15b40f03b3a06770add8203f8ae38f7e0c9cf24a611b9094fc4017cb4da1d12c6d92250be5edb4dc36b26dc7dce0a989577a318a2f40a288bd5c4e973a28ba9ce740bce0cf1cf83b47791669ee66c434291155eb4627a7d58dabc060b33bf162b5b0d83c8e8c5ea925c1cd19b648f7955889343428a19b44297455e2b89a026d32b4f28b4d"]) r0 = socket$inet6(0xa, 0x20800a2, 0x0) ioctl(r0, 0x0, &(0x7f00000007c0)="83ebe7ebf1d1722c00d6a09ffe8398ac33a1435d14f01273fe30d1ff0a9b2e21bdd1dd50008a09901fa05e5889991a1fdee4340ff1ff955f93e0504de159f2be8123bde65ca94066775ee81296a6a1c6f63f8b3b87240fecc7") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="2e2f6367726f75702e6370752f73797a30fe", 0x1ff) io_setup(0x5, &(0x7f0000000380)=0x0) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffd50) sendto$inet(r3, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r3, 0x1) timer_create(0x2, &(0x7f00000004c0)={0x0, 0x1b, 0x3}, &(0x7f0000000580)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timer_settime(r4, 0x1, &(0x7f0000000440)={{r5, r6+10000000}, {r7, r8+10000000}}, 0x0) io_destroy(r1) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000140)) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x64ca1839, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x0, 0x4, 0x7f, 0x9, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(r2, 0x8912, &(0x7f00000000c0)) r10 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r10, 0x6, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r11 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_ADD(r9, 0x4c80, r11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:12:34 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000000040)='fd', 0xffffffffffffffff}, 0x30) getpid() r2 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x3699, 0x40000) r3 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x2, 0x400) ioctl$void(r1, 0x5450) kcmp(r0, r0, 0x200000000080000, r2, r3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000001400)) r4 = socket$vsock_dgram(0x28, 0x2, 0x0) bind$nfc_llcp(r3, &(0x7f0000000380)={0x27, 0x1, 0x0, 0x5, 0x8, 0x828, "7d4f4e46cdcc87a58ab9e33688577ae5ef818dd8500acfc48c008376c361133734bff1eeb09b2144be234fad22cd35db7d6b4c5a9185a208da6461865d5f5e", 0x11}, 0x60) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)=ANY=[]) read$FUSE(r5, &(0x7f0000000400), 0xfffffffffffffe4c) write$FUSE_INIT(r5, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0xc00}}, 0x50) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000014c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="060000002b55a757ba263d"], &(0x7f00000000c0)=0xe) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000002c0)={r6, 0x80000001, 0x20, 0x9, 0x4}, &(0x7f0000000340)=0x18) [ 239.927172] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 15:12:35 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, &(0x7f000000a000)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x4000, 0x0) write$UHID_INPUT(r0, &(0x7f0000000440)={0x8, "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", 0x1000}, 0x1006) r1 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000400), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$getregs(0xc, r2, 0x0, &(0x7f00000002c0)=""/87) unshare(0x24020400) mmap(&(0x7f00009fe000/0x600000)=nil, 0x600000, 0x0, 0x3011, r1, 0x0) [ 240.233497] overlayfs: failed to resolve './file1': -2 15:12:35 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:35 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040), 0x0, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x12}, 0x1) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 240.373314] audit: type=1400 audit(1540307555.314:45): avc: denied { map } for pid=7264 comm="syz-executor2" path="/root/syzkaller-testdir126061868/syzkaller.FUjdNH/6/file0/bus" dev="ramfs" ino=25277 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ramfs_t:s0 tclass=file permissive=1 15:12:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x1) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1={0xff, 0x6}, 0x103}, 0x1c) [ 240.914755] overlayfs: failed to resolve './file1': -2 15:12:36 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f00000001c0)={0x1, 0x2}, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl(r2, 0x8912, &(0x7f0000000000)="153f6234488dd25d5c6070") r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) creat(&(0x7f0000000040)='./file0\x00', 0x20) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000000c0)) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x400000, 0x4) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x8) 15:12:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r0 = socket$inet6(0xa, 0x20800a2, 0x0) ioctl(r0, 0x0, &(0x7f00000007c0)="83ebe7ebf1d1722c00d6a09ffe8398ac33a1435d14f01273fe30d1ff0a9b2e21bdd1dd50008a09901fa05e5889991a1fdee4340ff1ff955f93e0504de159f2be8123bde65ca94066775ee81296a6a1c6f63f8b3b87240fecc7") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="2e2f6367726f75702e6370752f73797a30fe", 0x1ff) io_setup(0x5, &(0x7f0000000380)=0x0) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffd50) sendto$inet(r3, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r3, 0x1) timer_create(0x2, &(0x7f00000004c0)={0x0, 0x1b, 0x3}, &(0x7f0000000580)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timer_settime(r4, 0x1, &(0x7f0000000440)={{r5, r6+10000000}, {r7, r8+10000000}}, 0x0) io_destroy(r1) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000140)) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x64ca1839, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x0, 0x4, 0x7f, 0x9, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(r2, 0x8912, &(0x7f00000000c0)) r10 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r10, 0x6, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r11 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_ADD(r9, 0x4c80, r11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:12:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f0000000480)=0x1c) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)={'security\x00', 0x9f, "18029ea690858bfb92c4925e59511d2128a26cae33f48d67b991621df681c0e5e56f5704d56fb1cf1f353403e8df243529848fc1c7e807f2889a8aeda146e9c9a8ce6ad1a0a4b9de624c47f7837459c49f9f888d2705c886dc49d79c50731b87fb47babed83fbad8ac5119c18f5909e69eeb39a623e4bbc7e95df08502364c64f024ad67e0fd9d1ecdc1eaa681ef0ce5bf93a03c5f9cc2d545da96849f1caa"}, &(0x7f0000000100)=0xc3) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x3, 0x4000) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) gettid() add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x1, 0x0, 0x4, 0x2, 0x3, 0x4, 0x0, 0x4, 0xfffffffffffffffe, 0x0, 0x7fff, 0x2}) 15:12:36 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x8000) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000a004e2404000000fe80000000000000000000e8ffffff1203000000000000000000000000000000000000000000000000ae320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000037d9ffef4bb13a9100d8433cc113c39f6b00000000000000"], 0x90) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6(0xa, 0x0, 0x7f) ioctl(r1, 0x4800100000008912, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000000c0)={0x0, 0x0, 0xc145, 0x0, 0x0, 0x0, 0x7, 0x9, 0x300000000}) r2 = socket$inet6(0xa, 0x205, 0x8010000000000089) rt_sigprocmask(0x1, &(0x7f0000000080)={0x20}, &(0x7f0000000140), 0x8) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e24, 0x0, @loopback}, 0xe) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000240)) listen(r2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) write$tun(r3, &(0x7f0000000500)=ANY=[@ANYRESDEC=r3], 0x1) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r4) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 15:12:36 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x8000) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000a004e2404000000fe80000000000000000000e8ffffff1203000000000000000000000000000000000000000000000000ae320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000037d9ffef4bb13a9100d8433cc113c39f6b00000000000000"], 0x90) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6(0xa, 0x0, 0x7f) ioctl(r1, 0x4800100000008912, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000000c0)={0x0, 0x0, 0xc145, 0x0, 0x0, 0x0, 0x7, 0x9, 0x300000000}) r2 = socket$inet6(0xa, 0x205, 0x8010000000000089) rt_sigprocmask(0x1, &(0x7f0000000080)={0x20}, &(0x7f0000000140), 0x8) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e24, 0x0, @loopback}, 0xe) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000240)) listen(r2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) write$tun(r3, &(0x7f0000000500)=ANY=[@ANYRESDEC=r3], 0x1) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r4) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 15:12:36 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 241.605708] l2tp_ppp: tunl 4: set debug=464c457f 15:12:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) connect$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, 0x6e) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f0000000480)=0x1c) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)={'security\x00', 0x9f, "18029ea690858bfb92c4925e59511d2128a26cae33f48d67b991621df681c0e5e56f5704d56fb1cf1f353403e8df243529848fc1c7e807f2889a8aeda146e9c9a8ce6ad1a0a4b9de624c47f7837459c49f9f888d2705c886dc49d79c50731b87fb47babed83fbad8ac5119c18f5909e69eeb39a623e4bbc7e95df08502364c64f024ad67e0fd9d1ecdc1eaa681ef0ce5bf93a03c5f9cc2d545da96849f1caa"}, &(0x7f0000000100)=0xc3) r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x3, 0x4000) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) gettid() add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x1, 0x0, 0x4, 0x2, 0x3, 0x4, 0x0, 0x4, 0xfffffffffffffffe, 0x0, 0x7fff, 0x2}) [ 242.211150] l2tp_core: tunl 4: closing all sessions... 15:12:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r0 = socket$inet6(0xa, 0x20800a2, 0x0) ioctl(r0, 0x0, &(0x7f00000007c0)="83ebe7ebf1d1722c00d6a09ffe8398ac33a1435d14f01273fe30d1ff0a9b2e21bdd1dd50008a09901fa05e5889991a1fdee4340ff1ff955f93e0504de159f2be8123bde65ca94066775ee81296a6a1c6f63f8b3b87240fecc7") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="2e2f6367726f75702e6370752f73797a30fe", 0x1ff) io_setup(0x5, &(0x7f0000000380)=0x0) r2 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffd50) sendto$inet(r3, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r3, 0x1) timer_create(0x2, &(0x7f00000004c0)={0x0, 0x1b, 0x3}, &(0x7f0000000580)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timer_settime(r4, 0x1, &(0x7f0000000440)={{r5, r6+10000000}, {r7, r8+10000000}}, 0x0) io_destroy(r1) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000140)) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x9, 0x2, 0x11, 0xfffffffffffff722, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x64ca1839, 0x0, 0x8001, 0x7, 0x7fff, 0x80, 0x7f, 0x7, 0x0, 0x4, 0x7f, 0x9, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffd5c2, 0x4, 0x0, 0x9, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x8026, 0x5, 0x0, 0x1, 0x7, 0xfffffffffffffff8, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(r2, 0x8912, &(0x7f00000000c0)) r10 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r10, 0x6, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r11 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_ADD(r9, 0x4c80, r11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 242.298289] l2tp_core: tunl 4: closing... [ 242.345241] __ntfs_error: 1 callbacks suppressed [ 242.345272] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:37 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000640)=0x4000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x28, &(0x7f00000005c0)={0x0, {}, 0x0, 0xffffffffffffffff}, &(0x7f0000000080), 0x13d, &(0x7f0000000540)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4000) fallocate(r1, 0x0, 0x0, 0x7) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") remap_file_pages(&(0x7f0000ff4000/0x1000)=nil, 0x1000, 0x2000016, 0x8, 0x0) r3 = socket$inet6(0xa, 0x1200000000002, 0xffff) ioctl(r3, 0x8912, &(0x7f0000000240)="f556bd2accf30a5cc80700") r4 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xfffffffffffffbff, 0x0, 0x0, 0x10, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x982, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, @perf_bp={&(0x7f0000000380), 0x8}, 0x4, 0x80, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000780)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000680)="db27598b03229e51855a8eaa1e9adf86abb84c68e0bd29dd54779990c0cfb45f0b5637fd45", 0x25}], 0x1, &(0x7f0000000880), 0x0, 0x40000}, 0x20000800) socketpair(0x1, 0x2, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r6, 0x8008700b, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r8 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r6, 0xaf01, &(0x7f0000000000)={0x2}) ioctl$VHOST_SET_VRING_ADDR(r8, 0x4028af11, &(0x7f0000000500)={0x0, 0x8000000000001, &(0x7f0000000400)=""/193, &(0x7f0000000280)=""/97, &(0x7f00000001c0)=""/127, 0x400000000}) ioctl$VHOST_SET_MEM_TABLE(r8, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_LOG_BASE(r8, 0x4008af04, &(0x7f0000000180)=&(0x7f0000000100)) renameat2(r6, &(0x7f0000000300)='./file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x3) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f00000000c0)) ioctl$VHOST_VSOCK_SET_RUNNING(r8, 0x4004af61, &(0x7f00000006c0)=0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) ioctl$PPPIOCGFLAGS(r6, 0x8004745a, &(0x7f0000000140)) tee(r2, r2, 0x2, 0x9) dup2(r4, r2) 15:12:37 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x80000000009, 0x1000000000000001) ioctl(r0, 0x1, &(0x7f00000000c0)="de235aa610c22763eb0ca7ca79cee510b1349999d9cc0a1e531f0796358dbdaf8683a6ee5a1139a28b321808307935441a26d9a898d12ff9b7965009dcfdf63e2b5716869eb0c759862e53f0532c354f84c479624c5059d84f262be232deeb0d3c96db8b93770ef55f511131a250a0f2d6b14e91bbb5a99ac23491") ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000080)={0x8002, 0x0, 0x0, 0x73000a, 0x45e}) 15:12:37 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x8000) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000a004e2404000000fe80000000000000000000e8ffffff1203000000000000000000000000000000000000000000000000ae320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000037d9ffef4bb13a9100d8433cc113c39f6b00000000000000"], 0x90) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6(0xa, 0x0, 0x7f) ioctl(r1, 0x4800100000008912, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000000c0)={0x0, 0x0, 0xc145, 0x0, 0x0, 0x0, 0x7, 0x9, 0x300000000}) r2 = socket$inet6(0xa, 0x205, 0x8010000000000089) rt_sigprocmask(0x1, &(0x7f0000000080)={0x20}, &(0x7f0000000140), 0x8) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e24, 0x0, @loopback}, 0xe) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000240)) listen(r2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) write$tun(r3, &(0x7f0000000500)=ANY=[@ANYRESDEC=r3], 0x1) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r4) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) [ 242.552599] mmap: syz-executor1 (7350) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 15:12:37 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000004c0)={'nr0\x00', 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000740)='/dev/snd/pcmC#D#c\x00', 0x101, 0x0) unshare(0x40000000) ioctl$KVM_NMI(r3, 0xae9a) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f00000008c0)={{0xff, 0x7f}, {0xfae}, 0x0, 0x1, 0x80000001}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x6e55, 0x0, 0x0, 0x7, 0x101}) r4 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r5 = dup2(r4, r2) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x3000, 0x1}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r1, &(0x7f0000000640), &(0x7f00000006c0)=""/53}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000580), 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x113}}, 0x20) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000600)={0x2, 0x100000000, 0x1}) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), 0xffffffffffffffff, 0x1}}, 0x18) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000940)={0x46eb6445, 0x7, 0x800d, 0x164, 0x1, 0x6bc6, 0xfffffffffffff04b}, &(0x7f0000000980)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0x4a, "d35358fd70c5e2b7568272d0d30fd8b3778e26d4fd886fd51f265394eaa253e61d45c2596423053e861bc31f3cadb3b6a7bb7ea1443fab856f7c697037636d3a01259aab73b104809d29"}, &(0x7f0000000640)=0x52) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000780)={r7, @in={{0x2, 0x4e21, @multicast2}}, [0x6, 0x100000001, 0x7ff, 0x1, 0x80000000, 0x3, 0x763, 0x8, 0x20, 0x5, 0x7fff, 0x13d, 0x4, 0x0, 0x4]}, &(0x7f0000000880)=0x100) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {r6, 0x10}}, 0x10) [ 242.616969] vhci_hcd: default hub control req: 0020 v0000 i0000 l2 [ 242.639854] vhci_hcd: default hub control req: 0020 v0000 i0000 l2 15:12:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x7, 0xfffffec6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_buf(r0, 0x84, 0x20, &(0x7f0000dcffe8)=""/24, &(0x7f0000000000)=0x18) 15:12:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000600)='./file0\x00', 0x40c1, 0x800000000) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x1000d) signalfd4(r1, &(0x7f0000000180)={0x6}, 0x8, 0x800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000040)=0x60) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000140)={0x0, 0xd000, 0x7, 0x0, 0x1}) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0xc0) ioctl$FICLONE(r2, 0x40049409, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='cgroup\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'bridge_slave_1\x00'}) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000006c0)=""/236, &(0x7f00000007c0)=0xec) preadv(r3, &(0x7f00000017c0), 0x1fe, 0x0) 15:12:37 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) 15:12:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000008c0)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x17, 0x7, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000050000000000000006000000df4dfeff000000000000020000000000232842000000000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0xff, 0x1000, &(0x7f00000013c0)=""/4096, 0x41f00, 0x1, [], r2, 0x4}, 0x48) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x0, 0x400040) preadv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') preadv(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000780)=ANY=[@ANYBLOB="76000000b6daf774914ae9c385c4010de98b289298a585e706872982dee49771a55a9a2d3e03cecbded4eb74e617dd9ca8f6d1ecb6430289984554b6"], &(0x7f0000000640)=0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000680)={0x0, @in6={{0xa, 0x0, 0x9, @ipv4={[], [], @multicast2}, 0xa542}}, 0x8d1, 0x200, 0x7, 0x20}, &(0x7f0000000740)=0x98) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x608401) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local, [0x0, 0xb00]}}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'nr0\x00', {0x2, 0x0, @multicast1}}) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400080, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r5}) write$cgroup_int(r5, &(0x7f0000000080)=0x1, 0x12) pkey_alloc(0x0, 0xffffffff) preadv(r4, &(0x7f0000000100)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x3c) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) getresgid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f00000004c0)) chown(&(0x7f0000000140)='./file0\x00', r6, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_vs\x00') preadv(r7, &(0x7f0000000480), 0x7c64dd14d4a0333, 0x0) dup2(r4, r7) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000040)={0x20000010}, 0xc, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000002a00fd7f34bd7000ffdbdf250b000000"], 0x1}}, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/96, 0x60) [ 242.868203] audit: type=1804 audit(1540307557.804:46): pid=7370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir126061868/syzkaller.FUjdNH/10/file0" dev="sda1" ino=16553 res=1 [ 242.878156] sched: DL replenish lagged too much [ 242.897382] IPVS: ftp: loaded support on port[0] = 21 [ 243.179235] IPVS: ftp: loaded support on port[0] = 21 15:12:38 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000004c0)={'nr0\x00', 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000740)='/dev/snd/pcmC#D#c\x00', 0x101, 0x0) unshare(0x40000000) ioctl$KVM_NMI(r3, 0xae9a) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f00000008c0)={{0xff, 0x7f}, {0xfae}, 0x0, 0x1, 0x80000001}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x6e55, 0x0, 0x0, 0x7, 0x101}) r4 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r5 = dup2(r4, r2) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x3000, 0x1}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r1, &(0x7f0000000640), &(0x7f00000006c0)=""/53}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000580), 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x113}}, 0x20) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000600)={0x2, 0x100000000, 0x1}) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), 0xffffffffffffffff, 0x1}}, 0x18) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000940)={0x46eb6445, 0x7, 0x800d, 0x164, 0x1, 0x6bc6, 0xfffffffffffff04b}, &(0x7f0000000980)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0x4a, "d35358fd70c5e2b7568272d0d30fd8b3778e26d4fd886fd51f265394eaa253e61d45c2596423053e861bc31f3cadb3b6a7bb7ea1443fab856f7c697037636d3a01259aab73b104809d29"}, &(0x7f0000000640)=0x52) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000780)={r7, @in={{0x2, 0x4e21, @multicast2}}, [0x6, 0x100000001, 0x7ff, 0x1, 0x80000000, 0x3, 0x763, 0x8, 0x20, 0x5, 0x7fff, 0x13d, 0x4, 0x0, 0x4]}, &(0x7f0000000880)=0x100) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {r6, 0x10}}, 0x10) 15:12:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000080)={'team0\x00', 0x7f}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0x24, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, "05fa01270b1348032e092200003a5f0f8ec870ac757b8f9857deb5bfb4389b1fe759d2506647395308e5d5fe5c3a53c9fa728332f9f138e85306bf560fc879dd1acc07000000e645011e2c8300"}, 0xd8) [ 243.746999] audit: type=1400 audit(1540307558.514:47): avc: denied { ioctl } for pid=7387 comm="syz-executor5" path="socket:[24504]" dev="sockfs" ino=24504 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 243.778623] audit: type=1400 audit(1540307558.544:48): avc: denied { prog_load } for pid=7387 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 243.803040] audit: type=1804 audit(1540307558.594:49): pid=7370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir126061868/syzkaller.FUjdNH/10/file0" dev="sda1" ino=16553 res=1 [ 244.011352] Unknown ioctl 35106 [ 244.033759] Unknown ioctl 35106 [ 244.082258] overlayfs: failed to resolve './file1': -2 [ 244.119658] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:39 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x8000) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000a004e2404000000fe80000000000000000000e8ffffff1203000000000000000000000000000000000000000000000000ae320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000037d9ffef4bb13a9100d8433cc113c39f6b00000000000000"], 0x90) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6(0xa, 0x0, 0x7f) ioctl(r1, 0x4800100000008912, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000000c0)={0x0, 0x0, 0xc145, 0x0, 0x0, 0x0, 0x7, 0x9, 0x300000000}) r2 = socket$inet6(0xa, 0x205, 0x8010000000000089) rt_sigprocmask(0x1, &(0x7f0000000080)={0x20}, &(0x7f0000000140), 0x8) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e24, 0x0, @loopback}, 0xe) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000240)) listen(r2, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) write$tun(r3, &(0x7f0000000500)=ANY=[@ANYRESDEC=r3], 0x1) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r4) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 15:12:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000008c0)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x17, 0x7, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000050000000000000006000000df4dfeff000000000000020000000000232842000000000000000000000000009500000000000000"], &(0x7f0000000600)='syzkaller\x00', 0xff, 0x1000, &(0x7f00000013c0)=""/4096, 0x41f00, 0x1, [], r2, 0x4}, 0x48) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x0, 0x400040) preadv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) gettid() syz_open_procfs(0x0, &(0x7f0000000000)='stat\x00') preadv(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000780)=ANY=[@ANYBLOB="76000000b6daf774914ae9c385c4010de98b289298a585e706872982dee49771a55a9a2d3e03cecbded4eb74e617dd9ca8f6d1ecb6430289984554b6"], &(0x7f0000000640)=0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000680)={0x0, @in6={{0xa, 0x0, 0x9, @ipv4={[], [], @multicast2}, 0xa542}}, 0x8d1, 0x200, 0x7, 0x20}, &(0x7f0000000740)=0x98) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x608401) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000240)={"626f6e645f736c6176655f30000e00", {0x2, 0x0, @rand_addr, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local, [0x0, 0xb00]}}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'nr0\x00', {0x2, 0x0, @multicast1}}) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400080, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r5}) write$cgroup_int(r5, &(0x7f0000000080)=0x1, 0x12) pkey_alloc(0x0, 0xffffffff) preadv(r4, &(0x7f0000000100)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x3c) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) getresgid(&(0x7f0000000400), &(0x7f0000000480), &(0x7f00000004c0)) chown(&(0x7f0000000140)='./file0\x00', r6, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000440)='net/ip_vs\x00') preadv(r7, &(0x7f0000000480), 0x7c64dd14d4a0333, 0x0) dup2(r4, r7) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f0000000040)={0x20000010}, 0xc, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000002a00fd7f34bd7000ffdbdf250b000000"], 0x1}}, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/96, 0x60) 15:12:39 executing program 3: r0 = socket$inet6(0xa, 0x4, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) listen(r1, 0xffefffffffffff80) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000140)='0', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 244.541011] sctp: [Deprecated]: syz-executor3 (pid 7418) Use of int in max_burst socket option. [ 244.541011] Use struct sctp_assoc_value instead 15:12:39 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000700)=@broute={'broute\x00', 0x20, 0x1, 0x198, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x290) 15:12:39 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:39 executing program 5: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) [ 244.750924] kernel msg: ebtables bug: please report to author: Wrong len argument 15:12:39 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000000)={0x9, 0x532, 0x7}) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f00000001c0)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() lchown(&(0x7f00000000c0)='./file0\x00', r1, r2) [ 244.793322] sctp: [Deprecated]: syz-executor3 (pid 7415) Use of int in max_burst socket option. [ 244.793322] Use struct sctp_assoc_value instead [ 244.916543] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (1 blocks) 15:12:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xffffffffffffff15, "98de8b1f1f7f6f4d0670c55ff2ea30fb8ed6127234122299dc2cb305cdaa800f0b93a54c81a213400c672cb7104827ada04ab8d936555a9a4e0d3839b804d4360c5ed602cdea24d5c2596056939646069e10543d7a40b5eabf83a911fa7f0722f845b59d8b4c7ea1dd581053147cf71301e478dd9a76ee6c607215ce75a4fac59f12cfd4f8d1102358c02b685e30e8fe38e6864eca4b7182d8658881adcfeb562319e124f961cb9638422e20baaa896616441dc0ddbb21a56ee8e3036acbc8472dee0275f54b19430ad5e81d041df26e51f667c6bbdba8702a9edc39ac83f75549df83c299b971d2e37effa35c536c2c"}, &(0x7f00000000c0)=0xf8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2, 0x4}, &(0x7f00000002c0)=0x8) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x600840, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000180)={0x3ff, 0xa5, 0x4, 0x2}, 0x8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 245.022405] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 245.039677] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (1 blocks) 15:12:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301080, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0x20, 0x1400) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x8, 0x1, 0xfffffffffffffff7}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xb95, 0x2620, 0x5f8, 0x200, 0x6}, &(0x7f0000000340)=0x14) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000140)={r4, 0x5}, &(0x7f0000000240)=0xfffffffffffffffe) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000200)={r5, 0x2}, 0x8) 15:12:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000001c0)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000140)={@rand_addr=0x4, @loopback, 0x0, 0x1, [@empty]}, 0x14) perf_event_open(&(0x7f00000013c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb5c9, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x6c00) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000180), &(0x7f0000000240)=0x18) [ 245.533819] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 15:12:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301080, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0x20, 0x1400) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x8, 0x1, 0xfffffffffffffff7}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xb95, 0x2620, 0x5f8, 0x200, 0x6}, &(0x7f0000000340)=0x14) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000140)={r4, 0x5}, &(0x7f0000000240)=0xfffffffffffffffe) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000200)={r5, 0x2}, 0x8) 15:12:41 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000004c0)={'nr0\x00', 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000740)='/dev/snd/pcmC#D#c\x00', 0x101, 0x0) unshare(0x40000000) ioctl$KVM_NMI(r3, 0xae9a) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f00000008c0)={{0xff, 0x7f}, {0xfae}, 0x0, 0x1, 0x80000001}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x6e55, 0x0, 0x0, 0x7, 0x101}) r4 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r5 = dup2(r4, r2) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x3000, 0x1}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r1, &(0x7f0000000640), &(0x7f00000006c0)=""/53}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000580), 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x113}}, 0x20) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000600)={0x2, 0x100000000, 0x1}) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), 0xffffffffffffffff, 0x1}}, 0x18) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000940)={0x46eb6445, 0x7, 0x800d, 0x164, 0x1, 0x6bc6, 0xfffffffffffff04b}, &(0x7f0000000980)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0x4a, "d35358fd70c5e2b7568272d0d30fd8b3778e26d4fd886fd51f265394eaa253e61d45c2596423053e861bc31f3cadb3b6a7bb7ea1443fab856f7c697037636d3a01259aab73b104809d29"}, &(0x7f0000000640)=0x52) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000780)={r7, @in={{0x2, 0x4e21, @multicast2}}, [0x6, 0x100000001, 0x7ff, 0x1, 0x80000000, 0x3, 0x763, 0x8, 0x20, 0x5, 0x7fff, 0x13d, 0x4, 0x0, 0x4]}, &(0x7f0000000880)=0x100) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {r6, 0x10}}, 0x10) 15:12:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) clock_gettime(0x1, &(0x7f0000000000)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000007a00)={0x0, 0xffffffffffffffff, 0x8}) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0x101000) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000080)={0x5, 0x6, 0x4, 0x2, 0x50, 0x10001, 0x8001, 0x3ff80000000, 0x1, 0x3, 0x8, 0x9}) 15:12:41 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:41 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f000000a980)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x5, 0x3}, &(0x7f00000002c0)=0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) eventfd(0x1002) mount$9p_tcp(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x4024, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@posixacl='posixacl'}, {@noextend='noextend'}, {@uname={'uname', 0x3d, '/dev/snd/pcmC#D#p\x00'}}, {@access_user='access=user'}, {@noextend='noextend'}], [{@fsuuid={'fsuuid', 0x3d, {[0x36, 0x37, 0x62, 0x77, 0x77, 0x39, 0x77, 0x72], 0x2d, [0x0, 0x61, 0x77, 0x39], 0x2d, [0x0, 0x0, 0x64, 0x76], 0x2d, [0x30, 0x66, 0x63, 0x35], 0x2d, [0x31, 0x39, 0x77, 0x39, 0x77, 0x0, 0x0, 0x7f]}}}, {@uid_eq={'uid', 0x3d, r3}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/snd/pcmC#D#p\x00'}}]}}) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000500)={{0xa, 0x6, 0x80, 0x5, 'syz0\x00', 0x70}, 0x1, [0x6, 0x81, 0x9, 0x7, 0x1f, 0x80000000, 0x5, 0x8da, 0x2, 0x8001, 0x276, 0x100000001, 0x4, 0x9, 0xc00000000000000, 0x10000, 0x42, 0x100, 0x3ba, 0x5, 0x4, 0x6, 0x5f, 0x3, 0x2e, 0x7, 0x101, 0x6, 0x1fe, 0x2, 0x5, 0x8, 0x4983, 0xfffffffffffffff8, 0x5, 0xce9, 0x2, 0x6, 0x40, 0xffffffffffffe863, 0x0, 0xbaee, 0x8, 0x0, 0x8, 0xfffffffffffffff7, 0x7, 0x40, 0x9, 0x8, 0x7ff, 0xffffffffffffff80, 0x80000001, 0x1, 0x80000000, 0xb0, 0x3, 0x8, 0x40, 0x3, 0x1ff, 0x0, 0x10000, 0x6, 0xf68, 0x3f, 0x20, 0xfffffffffffffffe, 0x0, 0x0, 0x5, 0x5, 0x100000001, 0x49d, 0x4, 0xffffffffffffffe1, 0x0, 0x2, 0xef86, 0x100000000, 0x7, 0x8eb, 0x4, 0xff, 0xff6223b, 0x8000000, 0x8, 0x8, 0x1, 0x4, 0x36, 0x20, 0x9, 0x6, 0x6, 0x80, 0x6, 0x8001, 0xfffffffffffffffe, 0x5, 0x6, 0xfffffffeffffffff, 0x0, 0x5, 0x1ff, 0x9, 0x0, 0x2, 0xe535, 0xbece, 0x40, 0xfffffffffffffffc, 0x100, 0xffffffffffff0000, 0x100000001, 0x3, 0x7ff, 0x2, 0x80000001, 0x81, 0x0, 0x1, 0x0, 0x6, 0xfff, 0x0, 0x357f4d15, 0x1], {r4, r5+10000000}}) lseek(r0, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000a40)=ANY=[@ANYRES32=0x0, @ANYBLOB="9b007a91fd8bc260e7ee08007f00"], &(0x7f0000000a80)=0x2) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x9, 0x0, 0x5}) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000c80)=""/185, &(0x7f0000000d40)=0xb9) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000c00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x600c048}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=ANY=[@ANYBLOB="00000004", @ANYRES16=r6, @ANYBLOB="02002bbd7000fcdbdf25040000001c00030008000500ac1414bb080003000300000008000800000000000800050001010000"], 0x38}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r7 = dup2(r1, r0) ioctl$IOC_PR_RELEASE(r7, 0x401070ca, &(0x7f0000000c40)={0xffff, 0x86, 0x1}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000dc0)=0x0) sendmsg$nl_generic(r2, &(0x7f0000002100)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x2094500}, 0xc, &(0x7f00000020c0)={&(0x7f0000000e00)={0x1298, 0x14, 0x12, 0x70bd25, 0x25dfdbfe, {0x9}, [@nested={0x1004, 0x3a, [@generic="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"]}, @nested={0x130, 0x92, [@generic="cd500817729f9dd8", @generic="f612ee6170ad6fcfe9b2fb90b552af8e7bcaaaf5e2e2c439c19de72024c5ee17dcdf28f5f0543ee55cfe1e45152f676b29529e8ec7a8b9abc5d469db18a0c84e572cd312bbb3ae5b7cacc76447ca07a1c589f3e339f8fd328eafe08050500929444f99", @generic="0a631fc23590834bfe3f8ef94890def8d802501eb1dbef252891e4aa415d9a463e91aabf9a4b111a475d7d609ce4efe13cf00f111cb261fed615df3f589d014e7dfbbe1d1a51ec9196b0f8a2c3bc050d8ad3399a25fd4243f1dcfe33a72d0b5e99682ab6924476", @typed={0x8, 0x4a, @ipv4=@multicast2}, @generic="bc8155286429532494cd0a4644e8adbdb2546353c799112e0abe77f8ae29ee094e3d78d3dfd3ee041b36800798870478470decfd2a1956ff83751b", @typed={0x8, 0xe, @pid=r8}, @typed={0xc, 0x72, @u64=0x41cffca2}]}, @typed={0x14, 0x94, @ipv6}, @nested={0x108, 0x5b, [@typed={0xc, 0x1f, @u64=0x5a6}, @typed={0x14, 0x3c, @ipv6=@remote}, @generic="4cabbaf176ee74e0377f5c6ba3b26fdc0fc255e3e1093a36525eb2832edf3c03146f", @typed={0x28, 0x2a, @str="65746830256370757365747d7d5d73797374656d2da75d2f6447504c26657468315e00"}, @typed={0x14, 0x2, @ipv6=@ipv4={[], [], @multicast2}}, @generic="96eac89e615210f14f37e021f02e196804de1277a7cc7c93f881f1cbe34830339d86a67af7f4508d689bc8ce80b649395c5f94b453fb8c653dae22e1b26dabb57075d5c62e98a6307fe34af1547d910b27c9f09438f97112f28e740c2e3e85225738311ade30d29f393b93d6c09c72ed6a6504a40264965a9c27", @typed={0x8, 0x15, @fd=r7}, @generic="c1206e"]}, @nested={0x34, 0x78, [@generic="8bfd54c647bc53372a66ee28f59dbde991ce0b7ae775aa44a5daf899a9acf7828c95c11d3995bcde37b5ba93d4"]}]}, 0x1298}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) 15:12:41 executing program 5: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 246.745111] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 15:12:41 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f00000000c0)) kcmp(0x0, 0x0, 0x7, 0xffffffffffffffff, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xc4, r2, 0x401, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x20}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xb}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xc26e}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fff}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioprio_get$pid(0x1, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000002c0)={0x0, 0x1}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000380)={r3, @in={{0x2, 0x4e22, @multicast1}}, 0x8b, 0x100000000}, &(0x7f0000000440)=0x90) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80, 0x800) 15:12:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301080, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0x20, 0x1400) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x8, 0x1, 0xfffffffffffffff7}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xb95, 0x2620, 0x5f8, 0x200, 0x6}, &(0x7f0000000340)=0x14) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000140)={r4, 0x5}, &(0x7f0000000240)=0xfffffffffffffffe) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000200)={r5, 0x2}, 0x8) [ 246.963603] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 247.107445] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 15:12:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301080, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0x20, 0x1400) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x8, 0x1, 0xfffffffffffffff7}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xb95, 0x2620, 0x5f8, 0x200, 0x6}, &(0x7f0000000340)=0x14) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000140)={r4, 0x5}, &(0x7f0000000240)=0xfffffffffffffffe) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000200)={r5, 0x2}, 0x8) 15:12:42 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301080, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0x20, 0x1400) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x8, 0x1, 0xfffffffffffffff7}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xb95, 0x2620, 0x5f8, 0x200, 0x6}, &(0x7f0000000340)=0x14) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000140)={r4, 0x5}, &(0x7f0000000240)=0xfffffffffffffffe) 15:12:42 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f000000a980)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x5, 0x3}, &(0x7f00000002c0)=0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) eventfd(0x1002) mount$9p_tcp(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x4024, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@posixacl='posixacl'}, {@noextend='noextend'}, {@uname={'uname', 0x3d, '/dev/snd/pcmC#D#p\x00'}}, {@access_user='access=user'}, {@noextend='noextend'}], [{@fsuuid={'fsuuid', 0x3d, {[0x36, 0x37, 0x62, 0x77, 0x77, 0x39, 0x77, 0x72], 0x2d, [0x0, 0x61, 0x77, 0x39], 0x2d, [0x0, 0x0, 0x64, 0x76], 0x2d, [0x30, 0x66, 0x63, 0x35], 0x2d, [0x31, 0x39, 0x77, 0x39, 0x77, 0x0, 0x0, 0x7f]}}}, {@uid_eq={'uid', 0x3d, r3}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/snd/pcmC#D#p\x00'}}]}}) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000500)={{0xa, 0x6, 0x80, 0x5, 'syz0\x00', 0x70}, 0x1, [0x6, 0x81, 0x9, 0x7, 0x1f, 0x80000000, 0x5, 0x8da, 0x2, 0x8001, 0x276, 0x100000001, 0x4, 0x9, 0xc00000000000000, 0x10000, 0x42, 0x100, 0x3ba, 0x5, 0x4, 0x6, 0x5f, 0x3, 0x2e, 0x7, 0x101, 0x6, 0x1fe, 0x2, 0x5, 0x8, 0x4983, 0xfffffffffffffff8, 0x5, 0xce9, 0x2, 0x6, 0x40, 0xffffffffffffe863, 0x0, 0xbaee, 0x8, 0x0, 0x8, 0xfffffffffffffff7, 0x7, 0x40, 0x9, 0x8, 0x7ff, 0xffffffffffffff80, 0x80000001, 0x1, 0x80000000, 0xb0, 0x3, 0x8, 0x40, 0x3, 0x1ff, 0x0, 0x10000, 0x6, 0xf68, 0x3f, 0x20, 0xfffffffffffffffe, 0x0, 0x0, 0x5, 0x5, 0x100000001, 0x49d, 0x4, 0xffffffffffffffe1, 0x0, 0x2, 0xef86, 0x100000000, 0x7, 0x8eb, 0x4, 0xff, 0xff6223b, 0x8000000, 0x8, 0x8, 0x1, 0x4, 0x36, 0x20, 0x9, 0x6, 0x6, 0x80, 0x6, 0x8001, 0xfffffffffffffffe, 0x5, 0x6, 0xfffffffeffffffff, 0x0, 0x5, 0x1ff, 0x9, 0x0, 0x2, 0xe535, 0xbece, 0x40, 0xfffffffffffffffc, 0x100, 0xffffffffffff0000, 0x100000001, 0x3, 0x7ff, 0x2, 0x80000001, 0x81, 0x0, 0x1, 0x0, 0x6, 0xfff, 0x0, 0x357f4d15, 0x1], {r4, r5+10000000}}) lseek(r0, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000a40)=ANY=[@ANYRES32=0x0, @ANYBLOB="9b007a91fd8bc260e7ee08007f00"], &(0x7f0000000a80)=0x2) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x9, 0x0, 0x5}) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000c80)=""/185, &(0x7f0000000d40)=0xb9) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000c00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x600c048}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=ANY=[@ANYBLOB="00000004", @ANYRES16=r6, @ANYBLOB="02002bbd7000fcdbdf25040000001c00030008000500ac1414bb080003000300000008000800000000000800050001010000"], 0x38}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r7 = dup2(r1, r0) ioctl$IOC_PR_RELEASE(r7, 0x401070ca, &(0x7f0000000c40)={0xffff, 0x86, 0x1}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000dc0)=0x0) sendmsg$nl_generic(r2, &(0x7f0000002100)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x2094500}, 0xc, &(0x7f00000020c0)={&(0x7f0000000e00)={0x1298, 0x14, 0x12, 0x70bd25, 0x25dfdbfe, {0x9}, [@nested={0x1004, 0x3a, [@generic="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"]}, @nested={0x130, 0x92, [@generic="cd500817729f9dd8", @generic="f612ee6170ad6fcfe9b2fb90b552af8e7bcaaaf5e2e2c439c19de72024c5ee17dcdf28f5f0543ee55cfe1e45152f676b29529e8ec7a8b9abc5d469db18a0c84e572cd312bbb3ae5b7cacc76447ca07a1c589f3e339f8fd328eafe08050500929444f99", @generic="0a631fc23590834bfe3f8ef94890def8d802501eb1dbef252891e4aa415d9a463e91aabf9a4b111a475d7d609ce4efe13cf00f111cb261fed615df3f589d014e7dfbbe1d1a51ec9196b0f8a2c3bc050d8ad3399a25fd4243f1dcfe33a72d0b5e99682ab6924476", @typed={0x8, 0x4a, @ipv4=@multicast2}, @generic="bc8155286429532494cd0a4644e8adbdb2546353c799112e0abe77f8ae29ee094e3d78d3dfd3ee041b36800798870478470decfd2a1956ff83751b", @typed={0x8, 0xe, @pid=r8}, @typed={0xc, 0x72, @u64=0x41cffca2}]}, @typed={0x14, 0x94, @ipv6}, @nested={0x108, 0x5b, [@typed={0xc, 0x1f, @u64=0x5a6}, @typed={0x14, 0x3c, @ipv6=@remote}, @generic="4cabbaf176ee74e0377f5c6ba3b26fdc0fc255e3e1093a36525eb2832edf3c03146f", @typed={0x28, 0x2a, @str="65746830256370757365747d7d5d73797374656d2da75d2f6447504c26657468315e00"}, @typed={0x14, 0x2, @ipv6=@ipv4={[], [], @multicast2}}, @generic="96eac89e615210f14f37e021f02e196804de1277a7cc7c93f881f1cbe34830339d86a67af7f4508d689bc8ce80b649395c5f94b453fb8c653dae22e1b26dabb57075d5c62e98a6307fe34af1547d910b27c9f09438f97112f28e740c2e3e85225738311ade30d29f393b93d6c09c72ed6a6504a40264965a9c27", @typed={0x8, 0x15, @fd=r7}, @generic="c1206e"]}, @nested={0x34, 0x78, [@generic="8bfd54c647bc53372a66ee28f59dbde991ce0b7ae775aa44a5daf899a9acf7828c95c11d3995bcde37b5ba93d4"]}]}, 0x1298}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) [ 247.809071] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:44 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000004c0)={'nr0\x00', 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000740)='/dev/snd/pcmC#D#c\x00', 0x101, 0x0) unshare(0x40000000) ioctl$KVM_NMI(r3, 0xae9a) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f00000008c0)={{0xff, 0x7f}, {0xfae}, 0x0, 0x1, 0x80000001}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000180)={{}, 'port0\x00', 0x0, 0x0, 0x6e55, 0x0, 0x0, 0x7, 0x101}) r4 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r5 = dup2(r4, r2) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x3000, 0x1}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r5, 0x4040534e, &(0x7f0000000000)={0x800000000016, @time={0x0, 0x989680}}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r1, &(0x7f0000000640), &(0x7f00000006c0)=""/53}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000580), 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x113}}, 0x20) ioctl$IOC_PR_RELEASE(r3, 0x401070ca, &(0x7f0000000600)={0x2, 0x100000000, 0x1}) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), 0xffffffffffffffff, 0x1}}, 0x18) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000940)={0x46eb6445, 0x7, 0x800d, 0x164, 0x1, 0x6bc6, 0xfffffffffffff04b}, &(0x7f0000000980)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0x4a, "d35358fd70c5e2b7568272d0d30fd8b3778e26d4fd886fd51f265394eaa253e61d45c2596423053e861bc31f3cadb3b6a7bb7ea1443fab856f7c697037636d3a01259aab73b104809d29"}, &(0x7f0000000640)=0x52) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000780)={r7, @in={{0x2, 0x4e21, @multicast2}}, [0x6, 0x100000001, 0x7ff, 0x1, 0x80000000, 0x3, 0x763, 0x8, 0x20, 0x5, 0x7fff, 0x13d, 0x4, 0x0, 0x4]}, &(0x7f0000000880)=0x100) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {r6, 0x10}}, 0x10) 15:12:44 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f000000a980)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x5, 0x3}, &(0x7f00000002c0)=0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) eventfd(0x1002) mount$9p_tcp(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x4024, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@posixacl='posixacl'}, {@noextend='noextend'}, {@uname={'uname', 0x3d, '/dev/snd/pcmC#D#p\x00'}}, {@access_user='access=user'}, {@noextend='noextend'}], [{@fsuuid={'fsuuid', 0x3d, {[0x36, 0x37, 0x62, 0x77, 0x77, 0x39, 0x77, 0x72], 0x2d, [0x0, 0x61, 0x77, 0x39], 0x2d, [0x0, 0x0, 0x64, 0x76], 0x2d, [0x30, 0x66, 0x63, 0x35], 0x2d, [0x31, 0x39, 0x77, 0x39, 0x77, 0x0, 0x0, 0x7f]}}}, {@uid_eq={'uid', 0x3d, r3}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/snd/pcmC#D#p\x00'}}]}}) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000500)={{0xa, 0x6, 0x80, 0x5, 'syz0\x00', 0x70}, 0x1, [0x6, 0x81, 0x9, 0x7, 0x1f, 0x80000000, 0x5, 0x8da, 0x2, 0x8001, 0x276, 0x100000001, 0x4, 0x9, 0xc00000000000000, 0x10000, 0x42, 0x100, 0x3ba, 0x5, 0x4, 0x6, 0x5f, 0x3, 0x2e, 0x7, 0x101, 0x6, 0x1fe, 0x2, 0x5, 0x8, 0x4983, 0xfffffffffffffff8, 0x5, 0xce9, 0x2, 0x6, 0x40, 0xffffffffffffe863, 0x0, 0xbaee, 0x8, 0x0, 0x8, 0xfffffffffffffff7, 0x7, 0x40, 0x9, 0x8, 0x7ff, 0xffffffffffffff80, 0x80000001, 0x1, 0x80000000, 0xb0, 0x3, 0x8, 0x40, 0x3, 0x1ff, 0x0, 0x10000, 0x6, 0xf68, 0x3f, 0x20, 0xfffffffffffffffe, 0x0, 0x0, 0x5, 0x5, 0x100000001, 0x49d, 0x4, 0xffffffffffffffe1, 0x0, 0x2, 0xef86, 0x100000000, 0x7, 0x8eb, 0x4, 0xff, 0xff6223b, 0x8000000, 0x8, 0x8, 0x1, 0x4, 0x36, 0x20, 0x9, 0x6, 0x6, 0x80, 0x6, 0x8001, 0xfffffffffffffffe, 0x5, 0x6, 0xfffffffeffffffff, 0x0, 0x5, 0x1ff, 0x9, 0x0, 0x2, 0xe535, 0xbece, 0x40, 0xfffffffffffffffc, 0x100, 0xffffffffffff0000, 0x100000001, 0x3, 0x7ff, 0x2, 0x80000001, 0x81, 0x0, 0x1, 0x0, 0x6, 0xfff, 0x0, 0x357f4d15, 0x1], {r4, r5+10000000}}) lseek(r0, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000a40)=ANY=[@ANYRES32=0x0, @ANYBLOB="9b007a91fd8bc260e7ee08007f00"], &(0x7f0000000a80)=0x2) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x9, 0x0, 0x5}) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000c80)=""/185, &(0x7f0000000d40)=0xb9) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000c00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x600c048}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=ANY=[@ANYBLOB="00000004", @ANYRES16=r6, @ANYBLOB="02002bbd7000fcdbdf25040000001c00030008000500ac1414bb080003000300000008000800000000000800050001010000"], 0x38}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r7 = dup2(r1, r0) ioctl$IOC_PR_RELEASE(r7, 0x401070ca, &(0x7f0000000c40)={0xffff, 0x86, 0x1}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000dc0)=0x0) sendmsg$nl_generic(r2, &(0x7f0000002100)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x2094500}, 0xc, &(0x7f00000020c0)={&(0x7f0000000e00)={0x1298, 0x14, 0x12, 0x70bd25, 0x25dfdbfe, {0x9}, [@nested={0x1004, 0x3a, [@generic="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"]}, @nested={0x130, 0x92, [@generic="cd500817729f9dd8", @generic="f612ee6170ad6fcfe9b2fb90b552af8e7bcaaaf5e2e2c439c19de72024c5ee17dcdf28f5f0543ee55cfe1e45152f676b29529e8ec7a8b9abc5d469db18a0c84e572cd312bbb3ae5b7cacc76447ca07a1c589f3e339f8fd328eafe08050500929444f99", @generic="0a631fc23590834bfe3f8ef94890def8d802501eb1dbef252891e4aa415d9a463e91aabf9a4b111a475d7d609ce4efe13cf00f111cb261fed615df3f589d014e7dfbbe1d1a51ec9196b0f8a2c3bc050d8ad3399a25fd4243f1dcfe33a72d0b5e99682ab6924476", @typed={0x8, 0x4a, @ipv4=@multicast2}, @generic="bc8155286429532494cd0a4644e8adbdb2546353c799112e0abe77f8ae29ee094e3d78d3dfd3ee041b36800798870478470decfd2a1956ff83751b", @typed={0x8, 0xe, @pid=r8}, @typed={0xc, 0x72, @u64=0x41cffca2}]}, @typed={0x14, 0x94, @ipv6}, @nested={0x108, 0x5b, [@typed={0xc, 0x1f, @u64=0x5a6}, @typed={0x14, 0x3c, @ipv6=@remote}, @generic="4cabbaf176ee74e0377f5c6ba3b26fdc0fc255e3e1093a36525eb2832edf3c03146f", @typed={0x28, 0x2a, @str="65746830256370757365747d7d5d73797374656d2da75d2f6447504c26657468315e00"}, @typed={0x14, 0x2, @ipv6=@ipv4={[], [], @multicast2}}, @generic="96eac89e615210f14f37e021f02e196804de1277a7cc7c93f881f1cbe34830339d86a67af7f4508d689bc8ce80b649395c5f94b453fb8c653dae22e1b26dabb57075d5c62e98a6307fe34af1547d910b27c9f09438f97112f28e740c2e3e85225738311ade30d29f393b93d6c09c72ed6a6504a40264965a9c27", @typed={0x8, 0x15, @fd=r7}, @generic="c1206e"]}, @nested={0x34, 0x78, [@generic="8bfd54c647bc53372a66ee28f59dbde991ce0b7ae775aa44a5daf899a9acf7828c95c11d3995bcde37b5ba93d4"]}]}, 0x1298}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) 15:12:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="d98cb7228c9ff4e34c0cb8614fcff9bfb780b768d19b615a99b6b94981bf8eda5c4b11e1", 0x24) 15:12:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301080, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0x20, 0x1400) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x8, 0x1, 0xfffffffffffffff7}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xb95, 0x2620, 0x5f8, 0x200, 0x6}, &(0x7f0000000340)=0x14) 15:12:44 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:44 executing program 5: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pipe(&(0x7f0000000100)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3e, 0x0, 0x0, 0x6, 0x0, 0x2, 0x3e, 0x100000001, 0xd5, 0x40, 0x34, 0xd2, 0x9818, 0x38, 0x1, 0x0, 0x0, 0x893}, [{0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x7fff}], "3409eea825e41f6a64087c240fbf9cb10523f595dcd8f56b33ea8b23"}, 0x94) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) [ 249.378312] print_req_error: I/O error, dev loop0, sector 0 [ 249.384243] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 249.392145] print_req_error: I/O error, dev loop0, sector 8 [ 249.397927] Buffer I/O error on dev loop0, logical block 1, lost async page write [ 249.405973] print_req_error: I/O error, dev loop0, sector 16 [ 249.412092] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 249.417830] IPVS: ftp: loaded support on port[0] = 21 [ 249.419832] print_req_error: I/O error, dev loop0, sector 24 [ 249.419854] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 249.419898] print_req_error: I/O error, dev loop0, sector 32 [ 249.445173] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 249.453330] print_req_error: I/O error, dev loop0, sector 40 [ 249.459356] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 249.459408] print_req_error: I/O error, dev loop0, sector 48 [ 249.474289] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 249.482124] print_req_error: I/O error, dev loop0, sector 56 [ 249.487939] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 249.488104] print_req_error: I/O error, dev loop0, sector 64 [ 249.502030] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 249.509814] print_req_error: I/O error, dev loop0, sector 72 [ 249.509833] Buffer I/O error on dev loop0, logical block 9, lost async page write 15:12:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301080, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0x20, 0x1400) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x8, 0x1, 0xfffffffffffffff7}, &(0x7f00000002c0)=0x10) 15:12:44 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000020ff0)=[{&(0x7f0000000040)="2f0000001c00037affffff000d0000000200000400000000000003c91300010000000000000000005867000000050b", 0x2f}], 0x1}, 0x0) 15:12:44 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x15, 0x0, 0x0, "70f08fa7553d33c1ab82c8da0f7c2c39"}, 0x15, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100)={0xa, 0x0, 0x10001}, 0xa) [ 249.775706] overlayfs: failed to resolve './file1': -2 15:12:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301080, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0x20, 0x1400) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) 15:12:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2b3}) 15:12:45 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r2 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x72109c5fef5d34d3) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)=""/195, &(0x7f0000000140)=0xc3) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) r4 = gettid() fcntl$setown(r0, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f0000000100)='./control\x00', 0xa0000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 15:12:45 executing program 5: prctl$setmm(0x23, 0x7, &(0x7f0000ffc000/0x4000)=nil) prctl$setmm(0x23, 0x6, &(0x7f0000ffa000/0x3000)=nil) mprotect(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x0) 15:12:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f000000a980)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x5, 0x3}, &(0x7f00000002c0)=0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) eventfd(0x1002) mount$9p_tcp(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x4024, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@posixacl='posixacl'}, {@noextend='noextend'}, {@uname={'uname', 0x3d, '/dev/snd/pcmC#D#p\x00'}}, {@access_user='access=user'}, {@noextend='noextend'}], [{@fsuuid={'fsuuid', 0x3d, {[0x36, 0x37, 0x62, 0x77, 0x77, 0x39, 0x77, 0x72], 0x2d, [0x0, 0x61, 0x77, 0x39], 0x2d, [0x0, 0x0, 0x64, 0x76], 0x2d, [0x30, 0x66, 0x63, 0x35], 0x2d, [0x31, 0x39, 0x77, 0x39, 0x77, 0x0, 0x0, 0x7f]}}}, {@uid_eq={'uid', 0x3d, r3}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/snd/pcmC#D#p\x00'}}]}}) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000500)={{0xa, 0x6, 0x80, 0x5, 'syz0\x00', 0x70}, 0x1, [0x6, 0x81, 0x9, 0x7, 0x1f, 0x80000000, 0x5, 0x8da, 0x2, 0x8001, 0x276, 0x100000001, 0x4, 0x9, 0xc00000000000000, 0x10000, 0x42, 0x100, 0x3ba, 0x5, 0x4, 0x6, 0x5f, 0x3, 0x2e, 0x7, 0x101, 0x6, 0x1fe, 0x2, 0x5, 0x8, 0x4983, 0xfffffffffffffff8, 0x5, 0xce9, 0x2, 0x6, 0x40, 0xffffffffffffe863, 0x0, 0xbaee, 0x8, 0x0, 0x8, 0xfffffffffffffff7, 0x7, 0x40, 0x9, 0x8, 0x7ff, 0xffffffffffffff80, 0x80000001, 0x1, 0x80000000, 0xb0, 0x3, 0x8, 0x40, 0x3, 0x1ff, 0x0, 0x10000, 0x6, 0xf68, 0x3f, 0x20, 0xfffffffffffffffe, 0x0, 0x0, 0x5, 0x5, 0x100000001, 0x49d, 0x4, 0xffffffffffffffe1, 0x0, 0x2, 0xef86, 0x100000000, 0x7, 0x8eb, 0x4, 0xff, 0xff6223b, 0x8000000, 0x8, 0x8, 0x1, 0x4, 0x36, 0x20, 0x9, 0x6, 0x6, 0x80, 0x6, 0x8001, 0xfffffffffffffffe, 0x5, 0x6, 0xfffffffeffffffff, 0x0, 0x5, 0x1ff, 0x9, 0x0, 0x2, 0xe535, 0xbece, 0x40, 0xfffffffffffffffc, 0x100, 0xffffffffffff0000, 0x100000001, 0x3, 0x7ff, 0x2, 0x80000001, 0x81, 0x0, 0x1, 0x0, 0x6, 0xfff, 0x0, 0x357f4d15, 0x1], {r4, r5+10000000}}) lseek(r0, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000a40)=ANY=[@ANYRES32=0x0, @ANYBLOB="9b007a91fd8bc260e7ee08007f00"], &(0x7f0000000a80)=0x2) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x9, 0x0, 0x5}) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000c80)=""/185, &(0x7f0000000d40)=0xb9) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000c00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x600c048}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=ANY=[@ANYBLOB="00000004", @ANYRES16=r6, @ANYBLOB="02002bbd7000fcdbdf25040000001c00030008000500ac1414bb080003000300000008000800000000000800050001010000"], 0x38}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r7 = dup2(r1, r0) ioctl$IOC_PR_RELEASE(r7, 0x401070ca, &(0x7f0000000c40)={0xffff, 0x86, 0x1}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000dc0)=0x0) sendmsg$nl_generic(r2, &(0x7f0000002100)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x2094500}, 0xc, &(0x7f00000020c0)={&(0x7f0000000e00)={0x1298, 0x14, 0x12, 0x70bd25, 0x25dfdbfe, {0x9}, [@nested={0x1004, 0x3a, [@generic="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"]}, @nested={0x130, 0x92, [@generic="cd500817729f9dd8", @generic="f612ee6170ad6fcfe9b2fb90b552af8e7bcaaaf5e2e2c439c19de72024c5ee17dcdf28f5f0543ee55cfe1e45152f676b29529e8ec7a8b9abc5d469db18a0c84e572cd312bbb3ae5b7cacc76447ca07a1c589f3e339f8fd328eafe08050500929444f99", @generic="0a631fc23590834bfe3f8ef94890def8d802501eb1dbef252891e4aa415d9a463e91aabf9a4b111a475d7d609ce4efe13cf00f111cb261fed615df3f589d014e7dfbbe1d1a51ec9196b0f8a2c3bc050d8ad3399a25fd4243f1dcfe33a72d0b5e99682ab6924476", @typed={0x8, 0x4a, @ipv4=@multicast2}, @generic="bc8155286429532494cd0a4644e8adbdb2546353c799112e0abe77f8ae29ee094e3d78d3dfd3ee041b36800798870478470decfd2a1956ff83751b", @typed={0x8, 0xe, @pid=r8}, @typed={0xc, 0x72, @u64=0x41cffca2}]}, @typed={0x14, 0x94, @ipv6}, @nested={0x108, 0x5b, [@typed={0xc, 0x1f, @u64=0x5a6}, @typed={0x14, 0x3c, @ipv6=@remote}, @generic="4cabbaf176ee74e0377f5c6ba3b26fdc0fc255e3e1093a36525eb2832edf3c03146f", @typed={0x28, 0x2a, @str="65746830256370757365747d7d5d73797374656d2da75d2f6447504c26657468315e00"}, @typed={0x14, 0x2, @ipv6=@ipv4={[], [], @multicast2}}, @generic="96eac89e615210f14f37e021f02e196804de1277a7cc7c93f881f1cbe34830339d86a67af7f4508d689bc8ce80b649395c5f94b453fb8c653dae22e1b26dabb57075d5c62e98a6307fe34af1547d910b27c9f09438f97112f28e740c2e3e85225738311ade30d29f393b93d6c09c72ed6a6504a40264965a9c27", @typed={0x8, 0x15, @fd=r7}, @generic="c1206e"]}, @nested={0x34, 0x78, [@generic="8bfd54c647bc53372a66ee28f59dbde991ce0b7ae775aa44a5daf899a9acf7828c95c11d3995bcde37b5ba93d4"]}]}, 0x1298}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) 15:12:45 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x15, 0x0, 0x0, "70f08fa7553d33c1ab82c8da0f7c2c39"}, 0x15, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100)={0xa, 0x0, 0x10001}, 0xa) 15:12:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301080, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) faccessat(r2, &(0x7f00000001c0)='./file0\x00', 0x20, 0x1400) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) 15:12:45 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) ioctl$RTC_PIE_ON(r1, 0x7005) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x4b51010000000000}, 0xc, &(0x7f0000000440)={&(0x7f000000a980)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x5, 0x3}, &(0x7f00000002c0)=0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) eventfd(0x1002) mount$9p_tcp(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x4024, &(0x7f0000000340)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@posixacl='posixacl'}, {@noextend='noextend'}, {@uname={'uname', 0x3d, '/dev/snd/pcmC#D#p\x00'}}, {@access_user='access=user'}, {@noextend='noextend'}], [{@fsuuid={'fsuuid', 0x3d, {[0x36, 0x37, 0x62, 0x77, 0x77, 0x39, 0x77, 0x72], 0x2d, [0x0, 0x61, 0x77, 0x39], 0x2d, [0x0, 0x0, 0x64, 0x76], 0x2d, [0x30, 0x66, 0x63, 0x35], 0x2d, [0x31, 0x39, 0x77, 0x39, 0x77, 0x0, 0x0, 0x7f]}}}, {@uid_eq={'uid', 0x3d, r3}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/snd/pcmC#D#p\x00'}}]}}) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000500)={{0xa, 0x6, 0x80, 0x5, 'syz0\x00', 0x70}, 0x1, [0x6, 0x81, 0x9, 0x7, 0x1f, 0x80000000, 0x5, 0x8da, 0x2, 0x8001, 0x276, 0x100000001, 0x4, 0x9, 0xc00000000000000, 0x10000, 0x42, 0x100, 0x3ba, 0x5, 0x4, 0x6, 0x5f, 0x3, 0x2e, 0x7, 0x101, 0x6, 0x1fe, 0x2, 0x5, 0x8, 0x4983, 0xfffffffffffffff8, 0x5, 0xce9, 0x2, 0x6, 0x40, 0xffffffffffffe863, 0x0, 0xbaee, 0x8, 0x0, 0x8, 0xfffffffffffffff7, 0x7, 0x40, 0x9, 0x8, 0x7ff, 0xffffffffffffff80, 0x80000001, 0x1, 0x80000000, 0xb0, 0x3, 0x8, 0x40, 0x3, 0x1ff, 0x0, 0x10000, 0x6, 0xf68, 0x3f, 0x20, 0xfffffffffffffffe, 0x0, 0x0, 0x5, 0x5, 0x100000001, 0x49d, 0x4, 0xffffffffffffffe1, 0x0, 0x2, 0xef86, 0x100000000, 0x7, 0x8eb, 0x4, 0xff, 0xff6223b, 0x8000000, 0x8, 0x8, 0x1, 0x4, 0x36, 0x20, 0x9, 0x6, 0x6, 0x80, 0x6, 0x8001, 0xfffffffffffffffe, 0x5, 0x6, 0xfffffffeffffffff, 0x0, 0x5, 0x1ff, 0x9, 0x0, 0x2, 0xe535, 0xbece, 0x40, 0xfffffffffffffffc, 0x100, 0xffffffffffff0000, 0x100000001, 0x3, 0x7ff, 0x2, 0x80000001, 0x81, 0x0, 0x1, 0x0, 0x6, 0xfff, 0x0, 0x357f4d15, 0x1], {r4, r5+10000000}}) lseek(r0, 0x0, 0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000a40)=ANY=[@ANYRES32=0x0, @ANYBLOB="9b007a91fd8bc260e7ee08007f00"], &(0x7f0000000a80)=0x2) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x9, 0x0, 0x5}) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f0000000c80)=""/185, &(0x7f0000000d40)=0xb9) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000c00)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x600c048}, 0xc, &(0x7f0000000b40)={&(0x7f0000000b00)=ANY=[@ANYBLOB="00000004", @ANYRES16=r6, @ANYBLOB="02002bbd7000fcdbdf25040000001c00030008000500ac1414bb080003000300000008000800000000000800050001010000"], 0x38}, 0x1, 0x0, 0x0, 0x20000800}, 0x1) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r7 = dup2(r1, r0) ioctl$IOC_PR_RELEASE(r7, 0x401070ca, &(0x7f0000000c40)={0xffff, 0x86, 0x1}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000dc0)=0x0) sendmsg$nl_generic(r2, &(0x7f0000002100)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x2094500}, 0xc, &(0x7f00000020c0)={&(0x7f0000000e00)={0x1298, 0x14, 0x12, 0x70bd25, 0x25dfdbfe, {0x9}, [@nested={0x1004, 0x3a, [@generic="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"]}, @nested={0x130, 0x92, [@generic="cd500817729f9dd8", @generic="f612ee6170ad6fcfe9b2fb90b552af8e7bcaaaf5e2e2c439c19de72024c5ee17dcdf28f5f0543ee55cfe1e45152f676b29529e8ec7a8b9abc5d469db18a0c84e572cd312bbb3ae5b7cacc76447ca07a1c589f3e339f8fd328eafe08050500929444f99", @generic="0a631fc23590834bfe3f8ef94890def8d802501eb1dbef252891e4aa415d9a463e91aabf9a4b111a475d7d609ce4efe13cf00f111cb261fed615df3f589d014e7dfbbe1d1a51ec9196b0f8a2c3bc050d8ad3399a25fd4243f1dcfe33a72d0b5e99682ab6924476", @typed={0x8, 0x4a, @ipv4=@multicast2}, @generic="bc8155286429532494cd0a4644e8adbdb2546353c799112e0abe77f8ae29ee094e3d78d3dfd3ee041b36800798870478470decfd2a1956ff83751b", @typed={0x8, 0xe, @pid=r8}, @typed={0xc, 0x72, @u64=0x41cffca2}]}, @typed={0x14, 0x94, @ipv6}, @nested={0x108, 0x5b, [@typed={0xc, 0x1f, @u64=0x5a6}, @typed={0x14, 0x3c, @ipv6=@remote}, @generic="4cabbaf176ee74e0377f5c6ba3b26fdc0fc255e3e1093a36525eb2832edf3c03146f", @typed={0x28, 0x2a, @str="65746830256370757365747d7d5d73797374656d2da75d2f6447504c26657468315e00"}, @typed={0x14, 0x2, @ipv6=@ipv4={[], [], @multicast2}}, @generic="96eac89e615210f14f37e021f02e196804de1277a7cc7c93f881f1cbe34830339d86a67af7f4508d689bc8ce80b649395c5f94b453fb8c653dae22e1b26dabb57075d5c62e98a6307fe34af1547d910b27c9f09438f97112f28e740c2e3e85225738311ade30d29f393b93d6c09c72ed6a6504a40264965a9c27", @typed={0x8, 0x15, @fd=r7}, @generic="c1206e"]}, @nested={0x34, 0x78, [@generic="8bfd54c647bc53372a66ee28f59dbde991ce0b7ae775aa44a5daf899a9acf7828c95c11d3995bcde37b5ba93d4"]}]}, 0x1298}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) 15:12:45 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x15, 0x0, 0x0, "70f08fa7553d33c1ab82c8da0f7c2c39"}, 0x15, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100)={0xa, 0x0, 0x10001}, 0xa) 15:12:45 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:12:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301080, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x6}, 0x4) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) 15:12:45 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:45 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x15, 0x0, 0x0, "70f08fa7553d33c1ab82c8da0f7c2c39"}, 0x15, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100)={0xa, 0x0, 0x10001}, 0xa) [ 250.839124] audit: type=1400 audit(1540307565.784:50): avc: denied { map } for pid=7652 comm="syz-executor5" path="/dev/ashmem" dev="devtmpfs" ino=15972 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 15:12:46 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[]}}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f00000004c0)={0x0, 0xfb, 0x15, 0x0, 0x0, "8b5e732ed0afd6817f0ce08d71cca4db"}, 0x15, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 15:12:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x301080, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) 15:12:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:46 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x15, 0x0, 0x0, "70f08fa7553d33c1ab82c8da0f7c2c39"}, 0x15, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 251.281039] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:46 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:46 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x110) write$binfmt_aout(r2, &(0x7f0000001d40)=ANY=[@ANYBLOB="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"], 0x121) syz_open_procfs(0x0, &(0x7f0000000240)='smaps_rollup\x00') sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 15:12:46 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000540)={0x2, 0x0, @local}, 0x10, &(0x7f0000000700), 0x0, &(0x7f0000000dc0)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000980)=""/141, 0x8d}, &(0x7f0000000a40)}}, @cswp={0x58, 0x114, 0x7, {{}, &(0x7f0000000d40), &(0x7f0000000d80)}}], 0x88, 0x800}, 0x0) 15:12:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xf3) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) 15:12:46 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:46 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(anubis-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="b7364cfebd6b24f0720000cfbf003103", 0x10) 15:12:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) 15:12:46 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:47 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 252.354822] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:47 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:47 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tgkill(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 15:12:47 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:47 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) 15:12:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x344, 0x204, 0x0, 0x0, 0x340, 0x0, 0x340, 0x340, 0x340, 0x340, 0x340, 0x4, &(0x7f00000000c0), {[{{@ip={@dev, @rand_addr, 0x0, 0x0, 'bpq0\x00', 'bcsh0\x00', {}, {0xff}}, 0x0, 0x98, 0xbc}, @REJECT={0x24, 'REJECT\x00', 0x0, {0x6d73aa8e39a8c532}}}, {{@ip={@remote, @local, 0xff, 0x0, 'ifb0\x00', 'irlan0\x00', {}, {}, 0x0, 0x0, 0x2}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x0, [0x0, 0x0, 0x7, 0x4, 0x0, 0xffff], 0x0, 0x0, 0x4}}}}, {{@uncond, 0x0, 0xbc, 0xfc, 0x0, {}, [@common=@ttl={0x24, 'ttl\x00'}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x7fff, 0x0, "a7e0910a84d96b366fd730342ec07bd8a758a2d4922c6c363849bb2b3bd9"}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x3a0) 15:12:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) 15:12:47 executing program 5: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 15:12:47 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:47 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x0, 0x70, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000400)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000140)={'bond_slave_0\x00'}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x400, 0x100, 0x0, 0x50d, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000380)) timer_create(0x4, &(0x7f0000000100)={0x0, 0x0, 0x2, @thr={&(0x7f0000000440), &(0x7f0000000780)}}, &(0x7f00000003c0)) getpgid(r0) r2 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x81003) 15:12:47 executing program 5: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 15:12:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) [ 253.216304] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:48 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:48 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="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", 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, 0x8000, 0x0, 0x2, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x100000001, 0x0, 0xa69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x80, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x2) add_key(&(0x7f0000000400)='asymmetric\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000005c0), 0x0, 0xfffffffffffffff9) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000200), 0x0, &(0x7f0000001080)=[{0x10}], 0x10}, 0x0) 15:12:48 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:12:48 executing program 5: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 15:12:48 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) 15:12:48 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:48 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setresuid(0x0, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)) 15:12:48 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:12:48 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) 15:12:48 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 253.886886] overlayfs: failed to resolve './file1': -2 15:12:48 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:48 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:48 executing program 4: 15:12:48 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:12:48 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0x0, 0x0, 0x709000, 0x0, 0x0, 0x0, 0x2}}) 15:12:49 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) 15:12:49 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000000)=""/115, &(0x7f0000000140)=0xfffffdfb) 15:12:49 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:49 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:12:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) prctl$getreaper(0xb, &(0x7f00000000c0)) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000180)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x0, 0x0, 0x101}) ioctl$KVM_SMI(r2, 0xaeb7) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r3) [ 254.455242] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:49 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000180)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xd, 0x0, 0x709000}}) 15:12:49 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:49 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:12:49 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:49 executing program 4: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000180), 0x20) write$selinux_access(r0, &(0x7f0000000100)={'system_u:object_r:userio_device_t:s0', 0x20, "73797374656d5f753a7379731370eeb0cba881cf9a2674656d5f723a6b"}, 0x58) 15:12:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623692500080004001000080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000e2d4ec6bab91d4", 0x55}], 0x1, &(0x7f0000000200)}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_rxfh_indir}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[]}}, 0x0) 15:12:49 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:49 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f0000000280)='./file0\x00') mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x201000, &(0x7f00000002c0)) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f00000004c0)='.\x00', &(0x7f00000003c0)='./file0\x00') pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x65, &(0x7f0000000080), 0x4) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), 0x4) write(0xffffffffffffffff, &(0x7f0000000080), 0x0) 15:12:49 executing program 3: ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000000)=""/165) 15:12:49 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:49 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) [ 254.905619] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7902 comm=syz-executor2 [ 255.154254] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:50 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:50 executing program 2: 15:12:50 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000000)=""/165) 15:12:50 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 15:12:50 executing program 4: 15:12:50 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:50 executing program 4: 15:12:50 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 15:12:50 executing program 3: 15:12:50 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:50 executing program 2: 15:12:50 executing program 4: [ 255.785233] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:50 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:50 executing program 3: 15:12:50 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 15:12:50 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:50 executing program 2: 15:12:50 executing program 4: 15:12:50 executing program 4: 15:12:50 executing program 2: 15:12:50 executing program 3: 15:12:50 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 15:12:51 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:51 executing program 2: [ 256.363079] overlayfs: failed to resolve './file1': -2 15:12:51 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:51 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) 15:12:51 executing program 4: 15:12:51 executing program 3: 15:12:51 executing program 2: 15:12:51 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:51 executing program 4: 15:12:51 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:51 executing program 3: 15:12:51 executing program 5: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pipe(&(0x7f0000000100)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0x3e, 0x0, 0x0, 0x6, 0x0, 0x2, 0x0, 0x100000001, 0xd5, 0x40, 0x34, 0xd2, 0x9818, 0x38, 0x1}, [{0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}], "3409eea825e41f6a64087c240fbf9cb10523f595dcd8"}, 0x8e) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 15:12:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='highspeed\x00', 0x5e) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x2000560e, &(0x7f0000e68000)={0x2, 0x0, @local, [0x0, 0x2]}, 0x10) 15:12:52 executing program 3: [ 257.182099] overlayfs: failed to resolve './file1': -2 [ 257.191463] print_req_error: 120 callbacks suppressed [ 257.191473] print_req_error: I/O error, dev loop0, sector 0 [ 257.202505] buffer_io_error: 120 callbacks suppressed [ 257.202516] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 257.216114] print_req_error: I/O error, dev loop0, sector 8 [ 257.222046] Buffer I/O error on dev loop0, logical block 1, lost async page write 15:12:52 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:52 executing program 4: 15:12:52 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 257.230016] print_req_error: I/O error, dev loop0, sector 16 [ 257.235901] Buffer I/O error on dev loop0, logical block 2, lost async page write [ 257.243751] print_req_error: I/O error, dev loop0, sector 24 [ 257.250918] Buffer I/O error on dev loop0, logical block 3, lost async page write [ 257.259505] print_req_error: I/O error, dev loop0, sector 32 [ 257.265338] Buffer I/O error on dev loop0, logical block 4, lost async page write [ 257.273208] print_req_error: I/O error, dev loop0, sector 40 15:12:52 executing program 2: [ 257.279150] Buffer I/O error on dev loop0, logical block 5, lost async page write [ 257.286875] print_req_error: I/O error, dev loop0, sector 48 [ 257.293584] Buffer I/O error on dev loop0, logical block 6, lost async page write [ 257.301409] print_req_error: I/O error, dev loop0, sector 56 [ 257.307238] Buffer I/O error on dev loop0, logical block 7, lost async page write [ 257.309438] print_req_error: I/O error, dev loop0, sector 64 [ 257.315275] print_req_error: I/O error, dev loop0, sector 72 15:12:52 executing program 3: [ 257.320976] Buffer I/O error on dev loop0, logical block 8, lost async page write [ 257.321076] Buffer I/O error on dev loop0, logical block 10, lost async page write 15:12:52 executing program 4: 15:12:52 executing program 3: 15:12:52 executing program 2: 15:12:52 executing program 1: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:52 executing program 5: 15:12:52 executing program 4: 15:12:52 executing program 2: [ 257.837191] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:52 executing program 3: 15:12:52 executing program 4: 15:12:52 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:52 executing program 5: 15:12:52 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:52 executing program 2: 15:12:52 executing program 4: 15:12:52 executing program 2: 15:12:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000080)=0x5, 0x393) getsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000bfcffc), &(0x7f0000000100)=0xffffffd3) 15:12:52 executing program 5: capset(&(0x7f0000000780)={0x20080522}, &(0x7f00000007c0)) syz_open_dev$vcsa(&(0x7f00000021c0)='/dev/vcsa#\x00', 0x0, 0x0) 15:12:53 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00003a3000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$TIOCSBRK(r0, 0x40044591) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000, 0x7ffffffa) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000400), &(0x7f0000000440)=0x30) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r3, 0x2, 0x1) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f00000002c0)) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f00000004c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r6 = open(&(0x7f0000001cc0)='./bus\x00', 0x141042, 0x0) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f00000003c0)={r6, 0x3, 0x0, r6}) ftruncate(r6, 0x2007fff) sendmmsg$unix(r6, &(0x7f0000001b00)=[{&(0x7f0000000480)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001a40)=[{&(0x7f0000000a40)="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", 0x1000}], 0x1, 0x0, 0x0, 0x4000004}], 0x1, 0x20008010) sendfile(r5, r6, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240), &(0x7f0000000140)=0x68) setsockopt$inet6_tcp_int(r4, 0x6, 0x16, &(0x7f0000001c80), 0x4) getpeername(0xffffffffffffffff, &(0x7f0000001c00)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f00000001c0)=0x80) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000180)=0x7, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000001b40)={0x0, 0x5, 0x7, 'queue1\x00'}) 15:12:53 executing program 5: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:53 executing program 4: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:53 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:53 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 258.334339] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 258.668709] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 15:12:53 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 258.763958] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 15:12:53 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:53 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:53 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:53 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:53 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:54 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 259.148500] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:54 executing program 2: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:54 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:54 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:54 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:54 executing program 5: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 259.512708] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 259.601330] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 15:12:54 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:54 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:54 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:54 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:54 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:54 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:54 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:55 executing program 2: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:55 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:55 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:55 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 260.201276] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:55 executing program 5: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:55 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:55 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:55 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:55 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:55 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:55 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:55 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 260.688156] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 260.708766] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 261.062295] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:12:56 executing program 2 (fault-call:2 fault-nth:0): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:56 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:56 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:56 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:56 executing program 5: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:56 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:56 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:56 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:56 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 261.351523] FAULT_INJECTION: forcing a failure. [ 261.351523] name failslab, interval 1, probability 0, space 0, times 1 [ 261.410241] CPU: 1 PID: 8273 Comm: syz-executor2 Not tainted 4.19.0+ #78 [ 261.417287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.427343] Call Trace: [ 261.429948] dump_stack+0x1c4/0x2b6 [ 261.433616] ? dump_stack_print_info.cold.1+0x20/0x20 [ 261.438857] should_fail.cold.4+0xa/0x17 [ 261.442936] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 261.448072] ? __lock_acquire+0x7ec/0x4ec0 [ 261.452329] ? perf_trace_lock_acquire+0x15b/0x800 15:12:56 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 261.457289] ? graph_lock+0x170/0x170 [ 261.461108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.467249] ? check_preemption_disabled+0x48/0x280 [ 261.472279] ? graph_lock+0x170/0x170 [ 261.472357] ? debug_smp_processor_id+0x1c/0x20 [ 261.472373] ? perf_trace_lock_acquire+0x15b/0x800 [ 261.472397] ? find_held_lock+0x36/0x1c0 [ 261.472416] ? __lock_is_held+0xb5/0x140 [ 261.472442] ? ___might_sleep+0x1ed/0x300 [ 261.472456] ? arch_local_save_flags+0x40/0x40 [ 261.472485] __should_failslab+0x124/0x180 [ 261.507701] should_failslab+0x9/0x14 [ 261.511526] kmem_cache_alloc+0x2be/0x730 [ 261.515697] ? __lock_acquire+0x7ec/0x4ec0 [ 261.519949] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.525524] ? may_expand_vm+0x1e3/0x810 [ 261.529621] vm_area_dup+0x7a/0x230 [ 261.533266] ? vm_area_alloc+0x1d0/0x1d0 [ 261.537348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.542907] __split_vma+0xae/0x570 [ 261.546553] ? find_vma+0x34/0x190 [ 261.546577] do_munmap+0x308/0xf50 [ 261.546595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.546617] ? check_preemption_disabled+0x48/0x280 [ 261.564696] mmap_region+0x6a4/0x1cd0 [ 261.568533] ? __x64_sys_brk+0x7d0/0x7d0 [ 261.572622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.572652] ? inode_has_perm.isra.58+0x17a/0x210 [ 261.572679] ? mpx_unmapped_area_check+0xd8/0x108 [ 261.572706] ? arch_get_unmapped_area_topdown+0xc2/0x940 [ 261.593709] ? arch_get_unmapped_area+0x750/0x750 [ 261.593732] ? lock_acquire+0x1ed/0x520 [ 261.593752] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.593770] ? selinux_mmap_addr+0x2d/0x110 [ 261.593790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.610598] overlayfs: failed to resolve './file1': -2 [ 261.612447] ? security_mmap_addr+0x80/0xa0 [ 261.612469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.612486] ? get_unmapped_area+0x292/0x3b0 [ 261.612508] do_mmap+0xa22/0x1230 [ 261.612533] ? mmap_region+0x1cd0/0x1cd0 [ 261.623345] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 261.623365] ? down_read_killable+0x1f0/0x1f0 [ 261.623385] ? security_mmap_file+0x174/0x1b0 [ 261.623410] vm_mmap_pgoff+0x213/0x2c0 [ 261.623441] ? vma_is_stack_for_current+0xd0/0xd0 [ 261.666952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.672506] ? check_preemption_disabled+0x48/0x280 [ 261.677573] ksys_mmap_pgoff+0x4da/0x660 [ 261.681656] ? do_syscall_64+0x9a/0x820 [ 261.685653] ? find_mergeable_anon_vma+0xd0/0xd0 [ 261.686929] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 261.690419] ? trace_hardirqs_on+0xbd/0x310 [ 261.690438] ? __ia32_sys_read+0xb0/0xb0 [ 261.690458] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.690477] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 261.690501] __x64_sys_mmap+0xe9/0x1b0 [ 261.690523] do_syscall_64+0x1b9/0x820 [ 261.725425] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 261.730808] ? syscall_return_slowpath+0x5e0/0x5e0 [ 261.735757] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.740636] ? trace_hardirqs_on_caller+0x310/0x310 [ 261.740657] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 261.740678] ? prepare_exit_to_usermode+0x291/0x3b0 [ 261.740724] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.740751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.740793] RIP: 0033:0x457569 [ 261.750822] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.750832] RSP: 002b:00007f00dd318c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 261.750852] RAX: ffffffffffffffda RBX: 00007f00dd318c90 RCX: 0000000000457569 [ 261.750863] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 00000000206ff000 15:12:56 executing program 2 (fault-call:2 fault-nth:1): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:12:56 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:56 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:56 executing program 1 (fault-call:6 fault-nth:0): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 261.750873] RBP: 000000000072bf00 R08: 0000000000000003 R09: 0000000000000000 [ 261.750884] R10: 0000000000000012 R11: 0000000000000246 R12: 00007f00dd3196d4 [ 261.750895] R13: 00000000004c2836 R14: 00000000004d3bd0 R15: 0000000000000004 15:12:56 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:56 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a00)='threaded\x00', 0x9) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 261.950494] FAULT_INJECTION: forcing a failure. [ 261.950494] name failslab, interval 1, probability 0, space 0, times 0 [ 261.963657] FAULT_INJECTION: forcing a failure. [ 261.963657] name failslab, interval 1, probability 0, space 0, times 0 [ 262.000739] CPU: 1 PID: 8302 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 262.007605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.016988] Call Trace: [ 262.019647] dump_stack+0x1c4/0x2b6 [ 262.023302] ? dump_stack_print_info.cold.1+0x20/0x20 [ 262.028566] should_fail.cold.4+0xa/0x17 [ 262.032666] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.037813] ? mark_held_locks+0x130/0x130 [ 262.042062] ? print_usage_bug+0xc0/0xc0 [ 262.046141] ? graph_lock+0x170/0x170 [ 262.049955] ? print_usage_bug+0xc0/0xc0 [ 262.054035] ? print_usage_bug+0xc0/0xc0 [ 262.058112] ? kasan_check_read+0x11/0x20 [ 262.062278] ? graph_lock+0x170/0x170 [ 262.066092] ? print_usage_bug+0xc0/0xc0 [ 262.070172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.075719] ? check_preemption_disabled+0x48/0x280 [ 262.080754] ? find_held_lock+0x36/0x1c0 [ 262.084840] ? __lock_is_held+0xb5/0x140 [ 262.088953] ? ___might_sleep+0x1ed/0x300 [ 262.093117] ? arch_local_save_flags+0x40/0x40 [ 262.097726] __should_failslab+0x124/0x180 [ 262.101981] should_failslab+0x9/0x14 [ 262.105805] kmem_cache_alloc_node_trace+0x270/0x740 [ 262.110957] __kmalloc_node+0x33/0x70 [ 262.114795] kvmalloc_node+0x65/0xf0 [ 262.118560] alloc_netdev_mqs+0x17b/0xfe0 [ 262.122746] ? ip6_tnl_link_config+0xac0/0xac0 [ 262.127343] ? free_netdev+0x440/0x440 [ 262.131254] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 262.136802] ? format_decode+0x1b2/0xaf0 [ 262.140876] ? set_precision+0xe0/0xe0 [ 262.144785] ? perf_trace_lock+0x7a0/0x7a0 [ 262.149046] ? memcpy+0x45/0x50 [ 262.152344] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 262.157891] ? vsnprintf+0x20d/0x1b60 [ 262.161715] ? pointer+0x990/0x990 [ 262.165267] ? ip6_tnl_locate+0x206/0x9a0 [ 262.169430] ? lock_downgrade+0x900/0x900 [ 262.173596] ? check_preemption_disabled+0x48/0x280 [ 262.178626] ? sprintf+0xb0/0xe0 [ 262.182030] ? scnprintf+0x130/0x130 [ 262.185765] ? __lock_is_held+0xb5/0x140 [ 262.189883] ip6_tnl_locate+0x502/0x9a0 [ 262.193882] ? ip6_tnl_create2+0x430/0x430 [ 262.198143] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 262.203696] ? _copy_from_user+0xdf/0x150 [ 262.207867] ip6_tnl_ioctl+0x5cd/0xbe0 [ 262.211772] ? ip6_tnl_locate+0x9a0/0x9a0 [ 262.215957] ? rcu_bh_qs+0xc0/0xc0 [ 262.219566] ? ip6_tnl_locate+0x9a0/0x9a0 [ 262.223725] dev_ifsioc+0x41d/0xa80 [ 262.227369] ? dev_ifsioc+0x41d/0xa80 [ 262.231183] ? register_gifconf+0x70/0x70 [ 262.235371] dev_ioctl+0x698/0xcc0 [ 262.238944] sock_ioctl+0x484/0x690 [ 262.242593] ? routing_ioctl+0x890/0x890 [ 262.246675] ? ___might_sleep+0x151/0x300 [ 262.250846] ? arch_local_save_flags+0x40/0x40 [ 262.255461] ? routing_ioctl+0x890/0x890 [ 262.259556] do_vfs_ioctl+0x1de/0x1720 [ 262.263475] ? ioctl_preallocate+0x300/0x300 [ 262.267900] ? selinux_file_mprotect+0x620/0x620 [ 262.272688] ? __sb_end_write+0xd9/0x110 [ 262.276775] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 262.282324] ? fput+0x130/0x1a0 [ 262.285621] ? do_syscall_64+0x9a/0x820 [ 262.289615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.295164] ? security_file_ioctl+0x94/0xc0 [ 262.299592] ksys_ioctl+0xa9/0xd0 [ 262.303063] __x64_sys_ioctl+0x73/0xb0 [ 262.306978] do_syscall_64+0x1b9/0x820 [ 262.310924] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 262.316311] ? syscall_return_slowpath+0x5e0/0x5e0 [ 262.321252] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.326109] ? trace_hardirqs_on_caller+0x310/0x310 [ 262.331158] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 262.336194] ? prepare_exit_to_usermode+0x291/0x3b0 [ 262.341227] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.346100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.351313] RIP: 0033:0x457569 [ 262.354517] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.373439] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 262.381168] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 262.388452] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 262.395737] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 262.403029] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 262.410316] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 262.417628] CPU: 0 PID: 8303 Comm: syz-executor2 Not tainted 4.19.0+ #78 [ 262.424487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.433845] Call Trace: [ 262.436449] dump_stack+0x1c4/0x2b6 [ 262.440269] ? dump_stack_print_info.cold.1+0x20/0x20 [ 262.445471] ? is_bpf_text_address+0xd3/0x170 [ 262.449983] should_fail.cold.4+0xa/0x17 [ 262.454088] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.459673] ? save_stack+0xa9/0xd0 [ 262.463325] ? save_stack+0x43/0xd0 [ 262.466967] ? kasan_kmalloc+0xc7/0xe0 [ 262.470865] ? kasan_slab_alloc+0x12/0x20 [ 262.475039] ? kmem_cache_alloc+0x12e/0x730 [ 262.479386] ? vm_area_dup+0x7a/0x230 [ 262.483201] ? __split_vma+0xae/0x570 [ 262.487012] ? do_munmap+0x308/0xf50 [ 262.490748] ? mmap_region+0x6a4/0x1cd0 [ 262.494729] ? do_mmap+0xa22/0x1230 [ 262.498369] ? vm_mmap_pgoff+0x213/0x2c0 [ 262.502439] ? ksys_mmap_pgoff+0x4da/0x660 [ 262.506692] ? __x64_sys_mmap+0xe9/0x1b0 [ 262.510774] ? do_syscall_64+0x1b9/0x820 [ 262.514856] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.520235] ? perf_trace_lock_acquire+0x15b/0x800 [ 262.525187] ? find_held_lock+0x36/0x1c0 [ 262.529268] ? graph_lock+0x170/0x170 [ 262.533093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.538641] ? check_preemption_disabled+0x48/0x280 [ 262.543666] ? check_preemption_disabled+0x48/0x280 [ 262.548714] __should_failslab+0x124/0x180 [ 262.552972] should_failslab+0x9/0x14 [ 262.556797] kmem_cache_alloc+0x47/0x730 [ 262.560879] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.565919] anon_vma_clone+0x140/0x710 [ 262.569922] ? unlink_anon_vmas+0xa60/0xa60 [ 262.574270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.579831] __split_vma+0x183/0x570 [ 262.583559] ? find_vma+0x34/0x190 [ 262.587118] do_munmap+0x308/0xf50 [ 262.590678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.596232] ? check_preemption_disabled+0x48/0x280 [ 262.601276] mmap_region+0x6a4/0x1cd0 [ 262.605108] ? __x64_sys_brk+0x7d0/0x7d0 [ 262.609186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.614752] ? inode_has_perm.isra.58+0x17a/0x210 [ 262.619620] ? mpx_unmapped_area_check+0xd8/0x108 [ 262.624472] ? arch_get_unmapped_area_topdown+0xc2/0x940 [ 262.629922] ? arch_get_unmapped_area+0x750/0x750 [ 262.634768] ? lock_acquire+0x1ed/0x520 [ 262.638732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 262.644606] ? selinux_mmap_addr+0x2d/0x110 [ 262.648916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.654443] ? security_mmap_addr+0x80/0xa0 [ 262.658754] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 262.664278] ? get_unmapped_area+0x292/0x3b0 [ 262.668680] do_mmap+0xa22/0x1230 [ 262.672131] ? mmap_region+0x1cd0/0x1cd0 [ 262.676184] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 262.680233] ? down_read_killable+0x1f0/0x1f0 [ 262.684720] ? security_mmap_file+0x174/0x1b0 [ 262.689211] vm_mmap_pgoff+0x213/0x2c0 [ 262.693096] ? vma_is_stack_for_current+0xd0/0xd0 [ 262.697925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.703450] ? check_preemption_disabled+0x48/0x280 [ 262.708465] ksys_mmap_pgoff+0x4da/0x660 [ 262.712516] ? do_syscall_64+0x9a/0x820 [ 262.716480] ? find_mergeable_anon_vma+0xd0/0xd0 [ 262.721226] ? trace_hardirqs_on+0xbd/0x310 [ 262.725537] ? __ia32_sys_read+0xb0/0xb0 [ 262.729589] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.734944] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 262.740390] __x64_sys_mmap+0xe9/0x1b0 [ 262.744273] do_syscall_64+0x1b9/0x820 [ 262.748149] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 262.753504] ? syscall_return_slowpath+0x5e0/0x5e0 [ 262.758421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.763256] ? trace_hardirqs_on_caller+0x310/0x310 [ 262.768262] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 262.773267] ? prepare_exit_to_usermode+0x291/0x3b0 [ 262.778279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.783116] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.788292] RIP: 0033:0x457569 15:12:57 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:12:57 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:57 executing program 1 (fault-call:6 fault-nth:1): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 262.791484] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.810392] RSP: 002b:00007f00dd318c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 262.818093] RAX: ffffffffffffffda RBX: 00007f00dd318c90 RCX: 0000000000457569 [ 262.825349] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 00000000206ff000 [ 262.832606] RBP: 000000000072bf00 R08: 0000000000000003 R09: 0000000000000000 [ 262.839861] R10: 0000000000000012 R11: 0000000000000246 R12: 00007f00dd3196d4 [ 262.847120] R13: 00000000004c2836 R14: 00000000004d3bd0 R15: 0000000000000004 15:12:57 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000200)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:57 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:57 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 263.003822] FAULT_INJECTION: forcing a failure. [ 263.003822] name failslab, interval 1, probability 0, space 0, times 0 [ 263.064366] CPU: 0 PID: 8321 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 263.071248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.080617] Call Trace: [ 263.083232] dump_stack+0x1c4/0x2b6 [ 263.086884] ? dump_stack_print_info.cold.1+0x20/0x20 [ 263.092121] should_fail.cold.4+0xa/0x17 [ 263.096211] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.101334] ? graph_lock+0x170/0x170 [ 263.105147] ? print_usage_bug+0xc0/0xc0 [ 263.109227] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.114265] ? pcpu_next_fit_region.constprop.20+0x334/0x410 [ 263.120100] ? kasan_check_write+0x14/0x20 [ 263.124356] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 263.129331] ? graph_lock+0x170/0x170 [ 263.133146] ? wait_for_completion+0x8a0/0x8a0 [ 263.133169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.133186] ? check_preemption_disabled+0x48/0x280 [ 263.133201] ? check_preemption_disabled+0x48/0x280 [ 263.133231] ? __lock_is_held+0xb5/0x140 [ 263.133265] __should_failslab+0x124/0x180 [ 263.133290] should_failslab+0x9/0x14 [ 263.143407] kmem_cache_alloc_trace+0x4b/0x750 [ 263.143442] __hw_addr_create_ex+0xb2/0x3f0 [ 263.143462] ? dev_mc_init+0x170/0x170 [ 263.143492] __hw_addr_add_ex+0x1ef/0x2b0 [ 263.182502] dev_addr_init+0x169/0x260 [ 263.186410] ? __hw_addr_add_ex+0x2b0/0x2b0 [ 263.190754] ? kasan_unpoison_shadow+0x35/0x50 [ 263.195341] ? kasan_kmalloc+0xc7/0xe0 [ 263.199240] ? __kmalloc_node+0x47/0x70 [ 263.203229] alloc_netdev_mqs+0x21b/0xfe0 [ 263.207388] ? ip6_tnl_link_config+0xac0/0xac0 [ 263.211974] ? free_netdev+0x440/0x440 [ 263.215855] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 263.221379] ? format_decode+0x1b2/0xaf0 [ 263.225449] ? set_precision+0xe0/0xe0 [ 263.229333] ? perf_trace_lock+0x7a0/0x7a0 [ 263.233559] ? memcpy+0x45/0x50 [ 263.236833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.242372] ? vsnprintf+0x20d/0x1b60 [ 263.246174] ? pointer+0x990/0x990 [ 263.249704] ? ip6_tnl_locate+0x206/0x9a0 [ 263.253859] ? lock_downgrade+0x900/0x900 [ 263.258010] ? check_preemption_disabled+0x48/0x280 [ 263.263074] ? sprintf+0xb0/0xe0 [ 263.266430] ? scnprintf+0x130/0x130 [ 263.270133] ? __lock_is_held+0xb5/0x140 [ 263.274197] ip6_tnl_locate+0x502/0x9a0 [ 263.278164] ? ip6_tnl_create2+0x430/0x430 [ 263.282399] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.288053] ? _copy_from_user+0xdf/0x150 [ 263.292210] ip6_tnl_ioctl+0x5cd/0xbe0 [ 263.296114] ? ip6_tnl_locate+0x9a0/0x9a0 [ 263.300256] ? rcu_bh_qs+0xc0/0xc0 [ 263.303832] ? ip6_tnl_locate+0x9a0/0x9a0 [ 263.307996] dev_ifsioc+0x41d/0xa80 [ 263.311642] ? dev_ifsioc+0x41d/0xa80 [ 263.315437] ? register_gifconf+0x70/0x70 [ 263.319582] dev_ioctl+0x698/0xcc0 [ 263.323119] sock_ioctl+0x484/0x690 [ 263.326736] ? routing_ioctl+0x890/0x890 [ 263.330803] ? ___might_sleep+0x151/0x300 [ 263.334959] ? arch_local_save_flags+0x40/0x40 [ 263.339540] ? routing_ioctl+0x890/0x890 [ 263.343594] do_vfs_ioctl+0x1de/0x1720 [ 263.347474] ? ioctl_preallocate+0x300/0x300 [ 263.351876] ? selinux_file_mprotect+0x620/0x620 [ 263.356625] ? __sb_end_write+0xd9/0x110 [ 263.360684] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 263.366222] ? fput+0x130/0x1a0 [ 263.369510] ? do_syscall_64+0x9a/0x820 [ 263.373477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.379003] ? security_file_ioctl+0x94/0xc0 [ 263.383424] ksys_ioctl+0xa9/0xd0 [ 263.386885] __x64_sys_ioctl+0x73/0xb0 [ 263.390770] do_syscall_64+0x1b9/0x820 [ 263.394646] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 263.400001] ? syscall_return_slowpath+0x5e0/0x5e0 [ 263.404929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.409770] ? trace_hardirqs_on_caller+0x310/0x310 [ 263.414783] ? prepare_exit_to_usermode+0x291/0x3b0 [ 263.419793] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.424637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.429816] RIP: 0033:0x457569 [ 263.433031] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.451940] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:12:58 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3004, 0x0, 0x12, r0, 0x0) 15:12:58 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) [ 263.459676] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 263.466935] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 263.474191] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 263.481456] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 263.488731] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:12:58 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0xc0045878, &(0x7f0000000000)=""/165) 15:12:58 executing program 1 (fault-call:6 fault-nth:2): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:58 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3002, 0x0, 0x12, r0, 0x0) 15:12:58 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:58 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) rt_sigprocmask(0x0, &(0x7f0000000280), &(0x7f0000000340), 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 263.742355] FAULT_INJECTION: forcing a failure. [ 263.742355] name failslab, interval 1, probability 0, space 0, times 0 [ 263.807763] CPU: 0 PID: 8349 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 263.814673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.824056] Call Trace: [ 263.826665] dump_stack+0x1c4/0x2b6 [ 263.830313] ? dump_stack_print_info.cold.1+0x20/0x20 [ 263.835541] should_fail.cold.4+0xa/0x17 [ 263.839629] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.844785] ? graph_lock+0x170/0x170 [ 263.848602] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 263.853713] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 263.858808] ? graph_lock+0x170/0x170 [ 263.862616] ? trace_hardirqs_on+0xbd/0x310 [ 263.866946] ? kasan_check_read+0x11/0x20 [ 263.871098] ? find_held_lock+0x36/0x1c0 [ 263.875168] ? __lock_is_held+0xb5/0x140 [ 263.879246] ? ___might_sleep+0x1ed/0x300 [ 263.883387] ? arch_local_save_flags+0x40/0x40 [ 263.887960] ? get_random_bytes+0x34/0x40 [ 263.892133] __should_failslab+0x124/0x180 [ 263.896364] should_failslab+0x9/0x14 [ 263.900158] kmem_cache_alloc_node_trace+0x270/0x740 [ 263.905260] __kmalloc_node+0x33/0x70 [ 263.909062] kvmalloc_node+0x65/0xf0 [ 263.912787] alloc_netdev_mqs+0x85a/0xfe0 [ 263.916945] ? ip6_tnl_link_config+0xac0/0xac0 [ 263.921519] ? free_netdev+0x440/0x440 [ 263.925401] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 263.930927] ? format_decode+0x1b2/0xaf0 [ 263.934979] ? set_precision+0xe0/0xe0 [ 263.938861] ? perf_trace_lock+0x7a0/0x7a0 [ 263.943089] ? memcpy+0x45/0x50 [ 263.946363] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.951889] ? vsnprintf+0x20d/0x1b60 [ 263.955695] ? pointer+0x990/0x990 [ 263.959241] ? ip6_tnl_locate+0x206/0x9a0 [ 263.963379] ? lock_downgrade+0x900/0x900 [ 263.967516] ? check_preemption_disabled+0x48/0x280 [ 263.972529] ? sprintf+0xb0/0xe0 [ 263.975903] ? scnprintf+0x130/0x130 [ 263.979603] ? __lock_is_held+0xb5/0x140 [ 263.983664] ip6_tnl_locate+0x502/0x9a0 [ 263.987650] ? ip6_tnl_create2+0x430/0x430 [ 263.991899] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.997444] ? _copy_from_user+0xdf/0x150 [ 264.001585] ip6_tnl_ioctl+0x5cd/0xbe0 [ 264.005468] ? ip6_tnl_locate+0x9a0/0x9a0 [ 264.009609] ? rcu_bh_qs+0xc0/0xc0 [ 264.013165] ? ip6_tnl_locate+0x9a0/0x9a0 [ 264.017302] dev_ifsioc+0x41d/0xa80 [ 264.020919] ? dev_ifsioc+0x41d/0xa80 [ 264.024708] ? register_gifconf+0x70/0x70 [ 264.028855] dev_ioctl+0x698/0xcc0 [ 264.032391] sock_ioctl+0x484/0x690 [ 264.036032] ? routing_ioctl+0x890/0x890 [ 264.040096] ? ___might_sleep+0x151/0x300 [ 264.044235] ? arch_local_save_flags+0x40/0x40 [ 264.048814] ? routing_ioctl+0x890/0x890 [ 264.052866] do_vfs_ioctl+0x1de/0x1720 [ 264.056750] ? ioctl_preallocate+0x300/0x300 [ 264.061159] ? selinux_file_mprotect+0x620/0x620 [ 264.065924] ? __sb_end_write+0xd9/0x110 [ 264.069996] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 264.075532] ? fput+0x130/0x1a0 [ 264.078808] ? do_syscall_64+0x9a/0x820 [ 264.082774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.088301] ? security_file_ioctl+0x94/0xc0 [ 264.092703] ksys_ioctl+0xa9/0xd0 [ 264.096149] __x64_sys_ioctl+0x73/0xb0 [ 264.100056] do_syscall_64+0x1b9/0x820 [ 264.103963] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.109318] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.114239] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.119079] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.124087] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.129095] ? prepare_exit_to_usermode+0x291/0x3b0 [ 264.134111] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.138951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.144126] RIP: 0033:0x457569 [ 264.147310] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.166197] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.173895] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 264.181155] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 264.188414] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 264.195670] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 15:12:59 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:12:59 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x301e, 0x0, 0x12, r0, 0x0) 15:12:59 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x5460, &(0x7f0000000000)=""/165) [ 264.202934] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:12:59 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) 15:12:59 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:59 executing program 1 (fault-call:6 fault-nth:3): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:59 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:59 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x7ffffffff000, 0x0, 0x12, r0, 0x0) 15:12:59 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x770a, &(0x7f0000000000)=""/165) [ 264.441438] FAULT_INJECTION: forcing a failure. [ 264.441438] name failslab, interval 1, probability 0, space 0, times 0 [ 264.506790] CPU: 0 PID: 8380 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 264.513683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.523059] Call Trace: [ 264.525671] dump_stack+0x1c4/0x2b6 [ 264.529326] ? dump_stack_print_info.cold.1+0x20/0x20 [ 264.534555] should_fail.cold.4+0xa/0x17 [ 264.538646] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.543769] ? unwind_get_return_address+0x61/0xa0 [ 264.548745] ? __save_stack_trace+0x8d/0xf0 [ 264.553086] ? graph_lock+0x170/0x170 [ 264.556903] ? graph_lock+0x170/0x170 [ 264.560725] ? save_stack+0xa9/0xd0 [ 264.564372] ? find_held_lock+0x36/0x1c0 [ 264.568450] ? __lock_is_held+0xb5/0x140 [ 264.572541] ? ___might_sleep+0x1ed/0x300 [ 264.576705] ? arch_local_save_flags+0x40/0x40 [ 264.581322] __should_failslab+0x124/0x180 [ 264.585583] should_failslab+0x9/0x14 [ 264.589402] kmem_cache_alloc_node_trace+0x270/0x740 [ 264.594523] ? kasan_unpoison_shadow+0x35/0x50 [ 264.599125] ? __lockdep_init_map+0x105/0x590 [ 264.599152] __kmalloc_node+0x33/0x70 [ 264.599175] kvmalloc_node+0x65/0xf0 [ 264.599200] alloc_netdev_mqs+0xa1c/0xfe0 [ 264.599227] ? free_netdev+0x440/0x440 [ 264.599248] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 264.599270] ? format_decode+0x1b2/0xaf0 [ 264.607570] ? set_precision+0xe0/0xe0 [ 264.607588] ? perf_trace_lock+0x7a0/0x7a0 [ 264.607610] ? memcpy+0x45/0x50 [ 264.607628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.607649] ? vsnprintf+0x20d/0x1b60 [ 264.641892] overlayfs: failed to resolve './file1': -2 [ 264.645887] ? pointer+0x990/0x990 [ 264.645914] ? ip6_tnl_locate+0x206/0x9a0 [ 264.662698] ? lock_downgrade+0x900/0x900 [ 264.666866] ? check_preemption_disabled+0x48/0x280 [ 264.671906] ? sprintf+0xb0/0xe0 [ 264.675290] ? scnprintf+0x130/0x130 [ 264.678091] __ntfs_error: 2 callbacks suppressed [ 264.678122] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 264.679028] ? __lock_is_held+0xb5/0x140 [ 264.679073] ip6_tnl_locate+0x502/0x9a0 [ 264.699816] ? ip6_tnl_create2+0x430/0x430 [ 264.704063] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.709592] ? _copy_from_user+0xdf/0x150 [ 264.713755] ip6_tnl_ioctl+0x5cd/0xbe0 [ 264.717645] ? ip6_tnl_locate+0x9a0/0x9a0 [ 264.721787] ? rcu_bh_qs+0xc0/0xc0 [ 264.725339] ? ip6_tnl_locate+0x9a0/0x9a0 [ 264.729489] dev_ifsioc+0x41d/0xa80 [ 264.733121] ? dev_ifsioc+0x41d/0xa80 [ 264.736914] ? register_gifconf+0x70/0x70 [ 264.741066] dev_ioctl+0x698/0xcc0 [ 264.744630] sock_ioctl+0x484/0x690 [ 264.748265] ? routing_ioctl+0x890/0x890 [ 264.752316] ? ___might_sleep+0x151/0x300 [ 264.756453] ? arch_local_save_flags+0x40/0x40 [ 264.761076] ? routing_ioctl+0x890/0x890 [ 264.765147] do_vfs_ioctl+0x1de/0x1720 [ 264.769038] ? ioctl_preallocate+0x300/0x300 [ 264.773469] ? selinux_file_mprotect+0x620/0x620 [ 264.778237] ? __sb_end_write+0xd9/0x110 [ 264.782291] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 264.787815] ? fput+0x130/0x1a0 [ 264.791088] ? do_syscall_64+0x9a/0x820 [ 264.795064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.800603] ? security_file_ioctl+0x94/0xc0 [ 264.805031] ksys_ioctl+0xa9/0xd0 [ 264.808512] __x64_sys_ioctl+0x73/0xb0 [ 264.812408] do_syscall_64+0x1b9/0x820 [ 264.816287] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.821641] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.826573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.831431] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.836446] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.841477] ? prepare_exit_to_usermode+0x291/0x3b0 [ 264.846507] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.851352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.856566] RIP: 0033:0x457569 [ 264.859752] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.878656] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.886369] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 264.893634] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 264.900896] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 15:12:59 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x80000000008e0000, 0x0, 0x12, r0, 0x0) 15:12:59 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:12:59 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40086602, &(0x7f0000000000)=""/165) [ 264.908161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 264.915431] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:00 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:00 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x7fffdf900000, 0x0, 0x12, r0, 0x0) 15:13:00 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x5451, &(0x7f0000000000)=""/165) 15:13:00 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:00 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/relabel\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:00 executing program 1 (fault-call:6 fault-nth:4): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:00 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3003, 0x0, 0x12, r0, 0x0) [ 265.241453] FAULT_INJECTION: forcing a failure. [ 265.241453] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 265.298614] CPU: 0 PID: 8419 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 265.305570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.314934] Call Trace: [ 265.317557] dump_stack+0x1c4/0x2b6 [ 265.321208] ? dump_stack_print_info.cold.1+0x20/0x20 [ 265.326415] ? find_held_lock+0x36/0x1c0 [ 265.330522] should_fail.cold.4+0xa/0x17 [ 265.335096] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.340238] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 265.346066] ? kasan_check_read+0x11/0x20 [ 265.350236] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 265.355527] ? rcu_bh_qs+0xc0/0xc0 [ 265.359093] ? rcu_bh_qs+0xc0/0xc0 [ 265.362650] ? unwind_dump+0x190/0x190 [ 265.366575] ? is_bpf_text_address+0xd3/0x170 [ 265.371092] ? kernel_text_address+0x79/0xf0 [ 265.375518] ? __kernel_text_address+0xd/0x40 [ 265.380043] ? print_usage_bug+0xc0/0xc0 [ 265.384145] ? __save_stack_trace+0x8d/0xf0 [ 265.388497] ? save_stack+0xa9/0xd0 [ 265.392154] __alloc_pages_nodemask+0x34b/0xde0 [ 265.396839] ? do_syscall_64+0x1b9/0x820 [ 265.400916] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.406303] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 265.411341] ? mark_held_locks+0x130/0x130 [ 265.415619] ? __lock_is_held+0xb5/0x140 [ 265.419712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.425266] ? check_preemption_disabled+0x48/0x280 [ 265.430297] ? __kmalloc_node+0x33/0x70 [ 265.434286] ? graph_lock+0x170/0x170 [ 265.438103] ? debug_smp_processor_id+0x1c/0x20 [ 265.442789] ? perf_trace_lock_acquire+0x15b/0x800 15:13:00 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x541b, &(0x7f0000000000)=""/165) [ 265.447731] ? kasan_unpoison_shadow+0x35/0x50 [ 265.452329] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 265.457885] alloc_pages_current+0x10c/0x210 [ 265.462317] get_zeroed_page+0x14/0x50 [ 265.466225] dev_alloc_name_ns+0x189/0x650 [ 265.470487] ? __dev_get_by_name+0x170/0x170 [ 265.474914] ? free_netdev+0x440/0x440 [ 265.478824] ? arch_local_save_flags+0x40/0x40 [ 265.483426] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.483443] ? rtnl_is_locked+0xb5/0xf0 [ 265.483473] dev_get_valid_name+0x6e/0xe0 [ 265.483495] register_netdevice+0x2b7/0x10f0 [ 265.483512] ? lock_downgrade+0x900/0x900 [ 265.483535] ? netdev_change_features+0x110/0x110 [ 265.483558] ? kasan_check_read+0x11/0x20 [ 265.493083] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 265.493103] ? rcu_bh_qs+0xc0/0xc0 [ 265.493140] ip6_tnl_create2+0x25b/0x430 [ 265.493161] ? ip6_tnl_update+0x850/0x850 [ 265.493194] ip6_tnl_locate+0x6a4/0x9a0 [ 265.493217] ? ip6_tnl_create2+0x430/0x430 [ 265.540199] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.545767] ? _copy_from_user+0xdf/0x150 15:13:00 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x7706, &(0x7f0000000000)=""/165) [ 265.549943] ip6_tnl_ioctl+0x5cd/0xbe0 [ 265.553862] ? ip6_tnl_locate+0x9a0/0x9a0 [ 265.558044] ? rcu_bh_qs+0xc0/0xc0 [ 265.561670] ? ip6_tnl_locate+0x9a0/0x9a0 [ 265.565854] dev_ifsioc+0x41d/0xa80 [ 265.569503] ? dev_ifsioc+0x41d/0xa80 [ 265.573326] ? register_gifconf+0x70/0x70 [ 265.577504] dev_ioctl+0x698/0xcc0 [ 265.581080] sock_ioctl+0x484/0x690 [ 265.584746] ? routing_ioctl+0x890/0x890 [ 265.588837] ? ___might_sleep+0x151/0x300 [ 265.593028] ? arch_local_save_flags+0x40/0x40 15:13:00 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x400000000000000, 0x12, r0, 0x0) [ 265.597654] ? routing_ioctl+0x890/0x890 [ 265.601735] do_vfs_ioctl+0x1de/0x1720 [ 265.605648] ? ioctl_preallocate+0x300/0x300 [ 265.610081] ? selinux_file_mprotect+0x620/0x620 [ 265.614860] ? __sb_end_write+0xd9/0x110 [ 265.618952] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 265.624499] ? fput+0x130/0x1a0 [ 265.627812] ? do_syscall_64+0x9a/0x820 [ 265.631807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.637364] ? security_file_ioctl+0x94/0xc0 [ 265.641790] ksys_ioctl+0xa9/0xd0 [ 265.645269] __x64_sys_ioctl+0x73/0xb0 [ 265.649179] do_syscall_64+0x1b9/0x820 [ 265.653089] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 265.658480] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.663429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.668295] ? trace_hardirqs_on_caller+0x310/0x310 [ 265.673331] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 265.673353] ? prepare_exit_to_usermode+0x291/0x3b0 [ 265.673379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.673410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.673423] RIP: 0033:0x457569 15:13:00 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 265.673441] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.673456] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 [ 265.683481] ORIG_RAX: 0000000000000010 [ 265.683493] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 265.683504] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 265.683514] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 15:13:00 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 265.683525] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 265.683536] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 265.757687] overlayfs: failed to resolve './file1': -2 [ 265.947129] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:01 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:01 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40049409, &(0x7f0000000000)=""/165) 15:13:01 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:01 executing program 1 (fault-call:6 fault-nth:5): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:01 executing program 3: rt_sigaction(0x0, &(0x7f0000000140)={0xfffffffffffffffd, {}, 0x0, 0xffffffffffffffff}, 0x0, 0x8, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:01 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x2000000, 0x12, r0, 0x0) [ 266.104392] FAULT_INJECTION: forcing a failure. [ 266.104392] name failslab, interval 1, probability 0, space 0, times 0 15:13:01 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1f000000, 0x12, r0, 0x0) [ 266.163298] CPU: 1 PID: 8461 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 266.170222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.179583] Call Trace: [ 266.182192] dump_stack+0x1c4/0x2b6 [ 266.185848] ? dump_stack_print_info.cold.1+0x20/0x20 [ 266.191091] should_fail.cold.4+0xa/0x17 [ 266.195185] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.200326] ? mark_held_locks+0x130/0x130 [ 266.204588] ? debug_smp_processor_id+0x1c/0x20 [ 266.209278] ? perf_trace_lock_acquire+0x15b/0x800 [ 266.214253] ? print_usage_bug+0xc0/0xc0 [ 266.218336] ? graph_lock+0x170/0x170 [ 266.222168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.227723] ? check_preemption_disabled+0x48/0x280 [ 266.232757] ? check_preemption_disabled+0x48/0x280 [ 266.237798] ? graph_lock+0x170/0x170 [ 266.241622] ? check_preemption_disabled+0x48/0x280 [ 266.246654] ? check_preemption_disabled+0x48/0x280 [ 266.251703] ? __lock_is_held+0xb5/0x140 [ 266.255790] __should_failslab+0x124/0x180 [ 266.260059] should_failslab+0x9/0x14 15:13:01 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x3000000, 0x12, r0, 0x0) [ 266.263877] kmem_cache_alloc+0x47/0x730 [ 266.267959] ? rt6_exception_hash+0x7e0/0x7e0 [ 266.272479] dst_alloc+0xbb/0x1d0 [ 266.275954] ip6_dst_alloc+0x35/0xa0 [ 266.279688] ip6_create_rt_rcu+0x338/0x4d0 [ 266.283950] ? ip6_rt_copy_init+0x1050/0x1050 [ 266.288466] ? __lock_is_held+0xb5/0x140 [ 266.292566] ip6_pol_route_lookup+0x9a2/0xe70 [ 266.297106] ? fib6_multipath_select+0x480/0x480 [ 266.301883] ? __lock_is_held+0xb5/0x140 [ 266.305976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:13:01 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x4000000, 0x12, r0, 0x0) [ 266.311536] ? __hrtimer_init+0xdb/0x240 [ 266.315652] ? hrtimer_init+0x102/0x490 [ 266.319656] ? hrtimer_init_on_stack+0x40/0x40 [ 266.324261] ? fib6_multipath_select+0x480/0x480 [ 266.329049] fib6_rule_lookup+0x277/0x860 [ 266.333231] ? fib6_lookup+0x480/0x480 [ 266.337142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.342698] ? netif_napi_add+0x522/0xae0 [ 266.346860] ? gro_cells_receive+0x5d0/0x5d0 [ 266.351285] ? dev_add_offload+0x3a0/0x3a0 [ 266.355541] ? snprintf+0xae/0xe0 [ 266.359015] ? vsprintf+0x40/0x40 15:13:01 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x300, 0x12, r0, 0x0) 15:13:01 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1e, 0x12, r0, 0x0) [ 266.362523] ? free_unref_page+0x960/0x960 [ 266.366793] rt6_lookup+0x274/0x380 [ 266.370445] ? ip6_route_input_lookup+0xd0/0xd0 [ 266.375146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.380708] ip6_tnl_link_config+0x70f/0xac0 [ 266.385144] ip6_tnl_dev_init+0x43d/0x630 [ 266.389311] ? ip6_tnl_netlink_parms+0x8a0/0x8a0 [ 266.394085] register_netdevice+0x332/0x10f0 [ 266.398511] ? lock_downgrade+0x900/0x900 [ 266.402687] ? netdev_change_features+0x110/0x110 [ 266.407556] ? kasan_check_read+0x11/0x20 15:13:01 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x7704, &(0x7f0000000000)=""/165) [ 266.411735] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 266.414488] overlayfs: failed to resolve './file1': -2 [ 266.417037] ? rcu_bh_qs+0xc0/0xc0 [ 266.425945] ip6_tnl_create2+0x25b/0x430 [ 266.430046] ? ip6_tnl_update+0x850/0x850 [ 266.434229] ip6_tnl_locate+0x6a4/0x9a0 [ 266.438231] ? ip6_tnl_create2+0x430/0x430 [ 266.443082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.448641] ? _copy_from_user+0xdf/0x150 [ 266.452832] ip6_tnl_ioctl+0x5cd/0xbe0 [ 266.456755] ? ip6_tnl_locate+0x9a0/0x9a0 [ 266.460933] ? rcu_bh_qs+0xc0/0xc0 [ 266.464531] ? ip6_tnl_locate+0x9a0/0x9a0 [ 266.468713] dev_ifsioc+0x41d/0xa80 [ 266.472385] ? dev_ifsioc+0x41d/0xa80 [ 266.476208] ? register_gifconf+0x70/0x70 [ 266.480399] dev_ioctl+0x698/0xcc0 [ 266.483962] sock_ioctl+0x484/0x690 [ 266.487606] ? routing_ioctl+0x890/0x890 [ 266.491687] ? ___might_sleep+0x151/0x300 [ 266.495866] ? arch_local_save_flags+0x40/0x40 [ 266.500487] ? routing_ioctl+0x890/0x890 [ 266.504576] do_vfs_ioctl+0x1de/0x1720 [ 266.508506] ? ioctl_preallocate+0x300/0x300 [ 266.512950] ? selinux_file_mprotect+0x620/0x620 [ 266.517729] ? __sb_end_write+0xd9/0x110 [ 266.517753] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 266.517770] ? fput+0x130/0x1a0 [ 266.527378] ? do_syscall_64+0x9a/0x820 [ 266.527403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.527421] ? security_file_ioctl+0x94/0xc0 [ 266.527442] ksys_ioctl+0xa9/0xd0 [ 266.534712] __x64_sys_ioctl+0x73/0xb0 [ 266.534734] do_syscall_64+0x1b9/0x820 [ 266.534751] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.534772] ? syscall_return_slowpath+0x5e0/0x5e0 [ 266.544719] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.544742] ? trace_hardirqs_on_caller+0x310/0x310 [ 266.544762] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 266.544782] ? prepare_exit_to_usermode+0x291/0x3b0 [ 266.544806] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.552152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.552167] RIP: 0033:0x457569 [ 266.552185] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.552202] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 [ 266.561438] ORIG_RAX: 0000000000000010 [ 266.561450] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 266.561461] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 266.561471] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 266.561482] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 266.561493] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 266.649697] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:01 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x300000000000000, 0x12, r0, 0x0) 15:13:01 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x4b49, &(0x7f0000000000)=""/165) 15:13:01 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:01 executing program 1 (fault-call:6 fault-nth:6): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:01 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1f00, 0x12, r0, 0x0) 15:13:01 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0xc0189436, &(0x7f0000000000)=""/165) 15:13:01 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:01 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:01 executing program 4: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:02 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087708, &(0x7f0000000000)=""/165) [ 267.010982] FAULT_INJECTION: forcing a failure. [ 267.010982] name failslab, interval 1, probability 0, space 0, times 0 [ 267.088440] CPU: 1 PID: 8512 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 267.095365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.104741] Call Trace: [ 267.107373] dump_stack+0x1c4/0x2b6 [ 267.111048] ? dump_stack_print_info.cold.1+0x20/0x20 [ 267.116293] should_fail.cold.4+0xa/0x17 [ 267.120386] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.125570] ? graph_lock+0x170/0x170 [ 267.129393] ? graph_lock+0x170/0x170 [ 267.133211] ? __lockdep_init_map+0x105/0x590 [ 267.137736] ? __lockdep_init_map+0x105/0x590 [ 267.142256] ? find_held_lock+0x36/0x1c0 [ 267.146343] ? __lock_is_held+0xb5/0x140 [ 267.150454] ? ___might_sleep+0x1ed/0x300 [ 267.154617] ? arch_local_save_flags+0x40/0x40 [ 267.159220] ? update_pm_runtime_accounting+0x1b0/0x1b0 [ 267.164616] __should_failslab+0x124/0x180 [ 267.168875] should_failslab+0x9/0x14 [ 267.172699] __kmalloc_track_caller+0x2d0/0x750 [ 267.177397] ? kstrdup_const+0x66/0x80 [ 267.181308] kstrdup+0x39/0x70 [ 267.184556] kstrdup_const+0x66/0x80 [ 267.188296] kvasprintf_const+0x112/0x190 [ 267.192468] kobject_set_name_vargs+0x5b/0x150 [ 267.197071] dev_set_name+0xad/0xe0 [ 267.200723] ? device_initialize+0x5f0/0x5f0 [ 267.205156] ? rtnl_is_locked+0xb5/0xf0 [ 267.209151] ? rtnl_trylock+0x20/0x20 [ 267.213018] netdev_register_kobject+0xc3/0x3f0 [ 267.217722] register_netdevice+0x99a/0x10f0 [ 267.222164] ? netdev_change_features+0x110/0x110 [ 267.227051] ? kasan_check_read+0x11/0x20 [ 267.231249] ? rcu_bh_qs+0xc0/0xc0 [ 267.234829] ip6_tnl_create2+0x25b/0x430 [ 267.238921] ? ip6_tnl_update+0x850/0x850 [ 267.243102] ip6_tnl_locate+0x6a4/0x9a0 [ 267.247103] ? ip6_tnl_create2+0x430/0x430 [ 267.251368] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 267.256922] ? _copy_from_user+0xdf/0x150 [ 267.261119] ip6_tnl_ioctl+0x5cd/0xbe0 [ 267.265068] ? ip6_tnl_locate+0x9a0/0x9a0 [ 267.269246] ? rcu_bh_qs+0xc0/0xc0 [ 267.272845] ? ip6_tnl_locate+0x9a0/0x9a0 [ 267.277010] dev_ifsioc+0x41d/0xa80 [ 267.280678] ? dev_ifsioc+0x41d/0xa80 [ 267.284507] ? register_gifconf+0x70/0x70 [ 267.288687] dev_ioctl+0x698/0xcc0 [ 267.292269] sock_ioctl+0x484/0x690 [ 267.295915] ? routing_ioctl+0x890/0x890 [ 267.299995] ? ___might_sleep+0x151/0x300 [ 267.304174] ? arch_local_save_flags+0x40/0x40 [ 267.308798] ? routing_ioctl+0x890/0x890 [ 267.312896] do_vfs_ioctl+0x1de/0x1720 [ 267.316810] ? ioctl_preallocate+0x300/0x300 [ 267.321258] ? selinux_file_mprotect+0x620/0x620 [ 267.326053] ? __sb_end_write+0xd9/0x110 [ 267.330137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 267.335890] ? fput+0x130/0x1a0 [ 267.339190] ? do_syscall_64+0x9a/0x820 [ 267.343190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.348749] ? security_file_ioctl+0x94/0xc0 [ 267.353184] ksys_ioctl+0xa9/0xd0 [ 267.356662] __x64_sys_ioctl+0x73/0xb0 [ 267.358771] overlayfs: failed to resolve './file1': -2 [ 267.360579] do_syscall_64+0x1b9/0x820 [ 267.360599] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.360621] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.360637] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.360659] ? trace_hardirqs_on_caller+0x310/0x310 [ 267.389975] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.395035] ? prepare_exit_to_usermode+0x291/0x3b0 [ 267.400082] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.404953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.404968] RIP: 0033:0x457569 [ 267.404986] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.404996] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:02 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x5450, &(0x7f0000000000)=""/165) 15:13:02 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x2, 0x12, r0, 0x0) [ 267.405014] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 267.405033] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 267.405044] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 267.405053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 267.405071] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 267.437966] overlayfs: failed to resolve './file1': -2 15:13:02 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x80086601, &(0x7f0000000000)=""/165) 15:13:02 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:02 executing program 1 (fault-call:6 fault-nth:7): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 267.581437] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 267.606290] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 15:13:02 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1e00, 0x12, r0, 0x0) [ 267.707087] FAULT_INJECTION: forcing a failure. [ 267.707087] name failslab, interval 1, probability 0, space 0, times 0 [ 267.780468] CPU: 1 PID: 8546 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 267.787372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.796774] Call Trace: [ 267.799389] dump_stack+0x1c4/0x2b6 [ 267.803057] ? dump_stack_print_info.cold.1+0x20/0x20 [ 267.808320] should_fail.cold.4+0xa/0x17 [ 267.812411] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.817538] ? kasan_kmalloc+0xc7/0xe0 [ 267.821455] ? __kmalloc_track_caller+0x14a/0x750 [ 267.826318] ? kstrdup+0x39/0x70 [ 267.829699] ? kstrdup_const+0x66/0x80 [ 267.833596] ? kvasprintf_const+0x112/0x190 [ 267.837929] ? graph_lock+0x170/0x170 [ 267.841745] ? ip6_tnl_create2+0x25b/0x430 [ 267.845994] ? ip6_tnl_locate+0x6a4/0x9a0 [ 267.850193] ? ip6_tnl_ioctl+0x5cd/0xbe0 [ 267.854267] ? dev_ifsioc+0x41d/0xa80 [ 267.858090] ? dev_ioctl+0x698/0xcc0 [ 267.861819] ? graph_lock+0x170/0x170 [ 267.865635] ? __x64_sys_ioctl+0x73/0xb0 [ 267.869733] ? do_syscall_64+0x1b9/0x820 [ 267.873811] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.879204] ? find_held_lock+0x36/0x1c0 [ 267.883294] ? find_held_lock+0x36/0x1c0 [ 267.887379] ? __lock_is_held+0xb5/0x140 [ 267.891482] ? ___might_sleep+0x1ed/0x300 [ 267.895661] ? arch_local_save_flags+0x40/0x40 [ 267.900265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.905824] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 267.911319] __should_failslab+0x124/0x180 [ 267.915585] should_failslab+0x9/0x14 [ 267.919405] kmem_cache_alloc_trace+0x2d7/0x750 [ 267.924100] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 267.929672] device_add+0xecb/0x17b0 [ 267.933414] ? kfree_const+0x5e/0x70 [ 267.937157] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 267.942281] ? dev_set_name+0xad/0xe0 [ 267.947015] ? device_initialize+0x5f0/0x5f0 [ 267.952451] ? rtnl_is_locked+0xb5/0xf0 [ 267.958148] ? rtnl_trylock+0x20/0x20 [ 267.962104] netdev_register_kobject+0x187/0x3f0 [ 267.966890] register_netdevice+0x99a/0x10f0 [ 267.971325] ? netdev_change_features+0x110/0x110 [ 267.976188] ? kasan_check_read+0x11/0x20 [ 267.980360] ? rcu_bh_qs+0xc0/0xc0 [ 267.983936] ip6_tnl_create2+0x25b/0x430 [ 267.988031] ? ip6_tnl_update+0x850/0x850 [ 267.992252] ip6_tnl_locate+0x6a4/0x9a0 [ 267.996257] ? ip6_tnl_create2+0x430/0x430 [ 268.000527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 268.006115] ? _copy_from_user+0xdf/0x150 [ 268.010297] ip6_tnl_ioctl+0x5cd/0xbe0 [ 268.014226] ? ip6_tnl_locate+0x9a0/0x9a0 [ 268.018400] ? rcu_bh_qs+0xc0/0xc0 [ 268.021998] ? ip6_tnl_locate+0x9a0/0x9a0 [ 268.026177] dev_ifsioc+0x41d/0xa80 [ 268.029831] ? dev_ifsioc+0x41d/0xa80 [ 268.033674] ? register_gifconf+0x70/0x70 [ 268.037883] dev_ioctl+0x698/0xcc0 [ 268.041480] sock_ioctl+0x484/0x690 [ 268.045130] ? routing_ioctl+0x890/0x890 [ 268.049211] ? ___might_sleep+0x151/0x300 [ 268.053382] ? arch_local_save_flags+0x40/0x40 [ 268.057999] ? routing_ioctl+0x890/0x890 [ 268.062106] do_vfs_ioctl+0x1de/0x1720 [ 268.066032] ? ioctl_preallocate+0x300/0x300 [ 268.070469] ? selinux_file_mprotect+0x620/0x620 [ 268.075253] ? __sb_end_write+0xd9/0x110 [ 268.079368] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 268.084924] ? fput+0x130/0x1a0 [ 268.088225] ? do_syscall_64+0x9a/0x820 [ 268.092230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.097790] ? security_file_ioctl+0x94/0xc0 [ 268.102233] ksys_ioctl+0xa9/0xd0 [ 268.105715] __x64_sys_ioctl+0x73/0xb0 [ 268.109632] do_syscall_64+0x1b9/0x820 [ 268.113537] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.118929] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.123872] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.128733] ? trace_hardirqs_on_caller+0x310/0x310 [ 268.133774] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 268.138826] ? prepare_exit_to_usermode+0x291/0x3b0 [ 268.143878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.148764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.153972] RIP: 0033:0x457569 [ 268.157186] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:13:02 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:02 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00'}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:02 executing program 4: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:03 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x400000, 0x12, r0, 0x0) 15:13:03 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0xc020660b, &(0x7f0000000000)=""/165) [ 268.176104] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.176123] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 268.176133] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 268.176144] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 268.176154] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 268.176164] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 268.236532] overlayfs: failed to resolve './file1': -2 15:13:03 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x400000000000, 0x12, r0, 0x0) 15:13:03 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x7709, &(0x7f0000000000)=""/165) [ 268.319038] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:03 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:03 executing program 1 (fault-call:6 fault-nth:8): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:03 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x4020940d, &(0x7f0000000000)=""/165) 15:13:03 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x6b6b6b, 0x12, r0, 0x0) 15:13:03 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 268.513895] FAULT_INJECTION: forcing a failure. [ 268.513895] name failslab, interval 1, probability 0, space 0, times 0 [ 268.570135] CPU: 0 PID: 8585 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 268.577041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.586410] Call Trace: [ 268.589015] dump_stack+0x1c4/0x2b6 [ 268.592691] ? dump_stack_print_info.cold.1+0x20/0x20 [ 268.597928] should_fail.cold.4+0xa/0x17 [ 268.602039] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.607180] ? debug_smp_processor_id+0x1c/0x20 [ 268.611869] ? perf_trace_lock_acquire+0x15b/0x800 [ 268.616820] ? graph_lock+0x170/0x170 [ 268.620642] ? graph_lock+0x170/0x170 [ 268.624482] ? find_held_lock+0x36/0x1c0 [ 268.628559] ? __lock_is_held+0xb5/0x140 [ 268.632661] ? ___might_sleep+0x1ed/0x300 [ 268.636858] ? arch_local_save_flags+0x40/0x40 [ 268.641459] ? lock_downgrade+0x900/0x900 [ 268.645631] __should_failslab+0x124/0x180 [ 268.649895] should_failslab+0x9/0x14 [ 268.653738] __kmalloc_track_caller+0x2d0/0x750 [ 268.658427] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 268.663898] ? kasan_check_write+0x14/0x20 15:13:03 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:03 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x200000000000000, 0x12, r0, 0x0) [ 268.668152] ? do_raw_spin_lock+0xc1/0x230 [ 268.672404] ? kstrdup_const+0x66/0x80 [ 268.676312] kstrdup+0x39/0x70 [ 268.679534] kstrdup_const+0x66/0x80 [ 268.683270] __kernfs_new_node+0xe8/0x8d0 [ 268.687466] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 268.692238] ? tick_nohz_tick_stopped+0x1a/0x90 [ 268.696928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.702495] ? irq_work_queue+0x36/0x1d0 [ 268.706598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.712165] ? wake_up_klogd+0x11a/0x180 [ 268.716250] ? console_device+0xc0/0xc0 [ 268.720239] ? vprintk_emit+0x322/0x930 [ 268.720260] ? __down_trylock_console_sem+0x155/0x200 [ 268.729448] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 268.729466] ? map_id_range_down+0x1ee/0x430 [ 268.729486] ? __put_user_ns+0x60/0x60 [ 268.729501] ? __mutex_lock+0x85e/0x1700 [ 268.729518] ? kernel_text_address+0x79/0xf0 [ 268.729538] ? get_device_parent.isra.27+0xcd/0x5a0 [ 268.729557] ? __kernel_text_address+0xd/0x40 [ 268.760825] ? make_kgid+0x23/0x30 [ 268.764387] kernfs_new_node+0x95/0x120 [ 268.768381] kernfs_create_dir_ns+0x4d/0x160 [ 268.772821] sysfs_create_dir_ns+0x19b/0x340 [ 268.777251] ? sysfs_create_mount_point+0xa0/0xa0 [ 268.782116] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 268.786894] ? net_namespace+0xd/0x40 [ 268.790727] ? device_namespace+0x9d/0xd0 [ 268.794902] kobject_add_internal.cold.11+0x116/0x6af [ 268.800112] ? kobj_ns_type_registered+0x60/0x60 [ 268.804893] ? lock_downgrade+0x900/0x900 [ 268.809084] ? refcount_add_not_zero_checked+0x330/0x330 [ 268.814558] ? kasan_check_read+0x11/0x20 [ 268.818730] kobject_add+0x13f/0x1b0 [ 268.822466] ? kset_create_and_add+0x190/0x190 [ 268.827090] ? mutex_unlock+0xd/0x10 [ 268.830852] device_add+0x3cf/0x17b0 [ 268.834589] ? kfree_const+0x5e/0x70 [ 268.838330] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 268.843448] ? dev_set_name+0xad/0xe0 [ 268.847266] ? device_initialize+0x5f0/0x5f0 [ 268.851710] ? rtnl_is_locked+0xb5/0xf0 [ 268.855712] ? rtnl_trylock+0x20/0x20 [ 268.859551] netdev_register_kobject+0x187/0x3f0 [ 268.864329] register_netdevice+0x99a/0x10f0 [ 268.868788] ? netdev_change_features+0x110/0x110 [ 268.869351] overlayfs: failed to resolve './file1': -2 [ 268.873656] ? kasan_check_read+0x11/0x20 [ 268.873682] ? rcu_bh_qs+0xc0/0xc0 [ 268.873718] ip6_tnl_create2+0x25b/0x430 [ 268.873739] ? ip6_tnl_update+0x850/0x850 [ 268.873774] ip6_tnl_locate+0x6a4/0x9a0 [ 268.898944] ? ip6_tnl_create2+0x430/0x430 [ 268.903221] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 268.908779] ? _copy_from_user+0xdf/0x150 [ 268.912954] ip6_tnl_ioctl+0x5cd/0xbe0 [ 268.916866] ? ip6_tnl_locate+0x9a0/0x9a0 [ 268.921062] ? rcu_bh_qs+0xc0/0xc0 [ 268.924686] ? ip6_tnl_locate+0x9a0/0x9a0 [ 268.928852] dev_ifsioc+0x41d/0xa80 [ 268.932514] ? dev_ifsioc+0x41d/0xa80 [ 268.936342] ? register_gifconf+0x70/0x70 [ 268.940547] dev_ioctl+0x698/0xcc0 [ 268.944131] sock_ioctl+0x484/0x690 [ 268.947793] ? routing_ioctl+0x890/0x890 [ 268.951875] ? ___might_sleep+0x151/0x300 [ 268.956065] ? arch_local_save_flags+0x40/0x40 [ 268.960681] ? routing_ioctl+0x890/0x890 [ 268.964761] do_vfs_ioctl+0x1de/0x1720 [ 268.968675] ? ioctl_preallocate+0x300/0x300 [ 268.973101] ? selinux_file_mprotect+0x620/0x620 [ 268.977885] ? __sb_end_write+0xd9/0x110 [ 268.981974] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 268.987531] ? fput+0x130/0x1a0 [ 268.990834] ? do_syscall_64+0x9a/0x820 [ 268.994838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.000393] ? security_file_ioctl+0x94/0xc0 [ 269.004824] ksys_ioctl+0xa9/0xd0 [ 269.008306] __x64_sys_ioctl+0x73/0xb0 [ 269.012214] do_syscall_64+0x1b9/0x820 [ 269.016117] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.016140] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.016162] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.026465] ? trace_hardirqs_on_caller+0x310/0x310 [ 269.026486] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.026507] ? prepare_exit_to_usermode+0x291/0x3b0 [ 269.026533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.026561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.026575] RIP: 0033:0x457569 [ 269.026594] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.026609] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.080398] overlayfs: failed to resolve './file1': -2 [ 269.086369] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 269.086380] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 269.086389] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 269.086399] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 269.086410] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 269.117763] kobject_add_internal failed for ip6tnl23 (error: -12 parent: net) [ 269.242795] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 15:13:04 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087708, &(0x7f0000000000)=""/165) 15:13:04 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x41007701, &(0x7f0000000000)=""/165) 15:13:04 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1e00000000000000, 0x12, r0, 0x0) 15:13:04 executing program 1 (fault-call:6 fault-nth:9): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:04 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:04 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:04 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x2, &(0x7f0000000000)=""/165) 15:13:04 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x3f00000000000000, 0x12, r0, 0x0) 15:13:04 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087708, &(0x7f0000000000)=""/165) [ 269.462458] FAULT_INJECTION: forcing a failure. [ 269.462458] name failslab, interval 1, probability 0, space 0, times 0 [ 269.524410] CPU: 1 PID: 8627 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 269.531319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.540693] Call Trace: [ 269.543309] dump_stack+0x1c4/0x2b6 [ 269.546966] ? dump_stack_print_info.cold.1+0x20/0x20 [ 269.552223] should_fail.cold.4+0xa/0x17 [ 269.556315] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.561439] ? kasan_kmalloc+0xc7/0xe0 [ 269.565351] ? kstrdup+0x39/0x70 [ 269.568733] ? kstrdup_const+0x66/0x80 [ 269.572645] ? __kernfs_new_node+0xe8/0x8d0 [ 269.576982] ? kernfs_new_node+0x95/0x120 [ 269.581170] ? sysfs_create_dir_ns+0x19b/0x340 [ 269.585775] ? graph_lock+0x170/0x170 [ 269.589624] ? netdev_register_kobject+0x187/0x3f0 [ 269.594581] ? register_netdevice+0x99a/0x10f0 [ 269.599189] ? ip6_tnl_create2+0x25b/0x430 [ 269.603443] ? ip6_tnl_locate+0x6a4/0x9a0 [ 269.607623] ? ip6_tnl_ioctl+0x5cd/0xbe0 [ 269.611720] ? graph_lock+0x170/0x170 [ 269.615534] ? do_vfs_ioctl+0x1de/0x1720 [ 269.619611] ? ksys_ioctl+0xa9/0xd0 [ 269.623247] ? __x64_sys_ioctl+0x73/0xb0 [ 269.627331] ? do_syscall_64+0x1b9/0x820 [ 269.631405] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.636792] ? find_held_lock+0x36/0x1c0 [ 269.640888] ? __lock_is_held+0xb5/0x140 [ 269.644980] ? ___might_sleep+0x1ed/0x300 [ 269.649150] ? arch_local_save_flags+0x40/0x40 [ 269.653798] __should_failslab+0x124/0x180 [ 269.658095] should_failslab+0x9/0x14 [ 269.661912] kmem_cache_alloc+0x2be/0x730 [ 269.666082] ? kstrdup+0x59/0x70 [ 269.669478] __kernfs_new_node+0x127/0x8d0 [ 269.673737] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 269.678516] ? tick_nohz_tick_stopped+0x1a/0x90 [ 269.683215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.688765] ? irq_work_queue+0x36/0x1d0 [ 269.692848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.698404] ? wake_up_klogd+0x11a/0x180 [ 269.702486] ? console_device+0xc0/0xc0 [ 269.706489] ? vprintk_emit+0x322/0x930 [ 269.710496] ? __down_trylock_console_sem+0x155/0x200 [ 269.715719] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 269.720755] ? map_id_range_down+0x1ee/0x430 [ 269.725182] ? __put_user_ns+0x60/0x60 [ 269.729088] ? __mutex_lock+0x85e/0x1700 [ 269.733164] ? kernel_text_address+0x79/0xf0 [ 269.737596] ? get_device_parent.isra.27+0xcd/0x5a0 [ 269.742633] ? __kernel_text_address+0xd/0x40 [ 269.747162] ? make_kgid+0x23/0x30 [ 269.750734] kernfs_new_node+0x95/0x120 [ 269.754736] kernfs_create_dir_ns+0x4d/0x160 [ 269.759170] sysfs_create_dir_ns+0x19b/0x340 [ 269.763604] ? sysfs_create_mount_point+0xa0/0xa0 [ 269.768469] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 269.773245] ? net_namespace+0xd/0x40 [ 269.777080] ? device_namespace+0x9d/0xd0 [ 269.781260] kobject_add_internal.cold.11+0x116/0x6af [ 269.786474] ? kobj_ns_type_registered+0x60/0x60 [ 269.791253] ? lock_downgrade+0x900/0x900 [ 269.795421] ? refcount_add_not_zero_checked+0x330/0x330 [ 269.800899] ? kasan_check_read+0x11/0x20 [ 269.805089] kobject_add+0x13f/0x1b0 [ 269.808828] ? kset_create_and_add+0x190/0x190 [ 269.813444] ? mutex_unlock+0xd/0x10 [ 269.817185] device_add+0x3cf/0x17b0 [ 269.820924] ? kfree_const+0x5e/0x70 [ 269.824670] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 269.829807] ? dev_set_name+0xad/0xe0 [ 269.833634] ? device_initialize+0x5f0/0x5f0 [ 269.838071] ? rtnl_is_locked+0xb5/0xf0 [ 269.842068] ? rtnl_trylock+0x20/0x20 [ 269.845897] netdev_register_kobject+0x187/0x3f0 [ 269.850678] register_netdevice+0x99a/0x10f0 [ 269.855114] ? netdev_change_features+0x110/0x110 [ 269.859976] ? kasan_check_read+0x11/0x20 [ 269.864173] ? rcu_bh_qs+0xc0/0xc0 [ 269.867752] ip6_tnl_create2+0x25b/0x430 [ 269.871830] ? ip6_tnl_update+0x850/0x850 [ 269.876013] ip6_tnl_locate+0x6a4/0x9a0 [ 269.880019] ? ip6_tnl_create2+0x430/0x430 [ 269.884295] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.889848] ? _copy_from_user+0xdf/0x150 [ 269.894041] ip6_tnl_ioctl+0x5cd/0xbe0 [ 269.897951] ? ip6_tnl_locate+0x9a0/0x9a0 [ 269.902122] ? rcu_bh_qs+0xc0/0xc0 [ 269.905759] ? ip6_tnl_locate+0x9a0/0x9a0 [ 269.909926] dev_ifsioc+0x41d/0xa80 [ 269.913604] ? dev_ifsioc+0x41d/0xa80 [ 269.917442] ? register_gifconf+0x70/0x70 [ 269.921650] dev_ioctl+0x698/0xcc0 [ 269.925222] sock_ioctl+0x484/0x690 [ 269.928871] ? routing_ioctl+0x890/0x890 [ 269.932957] ? ___might_sleep+0x151/0x300 [ 269.934167] overlayfs: failed to resolve './file1': -2 [ 269.937122] ? arch_local_save_flags+0x40/0x40 [ 269.937158] ? routing_ioctl+0x890/0x890 [ 269.937178] do_vfs_ioctl+0x1de/0x1720 [ 269.937202] ? ioctl_preallocate+0x300/0x300 [ 269.947069] ? selinux_file_mprotect+0x620/0x620 [ 269.947094] ? __sb_end_write+0xd9/0x110 [ 269.947119] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 15:13:04 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087707, &(0x7f0000000000)=""/165) 15:13:04 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x5452, &(0x7f0000000000)=""/165) 15:13:04 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087602, &(0x7f0000000000)=""/165) 15:13:04 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x4b47, &(0x7f0000000000)=""/165) 15:13:04 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x5421, &(0x7f0000000000)=""/165) 15:13:04 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087703, &(0x7f0000000000)=""/165) [ 269.947137] ? fput+0x130/0x1a0 [ 269.955089] ? do_syscall_64+0x9a/0x820 [ 269.955115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.955134] ? security_file_ioctl+0x94/0xc0 [ 269.955156] ksys_ioctl+0xa9/0xd0 [ 269.994604] __x64_sys_ioctl+0x73/0xb0 [ 269.998519] do_syscall_64+0x1b9/0x820 [ 270.002431] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.007820] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.012765] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.017635] ? trace_hardirqs_on_caller+0x310/0x310 [ 270.022675] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 270.027734] ? prepare_exit_to_usermode+0x291/0x3b0 [ 270.032800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.037674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.042892] RIP: 0033:0x457569 [ 270.046102] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.065019] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 270.072751] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 270.080035] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 270.087300] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 270.094561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 270.101844] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:05 executing program 1 (fault-call:6 fault-nth:10): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0xc0045878, &(0x7f0000000000)=""/165) [ 270.138508] kobject_add_internal failed for ip6tnl23 (error: -12 parent: net) [ 270.171348] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 270.252222] FAULT_INJECTION: forcing a failure. [ 270.252222] name failslab, interval 1, probability 0, space 0, times 0 [ 270.271042] CPU: 0 PID: 8663 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 270.277923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.287283] Call Trace: [ 270.289891] dump_stack+0x1c4/0x2b6 [ 270.293529] ? dump_stack_print_info.cold.1+0x20/0x20 [ 270.298737] should_fail.cold.4+0xa/0x17 [ 270.302816] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.307960] ? kernfs_activate+0x8e/0x2c0 [ 270.312118] ? graph_lock+0x170/0x170 [ 270.315912] ? graph_lock+0x170/0x170 [ 270.319734] ? find_held_lock+0x36/0x1c0 [ 270.323790] ? __lock_is_held+0xb5/0x140 [ 270.327851] ? ___might_sleep+0x1ed/0x300 [ 270.331992] ? arch_local_save_flags+0x40/0x40 [ 270.336574] __should_failslab+0x124/0x180 [ 270.340814] should_failslab+0x9/0x14 [ 270.344627] kmem_cache_alloc+0x2be/0x730 [ 270.348770] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 270.353782] __kernfs_new_node+0x127/0x8d0 [ 270.358037] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 270.362808] ? perf_trace_lock+0x7a0/0x7a0 [ 270.367047] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 270.372600] ? kernfs_link_sibling+0x1d2/0x3b0 [ 270.377191] ? graph_lock+0x170/0x170 [ 270.380981] ? kernfs_add_one+0x12b/0x4d0 [ 270.385124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.390665] ? kernfs_create_dir_ns+0x10c/0x160 [ 270.395331] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 270.400357] ? map_id_range_down+0x1ee/0x430 [ 270.404761] ? __put_user_ns+0x60/0x60 [ 270.408652] kernfs_new_node+0x95/0x120 [ 270.412623] __kernfs_create_file+0x5a/0x340 [ 270.417058] sysfs_add_file_mode_ns+0x222/0x530 [ 270.421728] sysfs_create_file_ns+0x1a3/0x270 [ 270.426216] ? __down_interruptible+0x700/0x700 [ 270.430878] ? sysfs_add_file_mode_ns+0x530/0x530 [ 270.435729] ? kobject_add+0x14c/0x1b0 [ 270.439611] ? up_read+0x1a/0x110 [ 270.443068] device_create_file+0xf4/0x1e0 [ 270.447470] ? acpi_bind_one+0x8e0/0x8e0 [ 270.451529] device_add+0x416/0x17b0 [ 270.455242] ? kfree_const+0x5e/0x70 [ 270.458966] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 270.464064] ? dev_set_name+0xad/0xe0 [ 270.467857] ? device_initialize+0x5f0/0x5f0 [ 270.472256] ? rtnl_is_locked+0xb5/0xf0 [ 270.476222] ? rtnl_trylock+0x20/0x20 [ 270.480040] netdev_register_kobject+0x187/0x3f0 [ 270.484792] register_netdevice+0x99a/0x10f0 [ 270.489202] ? netdev_change_features+0x110/0x110 [ 270.494061] ? kasan_check_read+0x11/0x20 [ 270.498221] ? rcu_bh_qs+0xc0/0xc0 [ 270.501772] ip6_tnl_create2+0x25b/0x430 [ 270.505828] ? ip6_tnl_update+0x850/0x850 [ 270.509974] ip6_tnl_locate+0x6a4/0x9a0 [ 270.513953] ? ip6_tnl_create2+0x430/0x430 [ 270.518186] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.523713] ? _copy_from_user+0xdf/0x150 [ 270.527855] ip6_tnl_ioctl+0x5cd/0xbe0 [ 270.531752] ? ip6_tnl_locate+0x9a0/0x9a0 [ 270.535912] ? rcu_bh_qs+0xc0/0xc0 [ 270.539465] ? ip6_tnl_locate+0x9a0/0x9a0 [ 270.543604] dev_ifsioc+0x41d/0xa80 [ 270.547218] ? dev_ifsioc+0x41d/0xa80 [ 270.551012] ? register_gifconf+0x70/0x70 [ 270.555167] dev_ioctl+0x698/0xcc0 [ 270.558713] sock_ioctl+0x484/0x690 [ 270.562345] ? routing_ioctl+0x890/0x890 [ 270.566412] ? ___might_sleep+0x151/0x300 [ 270.570555] ? arch_local_save_flags+0x40/0x40 [ 270.575136] ? routing_ioctl+0x890/0x890 [ 270.579191] do_vfs_ioctl+0x1de/0x1720 [ 270.583076] ? ioctl_preallocate+0x300/0x300 [ 270.587503] ? selinux_file_mprotect+0x620/0x620 [ 270.592272] ? __sb_end_write+0xd9/0x110 [ 270.596332] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 270.601859] ? fput+0x130/0x1a0 [ 270.605130] ? do_syscall_64+0x9a/0x820 [ 270.609113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.614643] ? security_file_ioctl+0x94/0xc0 [ 270.619057] ksys_ioctl+0xa9/0xd0 [ 270.622504] __x64_sys_ioctl+0x73/0xb0 [ 270.626399] do_syscall_64+0x1b9/0x820 [ 270.630285] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.635657] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.640578] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.645412] ? trace_hardirqs_on_caller+0x310/0x310 [ 270.650419] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 270.655444] ? prepare_exit_to_usermode+0x291/0x3b0 [ 270.660455] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.665295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.670473] RIP: 0033:0x457569 [ 270.673661] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.692555] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) 15:13:05 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x3f000000, 0x12, r0, 0x0) 15:13:05 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:05 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x80087601, &(0x7f0000000000)=""/165) [ 270.700256] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 270.707512] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 270.714772] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 270.722036] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 270.729303] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:05 executing program 1 (fault-call:6 fault-nth:11): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000280)=""/165) 15:13:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) 15:13:05 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:05 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x4000, 0x12, r0, 0x0) [ 270.904685] FAULT_INJECTION: forcing a failure. [ 270.904685] name failslab, interval 1, probability 0, space 0, times 0 15:13:05 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) [ 270.969651] CPU: 1 PID: 8681 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 270.976536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.985903] Call Trace: [ 270.988509] dump_stack+0x1c4/0x2b6 [ 270.992160] ? dump_stack_print_info.cold.1+0x20/0x20 [ 270.997393] should_fail.cold.4+0xa/0x17 [ 271.001484] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.006606] ? print_usage_bug+0xc0/0xc0 [ 271.010687] ? graph_lock+0x170/0x170 [ 271.014507] ? graph_lock+0x170/0x170 15:13:05 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000001c0)=""/165) [ 271.018328] ? kernfs_activate+0x21a/0x2c0 [ 271.022599] ? find_held_lock+0x36/0x1c0 [ 271.026687] ? __lock_is_held+0xb5/0x140 [ 271.030777] ? ___might_sleep+0x1ed/0x300 [ 271.030801] ? arch_local_save_flags+0x40/0x40 [ 271.039538] ? wait_for_completion+0x8a0/0x8a0 [ 271.044165] __should_failslab+0x124/0x180 [ 271.044191] should_failslab+0x9/0x14 [ 271.052229] kmem_cache_alloc+0x2be/0x730 [ 271.056392] ? debug_smp_processor_id+0x1c/0x20 [ 271.061098] ? perf_trace_lock_acquire+0x15b/0x800 [ 271.066059] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 271.071117] __kernfs_new_node+0x127/0x8d0 [ 271.075400] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 271.080176] ? graph_lock+0x170/0x170 [ 271.083996] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 271.089576] ? kernfs_add_one+0x12b/0x4d0 [ 271.093760] ? find_held_lock+0x36/0x1c0 [ 271.097850] ? sysfs_do_create_link_sd.isra.2+0x82/0x130 [ 271.103331] ? lock_downgrade+0x900/0x900 [ 271.107518] kernfs_new_node+0x95/0x120 [ 271.111522] kernfs_create_link+0xdb/0x250 15:13:06 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000180)={0x400, 0x200, 0x200, 0x2, 0x1e66, 0x40}) 15:13:06 executing program 4: ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x40087705, &(0x7f0000000000)=""/165) [ 271.115788] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 271.121088] sysfs_create_link+0x65/0xc0 [ 271.125176] device_add+0x4ac/0x17b0 [ 271.128908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 271.133691] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 271.138824] ? netdev_register_kobject+0x17f/0x3f0 [ 271.143775] netdev_register_kobject+0x187/0x3f0 [ 271.148575] register_netdevice+0x99a/0x10f0 [ 271.148600] ? netdev_change_features+0x110/0x110 [ 271.148619] ? kasan_check_read+0x11/0x20 [ 271.148652] ? rcu_bh_qs+0xc0/0xc0 [ 271.165634] ip6_tnl_create2+0x25b/0x430 [ 271.169717] ? ip6_tnl_update+0x850/0x850 [ 271.173894] ip6_tnl_locate+0x6a4/0x9a0 [ 271.177895] ? ip6_tnl_create2+0x430/0x430 [ 271.182165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.187721] ? _copy_from_user+0xdf/0x150 [ 271.191890] ip6_tnl_ioctl+0x5cd/0xbe0 [ 271.195796] ? ip6_tnl_locate+0x9a0/0x9a0 [ 271.199965] ? rcu_bh_qs+0xc0/0xc0 [ 271.203569] ? ip6_tnl_locate+0x9a0/0x9a0 [ 271.207729] dev_ifsioc+0x41d/0xa80 [ 271.211377] ? dev_ifsioc+0x41d/0xa80 [ 271.215204] ? register_gifconf+0x70/0x70 15:13:06 executing program 4: ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x40087705, &(0x7f0000000000)=""/165) [ 271.219381] dev_ioctl+0x698/0xcc0 [ 271.222941] sock_ioctl+0x484/0x690 [ 271.226598] ? routing_ioctl+0x890/0x890 [ 271.230689] ? ___might_sleep+0x151/0x300 [ 271.234858] ? arch_local_save_flags+0x40/0x40 [ 271.239480] ? routing_ioctl+0x890/0x890 [ 271.243571] do_vfs_ioctl+0x1de/0x1720 [ 271.247482] ? ioctl_preallocate+0x300/0x300 [ 271.251919] ? selinux_file_mprotect+0x620/0x620 [ 271.256703] ? __sb_end_write+0xd9/0x110 [ 271.260783] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 271.266330] ? fput+0x130/0x1a0 [ 271.269630] ? do_syscall_64+0x9a/0x820 [ 271.273628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.279178] ? security_file_ioctl+0x94/0xc0 [ 271.279202] ksys_ioctl+0xa9/0xd0 [ 271.279224] __x64_sys_ioctl+0x73/0xb0 [ 271.279249] do_syscall_64+0x1b9/0x820 [ 271.294881] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.294905] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.294927] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.305238] ? trace_hardirqs_on_caller+0x310/0x310 [ 271.305260] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 271.305281] ? prepare_exit_to_usermode+0x291/0x3b0 [ 271.318769] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 271.320171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.320200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.343408] RIP: 0033:0x457569 [ 271.346618] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.365563] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 271.373297] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 271.380601] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 271.387895] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 271.395189] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 271.402477] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:06 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:06 executing program 1 (fault-call:6 fault-nth:12): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:06 executing program 4: ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x40087705, &(0x7f0000000000)=""/165) 15:13:06 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x44, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x802) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) ftruncate(r1, 0xd100) 15:13:06 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0xffffffffffffc, 0x12, r0, 0x0) 15:13:06 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:06 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x40087705, &(0x7f0000000000)=""/165) [ 271.659705] FAULT_INJECTION: forcing a failure. [ 271.659705] name failslab, interval 1, probability 0, space 0, times 0 [ 271.697922] CPU: 1 PID: 8726 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 271.704829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.714199] Call Trace: [ 271.716810] dump_stack+0x1c4/0x2b6 [ 271.720471] ? dump_stack_print_info.cold.1+0x20/0x20 [ 271.725711] should_fail.cold.4+0xa/0x17 [ 271.729828] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.734968] ? lock_acquire+0x1ed/0x520 [ 271.738961] ? graph_lock+0x170/0x170 [ 271.742779] ? print_usage_bug+0xc0/0xc0 [ 271.746861] ? graph_lock+0x170/0x170 [ 271.750689] ? find_held_lock+0x36/0x1c0 [ 271.754772] ? __lock_is_held+0xb5/0x140 [ 271.758884] ? ___might_sleep+0x1ed/0x300 [ 271.758905] ? arch_local_save_flags+0x40/0x40 [ 271.758926] ? mark_held_locks+0x130/0x130 [ 271.758956] __should_failslab+0x124/0x180 [ 271.767701] should_failslab+0x9/0x14 [ 271.779962] __kmalloc_track_caller+0x2d0/0x750 [ 271.784655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.790211] ? check_preemption_disabled+0x48/0x280 [ 271.795256] ? kstrdup_const+0x66/0x80 [ 271.799185] kstrdup+0x39/0x70 [ 271.802404] kstrdup_const+0x66/0x80 [ 271.806144] __kernfs_new_node+0xe8/0x8d0 [ 271.810314] ? perf_trace_lock+0x7a0/0x7a0 [ 271.814584] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 271.814605] ? graph_lock+0x170/0x170 [ 271.814631] ? __lock_is_held+0xb5/0x140 [ 271.827265] ? wait_for_completion+0x8a0/0x8a0 [ 271.831875] ? find_held_lock+0x36/0x1c0 [ 271.831906] ? sysfs_do_create_link_sd.isra.2+0x82/0x130 [ 271.831925] ? lock_downgrade+0x900/0x900 [ 271.831957] kernfs_new_node+0x95/0x120 [ 271.845651] kernfs_create_link+0xdb/0x250 [ 271.845677] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 271.859159] sysfs_create_link+0x65/0xc0 [ 271.859183] device_add+0x5d0/0x17b0 [ 271.859212] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 271.859232] ? dev_set_name+0xad/0xe0 [ 271.875933] ? device_initialize+0x5f0/0x5f0 [ 271.880381] ? rtnl_is_locked+0xb5/0xf0 [ 271.884367] ? rtnl_trylock+0x20/0x20 [ 271.888198] netdev_register_kobject+0x187/0x3f0 [ 271.893002] register_netdevice+0x99a/0x10f0 [ 271.897455] ? netdev_change_features+0x110/0x110 [ 271.902316] ? kasan_check_read+0x11/0x20 [ 271.906488] ? rcu_bh_qs+0xc0/0xc0 [ 271.910105] ip6_tnl_create2+0x25b/0x430 [ 271.914194] ? ip6_tnl_update+0x850/0x850 [ 271.918386] ip6_tnl_locate+0x6a4/0x9a0 [ 271.922383] ? ip6_tnl_create2+0x430/0x430 [ 271.926650] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.932213] ? _copy_from_user+0xdf/0x150 [ 271.936386] ip6_tnl_ioctl+0x5cd/0xbe0 [ 271.940291] ? ip6_tnl_locate+0x9a0/0x9a0 [ 271.940313] ? rcu_bh_qs+0xc0/0xc0 [ 271.940365] ? ip6_tnl_locate+0x9a0/0x9a0 [ 271.952205] dev_ifsioc+0x41d/0xa80 [ 271.955846] ? dev_ifsioc+0x41d/0xa80 [ 271.959664] ? register_gifconf+0x70/0x70 [ 271.963839] dev_ioctl+0x698/0xcc0 [ 271.967401] sock_ioctl+0x484/0x690 [ 271.971073] ? routing_ioctl+0x890/0x890 [ 271.975171] ? ___might_sleep+0x151/0x300 [ 271.979340] ? arch_local_save_flags+0x40/0x40 [ 271.983954] ? routing_ioctl+0x890/0x890 [ 271.988043] do_vfs_ioctl+0x1de/0x1720 [ 271.991959] ? ioctl_preallocate+0x300/0x300 [ 271.996393] ? selinux_file_mprotect+0x620/0x620 [ 272.001181] ? __sb_end_write+0xd9/0x110 [ 272.005269] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 272.008958] QAT: Invalid ioctl [ 272.010823] ? fput+0x130/0x1a0 [ 272.010843] ? do_syscall_64+0x9a/0x820 [ 272.010868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.010888] ? security_file_ioctl+0x94/0xc0 [ 272.010910] ksys_ioctl+0xa9/0xd0 [ 272.010933] __x64_sys_ioctl+0x73/0xb0 [ 272.038784] do_syscall_64+0x1b9/0x820 [ 272.042697] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.048081] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.053045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.053073] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.062934] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.062954] ? prepare_exit_to_usermode+0x291/0x3b0 [ 272.062980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.063009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.063038] RIP: 0033:0x457569 [ 272.070273] QAT: Invalid ioctl [ 272.073082] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:13:06 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x6b6b6b00, 0x12, r0, 0x0) 15:13:06 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x200, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14, 0x80000) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000280)={r1, r2, 0x10001, 0x3, &(0x7f00000001c0)="494d6234c676c541930ccad643403da6ade74d318c76053a9fbb39b896c1d1aad8e90314c8e1dfa590399362144790efdb6bcf02457011a0e4cb5e1500e1031a082d92bd5c8345aff4f1746a5cc2b8870d8eed21a0b886f35bc2b70fd58ff5572156a14a701366e1dc70b8a3347fe4efd8feeaa1b41172b0c81fe278470bb659b922aee5b7a6b780c046047f835e45edf4745bab9243f4428ace739c05f47ef62510dae05905ed63faedfa11abf552fa0d5e025a65bd0d23f8e1", 0x2, 0x4, 0x3, 0x7f, 0x4, 0x5, 0x9, "8bbb3ba11d21b55f1f48ca255916961611d08c11e28184943f7d13676be81ff7b2b6500990f5168e751a461f1a13acc01f6661c19123f6d8d9c0ddeb37925b4a55c26b9bca72dad588e976b6eb5b1c57563c26c876c435257a5100221cc0a84539"}) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000000)=""/165) 15:13:06 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x40087705, &(0x7f0000000000)=""/165) 15:13:07 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0xfcffffffffff0f00, 0x12, r0, 0x0) 15:13:07 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x6b6b6b00000000, 0x12, r0, 0x0) [ 272.108399] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.116129] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 272.123415] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 272.130701] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 272.137985] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 272.145281] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 272.283871] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:07 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:07 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:07 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @rand_addr}, &(0x7f0000000140)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x4fe, @local, 0x7}}, 0x1ff, 0x4, 0x1, 0x7fff, 0x42}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={r2, 0x6}, &(0x7f00000002c0)=0x8) 15:13:07 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x8000000000000000, 0x12, r0, 0x0) 15:13:07 executing program 4: openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x40087705, &(0x7f0000000000)=""/165) 15:13:07 executing program 1 (fault-call:6 fault-nth:13): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 272.819431] FAULT_INJECTION: forcing a failure. [ 272.819431] name failslab, interval 1, probability 0, space 0, times 0 [ 272.843324] CPU: 1 PID: 8777 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 272.850202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.859564] Call Trace: [ 272.859592] dump_stack+0x1c4/0x2b6 [ 272.859617] ? dump_stack_print_info.cold.1+0x20/0x20 [ 272.859656] should_fail.cold.4+0xa/0x17 [ 272.871053] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.871077] ? lock_acquire+0x1ed/0x520 [ 272.871096] ? graph_lock+0x170/0x170 [ 272.871118] ? print_usage_bug+0xc0/0xc0 [ 272.892117] ? graph_lock+0x170/0x170 [ 272.895957] ? find_held_lock+0x36/0x1c0 [ 272.900054] ? __lock_is_held+0xb5/0x140 [ 272.904157] ? ___might_sleep+0x1ed/0x300 [ 272.904183] ? arch_local_save_flags+0x40/0x40 [ 272.912917] ? mark_held_locks+0x130/0x130 [ 272.912945] __should_failslab+0x124/0x180 [ 272.912967] should_failslab+0x9/0x14 [ 272.925238] __kmalloc_track_caller+0x2d0/0x750 [ 272.929934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.935496] ? check_preemption_disabled+0x48/0x280 [ 272.940532] ? kstrdup_const+0x66/0x80 [ 272.944451] kstrdup+0x39/0x70 [ 272.947665] kstrdup_const+0x66/0x80 [ 272.951401] __kernfs_new_node+0xe8/0x8d0 [ 272.955573] ? perf_trace_lock+0x7a0/0x7a0 [ 272.959828] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 272.964603] ? graph_lock+0x170/0x170 [ 272.968425] ? __lock_is_held+0xb5/0x140 [ 272.972509] ? wait_for_completion+0x8a0/0x8a0 [ 272.977115] ? find_held_lock+0x36/0x1c0 [ 272.981212] ? sysfs_do_create_link_sd.isra.2+0x82/0x130 [ 272.986679] ? lock_downgrade+0x900/0x900 [ 272.990886] kernfs_new_node+0x95/0x120 [ 272.994887] kernfs_create_link+0xdb/0x250 [ 272.999150] sysfs_do_create_link_sd.isra.2+0x90/0x130 [ 272.999173] sysfs_create_link+0x65/0xc0 [ 272.999202] device_add+0x5d0/0x17b0 [ 273.012278] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 273.017391] ? dev_set_name+0xad/0xe0 [ 273.021207] ? device_initialize+0x5f0/0x5f0 [ 273.025636] ? rtnl_is_locked+0xb5/0xf0 [ 273.029628] ? rtnl_trylock+0x20/0x20 [ 273.033457] netdev_register_kobject+0x187/0x3f0 [ 273.038233] register_netdevice+0x99a/0x10f0 [ 273.042677] ? netdev_change_features+0x110/0x110 [ 273.047572] ? kasan_check_read+0x11/0x20 [ 273.051739] ? rcu_bh_qs+0xc0/0xc0 [ 273.055312] ip6_tnl_create2+0x25b/0x430 [ 273.059403] ? ip6_tnl_update+0x850/0x850 [ 273.059436] ip6_tnl_locate+0x6a4/0x9a0 [ 273.059460] ? ip6_tnl_create2+0x430/0x430 [ 273.071844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.077399] ? _copy_from_user+0xdf/0x150 [ 273.077426] ip6_tnl_ioctl+0x5cd/0xbe0 [ 273.077452] ? ip6_tnl_locate+0x9a0/0x9a0 [ 273.077474] ? rcu_bh_qs+0xc0/0xc0 [ 273.077526] ? ip6_tnl_locate+0x9a0/0x9a0 [ 273.097375] dev_ifsioc+0x41d/0xa80 [ 273.101018] ? dev_ifsioc+0x41d/0xa80 [ 273.104846] ? register_gifconf+0x70/0x70 [ 273.109061] dev_ioctl+0x698/0xcc0 [ 273.112695] sock_ioctl+0x484/0x690 [ 273.116345] ? routing_ioctl+0x890/0x890 [ 273.120426] ? ___might_sleep+0x151/0x300 [ 273.124599] ? arch_local_save_flags+0x40/0x40 [ 273.129223] ? routing_ioctl+0x890/0x890 [ 273.133309] do_vfs_ioctl+0x1de/0x1720 [ 273.137235] ? ioctl_preallocate+0x300/0x300 [ 273.141708] ? selinux_file_mprotect+0x620/0x620 [ 273.146491] ? __sb_end_write+0xd9/0x110 [ 273.146516] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 273.146530] ? fput+0x130/0x1a0 [ 273.146561] ? do_syscall_64+0x9a/0x820 [ 273.163448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.169040] ? security_file_ioctl+0x94/0xc0 [ 273.173487] ksys_ioctl+0xa9/0xd0 [ 273.176966] __x64_sys_ioctl+0x73/0xb0 [ 273.180878] do_syscall_64+0x1b9/0x820 [ 273.184803] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.190190] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.195134] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.200003] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.205061] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.210136] ? prepare_exit_to_usermode+0x291/0x3b0 [ 273.215179] ? trace_hardirqs_off_thunk+0x1a/0x1c 15:13:07 executing program 5: openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) 15:13:07 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1f00000000000000, 0x12, r0, 0x0) 15:13:07 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000001c0)=""/165) 15:13:08 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1000000, 0x12, r0, 0x0) 15:13:08 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) sched_getattr(r0, &(0x7f0000000140), 0x30, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000000)=""/165) 15:13:08 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x3f00, 0x12, r0, 0x0) [ 273.220058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.225263] RIP: 0033:0x457569 [ 273.228582] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.247501] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 273.255242] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 273.262523] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 273.269816] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 273.277110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 273.284403] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 273.450258] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:09 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:09 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) 15:13:09 executing program 4: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:09 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:09 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x4, 0x12, r0, 0x0) 15:13:09 executing program 1 (fault-call:6 fault-nth:14): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 274.219334] FAULT_INJECTION: forcing a failure. [ 274.219334] name failslab, interval 1, probability 0, space 0, times 0 [ 274.240944] CPU: 1 PID: 8817 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 274.247813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.257188] Call Trace: [ 274.259810] dump_stack+0x1c4/0x2b6 [ 274.263467] ? dump_stack_print_info.cold.1+0x20/0x20 [ 274.268696] should_fail.cold.4+0xa/0x17 [ 274.272792] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.277916] ? debug_smp_processor_id+0x1c/0x20 [ 274.282615] ? perf_trace_lock_acquire+0x15b/0x800 [ 274.287566] ? unwind_dump+0x190/0x190 [ 274.291475] ? graph_lock+0x170/0x170 [ 274.295289] ? graph_lock+0x170/0x170 [ 274.299108] ? graph_lock+0x170/0x170 [ 274.302979] ? find_held_lock+0x36/0x1c0 [ 274.307072] ? __lock_is_held+0xb5/0x140 [ 274.311199] ? ___might_sleep+0x1ed/0x300 [ 274.315379] ? arch_local_save_flags+0x40/0x40 [ 274.320053] __should_failslab+0x124/0x180 [ 274.324330] should_failslab+0x9/0x14 [ 274.328165] kmem_cache_alloc+0x2be/0x730 [ 274.332333] ? ___ratelimit.cold.2+0x6b/0x6b [ 274.336763] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 274.341805] __kernfs_new_node+0x127/0x8d0 [ 274.346068] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 274.350842] ? kernfs_activate+0x21a/0x2c0 [ 274.355094] ? lock_downgrade+0x900/0x900 [ 274.359260] ? find_held_lock+0x36/0x1c0 [ 274.363344] ? lock_downgrade+0x900/0x900 15:13:09 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x3, 0x12, r0, 0x0) 15:13:09 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8000, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000240)=""/165) r1 = open(&(0x7f0000000100)='./file0\x00', 0x84000, 0x41) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000140)={0x4}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6c00) [ 274.367549] ? do_raw_spin_lock+0xc1/0x230 [ 274.371821] ? kasan_check_write+0x14/0x20 [ 274.376077] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 274.381053] ? __kernfs_new_node+0x697/0x8d0 [ 274.385498] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 274.390534] ? map_id_range_down+0x1ee/0x430 [ 274.394969] ? __put_user_ns+0x60/0x60 [ 274.398878] kernfs_new_node+0x95/0x120 [ 274.402898] __kernfs_create_file+0x5a/0x340 [ 274.407338] sysfs_add_file_mode_ns+0x222/0x530 [ 274.412051] internal_create_group+0x3df/0xd80 15:13:09 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 274.416675] ? remove_files.isra.1+0x190/0x190 [ 274.421280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.426838] ? kernfs_create_link+0x1d4/0x250 [ 274.431365] sysfs_create_groups+0x9b/0x141 [ 274.435709] device_add+0x67e/0x17b0 [ 274.439977] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 274.445093] ? dev_set_name+0xad/0xe0 [ 274.448910] ? device_initialize+0x5f0/0x5f0 [ 274.453345] ? rtnl_is_locked+0xb5/0xf0 [ 274.453362] ? rtnl_trylock+0x20/0x20 [ 274.453391] netdev_register_kobject+0x187/0x3f0 [ 274.461261] register_netdevice+0x99a/0x10f0 15:13:09 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 274.461288] ? netdev_change_features+0x110/0x110 [ 274.461306] ? kasan_check_read+0x11/0x20 [ 274.461329] ? rcu_bh_qs+0xc0/0xc0 [ 274.483059] ip6_tnl_create2+0x25b/0x430 [ 274.487154] ? ip6_tnl_update+0x850/0x850 [ 274.491342] ip6_tnl_locate+0x6a4/0x9a0 [ 274.495342] ? ip6_tnl_create2+0x430/0x430 [ 274.499615] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 274.505170] ? _copy_from_user+0xdf/0x150 [ 274.509342] ip6_tnl_ioctl+0x5cd/0xbe0 [ 274.513255] ? ip6_tnl_locate+0x9a0/0x9a0 [ 274.517423] ? rcu_bh_qs+0xc0/0xc0 15:13:09 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 274.521040] ? ip6_tnl_locate+0x9a0/0x9a0 [ 274.525230] dev_ifsioc+0x41d/0xa80 [ 274.528912] ? dev_ifsioc+0x41d/0xa80 [ 274.532745] ? register_gifconf+0x70/0x70 [ 274.536931] dev_ioctl+0x698/0xcc0 [ 274.540507] sock_ioctl+0x484/0x690 [ 274.544163] ? routing_ioctl+0x890/0x890 [ 274.548240] ? ___might_sleep+0x151/0x300 [ 274.552416] ? arch_local_save_flags+0x40/0x40 [ 274.557045] ? routing_ioctl+0x890/0x890 [ 274.561135] do_vfs_ioctl+0x1de/0x1720 [ 274.565059] ? ioctl_preallocate+0x300/0x300 15:13:09 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000380)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="6400edff0b64e98f29d0fbc52380c4c3cfcf5161db329cfe937fb46c1dc9273741827d7d5870c9e1153e554cdd5402d492c26df1ce26391101aebcf61cbf52b1221c377b7d874fa965728aac409dc8a240483d79d124c45e1199e32b48df85f4f2ec7514b11c99767eb9ec4fc02ad89a426bfe5e5bb74b7904825dcf89ab05d3bcb7570ecc15583351f31af42e159a52c1e8a411a5738566f2dbb7dc085d7eee81cd34a26d011e192c1153d9331ccd947a043cc6a20562f257f2d81883bb5a20eb28d58e4dbbdf", @ANYRES16=r2, @ANYBLOB="000427bd7000fbdbdf25010000000400050008000400010000000800020000000000080001004e240000080003002b000000080001004e230000080001004e240000080003005f00000008000200020000000800020002000000"], 0x60}, 0x1, 0x0, 0x0, 0x40}, 0x40000) [ 274.569497] ? selinux_file_mprotect+0x620/0x620 [ 274.574275] ? __sb_end_write+0xd9/0x110 [ 274.578356] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 274.583903] ? fput+0x130/0x1a0 [ 274.587201] ? do_syscall_64+0x9a/0x820 [ 274.591201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.596757] ? security_file_ioctl+0x94/0xc0 [ 274.601195] ksys_ioctl+0xa9/0xd0 [ 274.604673] __x64_sys_ioctl+0x73/0xb0 [ 274.608591] do_syscall_64+0x1b9/0x820 [ 274.612505] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 274.617921] ? syscall_return_slowpath+0x5e0/0x5e0 [ 274.622870] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.627732] ? trace_hardirqs_on_caller+0x310/0x310 [ 274.632797] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 274.637833] ? prepare_exit_to_usermode+0x291/0x3b0 [ 274.642881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.647757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.652956] RIP: 0033:0x457569 [ 274.656179] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.675117] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.682854] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 274.690140] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 274.697426] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 274.698445] overlayfs: failed to resolve './file1': -2 [ 274.704717] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 274.704730] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 274.789098] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 275.035694] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:10 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:10 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x100000000000000, 0x12, r0, 0x0) 15:13:10 executing program 1 (fault-call:6 fault-nth:15): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:10 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x7f}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x8000, 0x0, 0xfffffffffffffffb, 0x10001, 0x7}, 0x14) 15:13:10 executing program 3 (fault-call:6 fault-nth:0): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:10 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) [ 275.142645] FAULT_INJECTION: forcing a failure. [ 275.142645] name failslab, interval 1, probability 0, space 0, times 0 [ 275.155388] CPU: 0 PID: 8872 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 275.162273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.171647] Call Trace: [ 275.174258] dump_stack+0x1c4/0x2b6 [ 275.177919] ? dump_stack_print_info.cold.1+0x20/0x20 [ 275.183138] should_fail.cold.4+0xa/0x17 [ 275.187215] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.192329] ? debug_smp_processor_id+0x1c/0x20 [ 275.197006] ? perf_trace_lock_acquire+0x15b/0x800 [ 275.201973] ? unwind_dump+0x190/0x190 [ 275.205897] ? graph_lock+0x170/0x170 [ 275.209699] ? graph_lock+0x170/0x170 [ 275.213508] ? graph_lock+0x170/0x170 [ 275.217326] ? find_held_lock+0x36/0x1c0 [ 275.221423] ? __lock_is_held+0xb5/0x140 [ 275.225507] ? ___might_sleep+0x1ed/0x300 [ 275.229663] ? arch_local_save_flags+0x40/0x40 [ 275.234279] __should_failslab+0x124/0x180 [ 275.238528] should_failslab+0x9/0x14 [ 275.242341] kmem_cache_alloc+0x2be/0x730 [ 275.246500] ? ___ratelimit.cold.2+0x6b/0x6b [ 275.250939] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 275.255970] __kernfs_new_node+0x127/0x8d0 [ 275.260233] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 275.264994] ? kernfs_activate+0x21a/0x2c0 [ 275.269248] ? lock_downgrade+0x900/0x900 [ 275.273406] ? find_held_lock+0x36/0x1c0 [ 275.277485] ? lock_downgrade+0x900/0x900 [ 275.281638] ? do_raw_spin_lock+0xc1/0x230 [ 275.285890] ? kasan_check_write+0x14/0x20 [ 275.290139] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 275.295083] ? __kernfs_new_node+0x697/0x8d0 [ 275.299503] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 275.304526] ? map_id_range_down+0x1ee/0x430 [ 275.308945] ? __put_user_ns+0x60/0x60 [ 275.312850] kernfs_new_node+0x95/0x120 [ 275.316841] __kernfs_create_file+0x5a/0x340 [ 275.321266] sysfs_add_file_mode_ns+0x222/0x530 [ 275.325958] internal_create_group+0x3df/0xd80 [ 275.330566] ? remove_files.isra.1+0x190/0x190 [ 275.335678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.341228] ? kernfs_create_link+0x1d4/0x250 [ 275.345745] sysfs_create_groups+0x9b/0x141 [ 275.350105] device_add+0x67e/0x17b0 [ 275.353838] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 275.358965] ? dev_set_name+0xad/0xe0 [ 275.362793] ? device_initialize+0x5f0/0x5f0 [ 275.367213] ? rtnl_is_locked+0xb5/0xf0 [ 275.371192] ? rtnl_trylock+0x20/0x20 [ 275.375013] netdev_register_kobject+0x187/0x3f0 [ 275.379794] register_netdevice+0x99a/0x10f0 [ 275.384225] ? netdev_change_features+0x110/0x110 [ 275.389128] ? kasan_check_read+0x11/0x20 [ 275.393306] ? rcu_bh_qs+0xc0/0xc0 [ 275.396878] ip6_tnl_create2+0x25b/0x430 [ 275.400952] ? ip6_tnl_update+0x850/0x850 [ 275.405143] ip6_tnl_locate+0x6a4/0x9a0 [ 275.409131] ? ip6_tnl_create2+0x430/0x430 [ 275.413385] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.418941] ? _copy_from_user+0xdf/0x150 [ 275.423217] ip6_tnl_ioctl+0x5cd/0xbe0 [ 275.427121] ? ip6_tnl_locate+0x9a0/0x9a0 [ 275.431279] ? rcu_bh_qs+0xc0/0xc0 [ 275.434866] ? ip6_tnl_locate+0x9a0/0x9a0 [ 275.439019] dev_ifsioc+0x41d/0xa80 [ 275.442676] ? dev_ifsioc+0x41d/0xa80 [ 275.446483] ? register_gifconf+0x70/0x70 [ 275.450652] dev_ioctl+0x698/0xcc0 [ 275.454207] sock_ioctl+0x484/0x690 [ 275.457846] ? routing_ioctl+0x890/0x890 [ 275.461916] ? ___might_sleep+0x151/0x300 [ 275.466080] ? arch_local_save_flags+0x40/0x40 [ 275.470691] ? routing_ioctl+0x890/0x890 [ 275.474774] do_vfs_ioctl+0x1de/0x1720 [ 275.478689] ? ioctl_preallocate+0x300/0x300 [ 275.483108] ? selinux_file_mprotect+0x620/0x620 [ 275.487878] ? __sb_end_write+0xd9/0x110 [ 275.491952] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 275.497494] ? fput+0x130/0x1a0 [ 275.500787] ? do_syscall_64+0x9a/0x820 [ 275.504775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.510336] ? security_file_ioctl+0x94/0xc0 [ 275.514767] ksys_ioctl+0xa9/0xd0 [ 275.518234] __x64_sys_ioctl+0x73/0xb0 [ 275.522132] do_syscall_64+0x1b9/0x820 [ 275.526045] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.531436] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.536371] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.541226] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.546251] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 275.551287] ? prepare_exit_to_usermode+0x291/0x3b0 [ 275.556317] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.561181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.566375] RIP: 0033:0x457569 [ 275.569591] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:13:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) [ 275.588507] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 275.596232] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 275.603507] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 275.610787] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 275.618081] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 275.625359] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:10 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1e000000, 0x12, r0, 0x0) 15:13:10 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x41007701, &(0x7f0000000000)=""/165) 15:13:10 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/165) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000240)={@local, @loopback}, &(0x7f0000000280)=0xc) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f00000001c0)=""/87) getsockopt$inet_dccp_int(r1, 0x21, 0xe, &(0x7f0000000040), &(0x7f0000000080)=0x4) 15:13:10 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x2) [ 275.860091] FAULT_INJECTION: forcing a failure. [ 275.860091] name failslab, interval 1, probability 0, space 0, times 0 [ 275.926652] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 275.928218] CPU: 0 PID: 8874 Comm: syz-executor3 Not tainted 4.19.0+ #78 [ 275.941551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.950946] Call Trace: [ 275.953570] dump_stack+0x1c4/0x2b6 [ 275.957224] ? dump_stack_print_info.cold.1+0x20/0x20 [ 275.962464] should_fail.cold.4+0xa/0x17 [ 275.966556] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.971681] ? mark_held_locks+0x130/0x130 [ 275.975927] ? print_usage_bug+0xc0/0xc0 [ 275.980007] ? find_held_lock+0x36/0x1c0 [ 275.984099] ? graph_lock+0x170/0x170 [ 275.987928] ? graph_lock+0x170/0x170 [ 275.991744] ? print_usage_bug+0xc0/0xc0 [ 275.995820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.001368] ? check_preemption_disabled+0x48/0x280 [ 276.006400] ? find_held_lock+0x36/0x1c0 [ 276.010490] ? __lock_is_held+0xb5/0x140 [ 276.014589] ? ___might_sleep+0x1ed/0x300 [ 276.018761] ? arch_local_save_flags+0x40/0x40 [ 276.023356] __should_failslab+0x124/0x180 [ 276.027599] should_failslab+0x9/0x14 [ 276.031391] kmem_cache_alloc_node_trace+0x270/0x740 [ 276.036519] __kmalloc_node+0x33/0x70 [ 276.040353] kvmalloc_node+0x65/0xf0 [ 276.044090] alloc_netdev_mqs+0x17b/0xfe0 [ 276.048236] ? ip6_tnl_link_config+0xac0/0xac0 [ 276.052811] ? free_netdev+0x440/0x440 [ 276.056692] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 276.062221] ? format_decode+0x1b2/0xaf0 [ 276.066294] ? set_precision+0xe0/0xe0 [ 276.070176] ? perf_trace_lock+0x7a0/0x7a0 [ 276.074415] ? memcpy+0x45/0x50 [ 276.077702] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.083229] ? vsnprintf+0x20d/0x1b60 [ 276.087024] ? pointer+0x990/0x990 [ 276.090578] ? ip6_tnl_locate+0x206/0x9a0 [ 276.094720] ? lock_downgrade+0x900/0x900 [ 276.098859] ? check_preemption_disabled+0x48/0x280 [ 276.103898] ? sprintf+0xb0/0xe0 [ 276.107254] ? scnprintf+0x130/0x130 [ 276.110955] ? __lock_is_held+0xb5/0x140 [ 276.115050] ip6_tnl_locate+0x502/0x9a0 [ 276.119047] ? ip6_tnl_create2+0x430/0x430 [ 276.123290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.128820] ? _copy_from_user+0xdf/0x150 [ 276.132981] ip6_tnl_ioctl+0x5cd/0xbe0 [ 276.136879] ? ip6_tnl_locate+0x9a0/0x9a0 [ 276.141043] ? rcu_bh_qs+0xc0/0xc0 [ 276.144619] ? ip6_tnl_locate+0x9a0/0x9a0 [ 276.148770] dev_ifsioc+0x41d/0xa80 [ 276.152398] ? dev_ifsioc+0x41d/0xa80 [ 276.156192] ? register_gifconf+0x70/0x70 [ 276.160345] dev_ioctl+0x698/0xcc0 [ 276.163933] sock_ioctl+0x484/0x690 [ 276.167562] ? routing_ioctl+0x890/0x890 [ 276.171637] ? ___might_sleep+0x151/0x300 [ 276.175788] ? arch_local_save_flags+0x40/0x40 [ 276.180382] ? routing_ioctl+0x890/0x890 [ 276.184444] do_vfs_ioctl+0x1de/0x1720 [ 276.188363] ? ioctl_preallocate+0x300/0x300 [ 276.192767] ? selinux_file_mprotect+0x620/0x620 [ 276.197520] ? __sb_end_write+0xd9/0x110 [ 276.201619] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 276.207159] ? fput+0x130/0x1a0 [ 276.210445] ? do_syscall_64+0x9a/0x820 [ 276.214412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.219967] ? security_file_ioctl+0x94/0xc0 [ 276.224395] ksys_ioctl+0xa9/0xd0 [ 276.227857] __x64_sys_ioctl+0x73/0xb0 [ 276.231735] do_syscall_64+0x1b9/0x820 [ 276.235628] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.241020] ? syscall_return_slowpath+0x5e0/0x5e0 [ 276.245960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.250796] ? trace_hardirqs_on_caller+0x310/0x310 [ 276.255809] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 276.260838] ? prepare_exit_to_usermode+0x291/0x3b0 [ 276.265849] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.270688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.275868] RIP: 0033:0x457569 [ 276.279079] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.298021] RSP: 002b:00007f30e21d3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 276.305769] RAX: ffffffffffffffda RBX: 00007f30e21d3c90 RCX: 0000000000457569 [ 276.313039] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 276.320301] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 15:13:11 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1e00000000000000) [ 276.327579] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f30e21d46d4 [ 276.334861] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:11 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:11 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@mcast1, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', r0, r1) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) 15:13:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x7704, &(0x7f0000000000)=""/165) 15:13:11 executing program 1 (fault-call:6 fault-nth:16): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:11 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:11 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x2000000) 15:13:11 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40049409, &(0x7f0000000000)=""/165) [ 276.567803] FAULT_INJECTION: forcing a failure. [ 276.567803] name failslab, interval 1, probability 0, space 0, times 0 15:13:11 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x6b6b6b) [ 276.644519] CPU: 1 PID: 8920 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 276.651454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.660821] Call Trace: [ 276.663432] dump_stack+0x1c4/0x2b6 [ 276.667090] ? dump_stack_print_info.cold.1+0x20/0x20 [ 276.672322] should_fail.cold.4+0xa/0x17 [ 276.676414] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.681540] ? lock_release+0x970/0x970 [ 276.685581] ? arch_local_save_flags+0x40/0x40 [ 276.690179] ? graph_lock+0x170/0x170 [ 276.694000] ? graph_lock+0x170/0x170 [ 276.697844] ? find_held_lock+0x36/0x1c0 [ 276.701932] ? __lock_is_held+0xb5/0x140 [ 276.706026] ? ___might_sleep+0x1ed/0x300 [ 276.710208] ? arch_local_save_flags+0x40/0x40 [ 276.714808] ? kernfs_activate+0x21a/0x2c0 [ 276.719090] __should_failslab+0x124/0x180 [ 276.723354] should_failslab+0x9/0x14 [ 276.727177] kmem_cache_alloc+0x2be/0x730 [ 276.731342] ? lock_downgrade+0x900/0x900 [ 276.735508] ? do_raw_spin_lock+0xc1/0x230 [ 276.739766] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 276.744806] __kernfs_new_node+0x127/0x8d0 [ 276.749086] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 276.753877] ? graph_lock+0x170/0x170 [ 276.757707] ? __lock_is_held+0xb5/0x140 [ 276.761784] ? wait_for_completion+0x8a0/0x8a0 [ 276.766422] ? mutex_unlock+0xd/0x10 [ 276.770180] ? kernfs_activate+0x21a/0x2c0 [ 276.774431] ? kernfs_walk_and_get_ns+0x340/0x340 [ 276.779310] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 276.781422] overlayfs: failed to resolve './file1': -2 [ 276.784865] ? kernfs_link_sibling+0x1d2/0x3b0 [ 276.784892] kernfs_new_node+0x95/0x120 [ 276.784916] __kernfs_create_file+0x5a/0x340 [ 276.784939] sysfs_add_file_mode_ns+0x222/0x530 [ 276.807876] internal_create_group+0x3df/0xd80 [ 276.812499] ? remove_files.isra.1+0x190/0x190 [ 276.817127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.822682] ? kernfs_create_link+0x1d4/0x250 [ 276.827203] sysfs_create_groups+0x9b/0x141 [ 276.827229] device_add+0x67e/0x17b0 [ 276.827258] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 276.827274] ? dev_set_name+0xad/0xe0 [ 276.827291] ? device_initialize+0x5f0/0x5f0 [ 276.827311] ? rtnl_is_locked+0xb5/0xf0 [ 276.835350] ? rtnl_trylock+0x20/0x20 [ 276.835382] netdev_register_kobject+0x187/0x3f0 [ 276.835406] register_netdevice+0x99a/0x10f0 [ 276.835434] ? netdev_change_features+0x110/0x110 [ 276.861331] ? kasan_check_read+0x11/0x20 [ 276.861355] ? rcu_bh_qs+0xc0/0xc0 [ 276.861390] ip6_tnl_create2+0x25b/0x430 [ 276.861411] ? ip6_tnl_update+0x850/0x850 [ 276.861444] ip6_tnl_locate+0x6a4/0x9a0 [ 276.861469] ? ip6_tnl_create2+0x430/0x430 [ 276.861501] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.861531] ? _copy_from_user+0xdf/0x150 [ 276.861561] ip6_tnl_ioctl+0x5cd/0xbe0 [ 276.861586] ? ip6_tnl_locate+0x9a0/0x9a0 [ 276.861607] ? rcu_bh_qs+0xc0/0xc0 [ 276.870933] ? ip6_tnl_locate+0x9a0/0x9a0 [ 276.870950] dev_ifsioc+0x41d/0xa80 [ 276.870964] ? dev_ifsioc+0x41d/0xa80 [ 276.870982] ? register_gifconf+0x70/0x70 [ 276.871011] dev_ioctl+0x698/0xcc0 [ 276.871044] sock_ioctl+0x484/0x690 [ 276.871063] ? routing_ioctl+0x890/0x890 [ 276.871082] ? ___might_sleep+0x151/0x300 [ 276.871102] ? arch_local_save_flags+0x40/0x40 [ 276.871132] ? routing_ioctl+0x890/0x890 [ 276.914175] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 276.916461] do_vfs_ioctl+0x1de/0x1720 [ 276.916500] ? ioctl_preallocate+0x300/0x300 [ 276.916529] ? selinux_file_mprotect+0x620/0x620 [ 276.956273] ? __sb_end_write+0xd9/0x110 [ 276.977273] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 276.977288] ? fput+0x130/0x1a0 [ 276.977308] ? do_syscall_64+0x9a/0x820 15:13:11 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x10441, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000100)={0x2, 0x3, [{0x1, 0x0, 0x9}, {0x6, 0x0, 0x5}]}) 15:13:11 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x4) 15:13:11 executing program 5: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$RTC_WIE_ON(r0, 0x700f) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) [ 276.977332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.977350] ? security_file_ioctl+0x94/0xc0 [ 276.977373] ksys_ioctl+0xa9/0xd0 [ 277.007639] __x64_sys_ioctl+0x73/0xb0 [ 277.011552] do_syscall_64+0x1b9/0x820 [ 277.015472] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.020856] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.025820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.030683] ? trace_hardirqs_on_caller+0x310/0x310 [ 277.035743] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.040783] ? prepare_exit_to_usermode+0x291/0x3b0 [ 277.045829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.050703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.055901] RIP: 0033:0x457569 [ 277.059112] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.078038] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 277.085762] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 15:13:12 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1e) [ 277.093043] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 277.100327] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 277.107605] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 277.114883] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:12 executing program 1 (fault-call:6 fault-nth:17): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:12 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1f000000) 15:13:12 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8929, &(0x7f0000000080)='ip6tnl0\x00') 15:13:12 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x400, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000001c0)={0x9, 0x15}) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x101, 0x42) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000140)={0xfffffffffffffeff, 0x7}) 15:13:12 executing program 0: shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:12 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0xc0045878, &(0x7f0000000000)=""/165) [ 277.403774] FAULT_INJECTION: forcing a failure. [ 277.403774] name failslab, interval 1, probability 0, space 0, times 0 [ 277.419658] CPU: 0 PID: 8974 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 277.426518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.426529] Call Trace: [ 277.438511] dump_stack+0x1c4/0x2b6 [ 277.442160] ? dump_stack_print_info.cold.1+0x20/0x20 [ 277.447380] should_fail.cold.4+0xa/0x17 [ 277.451462] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.456586] ? lock_release+0x970/0x970 [ 277.460579] ? arch_local_save_flags+0x40/0x40 [ 277.465175] ? graph_lock+0x170/0x170 [ 277.468994] ? graph_lock+0x170/0x170 [ 277.472833] ? find_held_lock+0x36/0x1c0 [ 277.476910] ? __lock_is_held+0xb5/0x140 [ 277.481015] ? ___might_sleep+0x1ed/0x300 [ 277.485199] ? arch_local_save_flags+0x40/0x40 [ 277.489852] ? kernfs_activate+0x21a/0x2c0 [ 277.494119] __should_failslab+0x124/0x180 [ 277.494145] should_failslab+0x9/0x14 [ 277.502190] kmem_cache_alloc+0x2be/0x730 [ 277.506355] ? lock_downgrade+0x900/0x900 [ 277.510523] ? do_raw_spin_lock+0xc1/0x230 [ 277.514816] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 277.519849] __kernfs_new_node+0x127/0x8d0 [ 277.524110] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 277.528885] ? graph_lock+0x170/0x170 [ 277.532718] ? __lock_is_held+0xb5/0x140 [ 277.536806] ? wait_for_completion+0x8a0/0x8a0 [ 277.541429] ? mutex_unlock+0xd/0x10 [ 277.545164] ? kernfs_activate+0x21a/0x2c0 [ 277.549417] ? kernfs_walk_and_get_ns+0x340/0x340 [ 277.554282] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 277.559835] ? kernfs_link_sibling+0x1d2/0x3b0 [ 277.559860] kernfs_new_node+0x95/0x120 [ 277.559883] __kernfs_create_file+0x5a/0x340 [ 277.559913] sysfs_add_file_mode_ns+0x222/0x530 [ 277.572893] internal_create_group+0x3df/0xd80 [ 277.582163] ? remove_files.isra.1+0x190/0x190 [ 277.586783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.592361] ? kernfs_create_link+0x1d4/0x250 [ 277.597087] sysfs_create_groups+0x9b/0x141 [ 277.601438] device_add+0x67e/0x17b0 [ 277.605178] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 277.610296] ? dev_set_name+0xad/0xe0 [ 277.614111] ? device_initialize+0x5f0/0x5f0 [ 277.618550] ? rtnl_is_locked+0xb5/0xf0 [ 277.622544] ? rtnl_trylock+0x20/0x20 [ 277.626389] netdev_register_kobject+0x187/0x3f0 [ 277.631956] register_netdevice+0x99a/0x10f0 [ 277.636395] ? netdev_change_features+0x110/0x110 [ 277.641254] ? kasan_check_read+0x11/0x20 [ 277.645865] ? rcu_bh_qs+0xc0/0xc0 [ 277.649438] ip6_tnl_create2+0x25b/0x430 15:13:12 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1f00) 15:13:12 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x5452, &(0x7f0000000000)=""/165) [ 277.653517] ? ip6_tnl_update+0x850/0x850 [ 277.657694] ip6_tnl_locate+0x6a4/0x9a0 [ 277.661694] ? ip6_tnl_create2+0x430/0x430 [ 277.665959] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.671508] ? _copy_from_user+0xdf/0x150 [ 277.675683] ip6_tnl_ioctl+0x5cd/0xbe0 [ 277.679599] ? ip6_tnl_locate+0x9a0/0x9a0 [ 277.681098] overlayfs: failed to resolve './file1': -2 [ 277.683780] ? rcu_bh_qs+0xc0/0xc0 [ 277.692682] ? ip6_tnl_locate+0x9a0/0x9a0 [ 277.696874] dev_ifsioc+0x41d/0xa80 [ 277.700527] ? dev_ifsioc+0x41d/0xa80 15:13:12 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1e00) [ 277.704355] ? register_gifconf+0x70/0x70 [ 277.708532] dev_ioctl+0x698/0xcc0 [ 277.712097] sock_ioctl+0x484/0x690 [ 277.715782] ? routing_ioctl+0x890/0x890 [ 277.719855] ? ___might_sleep+0x151/0x300 [ 277.719874] ? arch_local_save_flags+0x40/0x40 [ 277.719917] ? routing_ioctl+0x890/0x890 [ 277.719937] do_vfs_ioctl+0x1de/0x1720 [ 277.732740] ? ioctl_preallocate+0x300/0x300 [ 277.741080] ? selinux_file_mprotect+0x620/0x620 [ 277.745868] ? __sb_end_write+0xd9/0x110 [ 277.749966] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 277.755520] ? fput+0x130/0x1a0 [ 277.758821] ? do_syscall_64+0x9a/0x820 [ 277.762823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.768407] ? security_file_ioctl+0x94/0xc0 [ 277.772848] ksys_ioctl+0xa9/0xd0 [ 277.776326] __x64_sys_ioctl+0x73/0xb0 [ 277.780238] do_syscall_64+0x1b9/0x820 [ 277.784148] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.789534] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.794491] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.799392] ? trace_hardirqs_on_caller+0x310/0x310 [ 277.804435] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.809470] ? prepare_exit_to_usermode+0x291/0x3b0 [ 277.814511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.814542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.814557] RIP: 0033:0x457569 [ 277.814575] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.814586] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:12 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000240)=@get={0x1, &(0x7f00000001c0)=""/102, 0x417}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000000)=""/165) r2 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x6, 0x200000) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) 15:13:12 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)='ip6tnl0\x00') 15:13:12 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x5421, &(0x7f0000000000)=""/165) [ 277.814605] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 277.814615] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 277.814625] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 277.814636] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 277.814646] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 277.941184] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:13 executing program 1 (fault-call:6 fault-nth:18): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:13 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x640a02, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) fcntl$dupfd(r0, 0x406, r0) 15:13:13 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0xffffffffffffc) 15:13:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x4020940d, &(0x7f0000000000)=""/165) 15:13:13 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x28101, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) mq_unlink(&(0x7f00000004c0)='\'#') mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x1208000, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@loose='loose'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@access_uid={'access', 0x3d, r2}}, {@uname={'uname', 0x3d, '\'#'}}, {@cachetag={'cachetag', 0x3d, '/dev/ashmem\x00'}}, {@access_any='access=any'}], [{@subj_user={'subj_user', 0x3d, '/dev/ashmem\x00'}}, {@uid_lt={'uid<', r3}}]}}) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000500)) 15:13:13 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8971, &(0x7f0000000080)='ip6tnl0\x00') 15:13:13 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x400000000000000) 15:13:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x4b47, &(0x7f0000000000)=""/165) 15:13:13 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 278.224384] FAULT_INJECTION: forcing a failure. [ 278.224384] name failslab, interval 1, probability 0, space 0, times 0 [ 278.256617] CPU: 0 PID: 9018 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 278.263500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.272865] Call Trace: [ 278.275478] dump_stack+0x1c4/0x2b6 [ 278.279139] ? dump_stack_print_info.cold.1+0x20/0x20 [ 278.284403] should_fail.cold.4+0xa/0x17 [ 278.288519] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.293640] ? lock_release+0x970/0x970 [ 278.297641] ? arch_local_save_flags+0x40/0x40 [ 278.302249] ? graph_lock+0x170/0x170 [ 278.306086] ? graph_lock+0x170/0x170 [ 278.309920] ? find_held_lock+0x36/0x1c0 [ 278.314006] ? __lock_is_held+0xb5/0x140 [ 278.318118] ? ___might_sleep+0x1ed/0x300 [ 278.322291] ? arch_local_save_flags+0x40/0x40 [ 278.326889] ? kernfs_activate+0x21a/0x2c0 [ 278.331153] __should_failslab+0x124/0x180 [ 278.335412] should_failslab+0x9/0x14 [ 278.339236] kmem_cache_alloc+0x2be/0x730 [ 278.343405] ? lock_downgrade+0x900/0x900 [ 278.347584] ? do_raw_spin_lock+0xc1/0x230 [ 278.351879] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 278.356923] __kernfs_new_node+0x127/0x8d0 [ 278.361187] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 278.365965] ? graph_lock+0x170/0x170 [ 278.369820] ? __lock_is_held+0xb5/0x140 [ 278.373937] ? wait_for_completion+0x8a0/0x8a0 [ 278.378559] ? mutex_unlock+0xd/0x10 [ 278.382293] ? kernfs_activate+0x21a/0x2c0 [ 278.386549] ? kernfs_walk_and_get_ns+0x340/0x340 [ 278.391414] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 278.396967] ? kernfs_link_sibling+0x1d2/0x3b0 [ 278.401575] kernfs_new_node+0x95/0x120 [ 278.405582] __kernfs_create_file+0x5a/0x340 [ 278.410018] sysfs_add_file_mode_ns+0x222/0x530 [ 278.414743] internal_create_group+0x3df/0xd80 [ 278.419360] ? remove_files.isra.1+0x190/0x190 [ 278.423994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.429565] ? kernfs_create_link+0x1d4/0x250 [ 278.434100] sysfs_create_groups+0x9b/0x141 [ 278.438642] device_add+0x67e/0x17b0 [ 278.442393] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 278.448497] ? dev_set_name+0xad/0xe0 [ 278.452316] ? device_initialize+0x5f0/0x5f0 [ 278.456748] ? rtnl_is_locked+0xb5/0xf0 [ 278.460761] ? rtnl_trylock+0x20/0x20 [ 278.464617] netdev_register_kobject+0x187/0x3f0 [ 278.464653] register_netdevice+0x99a/0x10f0 [ 278.473842] ? netdev_change_features+0x110/0x110 [ 278.473860] ? kasan_check_read+0x11/0x20 [ 278.473884] ? rcu_bh_qs+0xc0/0xc0 [ 278.473918] ip6_tnl_create2+0x25b/0x430 [ 278.473937] ? ip6_tnl_update+0x850/0x850 [ 278.473968] ip6_tnl_locate+0x6a4/0x9a0 [ 278.473991] ? ip6_tnl_create2+0x430/0x430 [ 278.474044] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 278.508492] ? _copy_from_user+0xdf/0x150 [ 278.512661] ip6_tnl_ioctl+0x5cd/0xbe0 [ 278.516576] ? ip6_tnl_locate+0x9a0/0x9a0 [ 278.520741] ? rcu_bh_qs+0xc0/0xc0 [ 278.522489] overlayfs: failed to resolve './file1': -2 [ 278.524338] ? ip6_tnl_locate+0x9a0/0x9a0 [ 278.524358] dev_ifsioc+0x41d/0xa80 [ 278.537412] ? dev_ifsioc+0x41d/0xa80 [ 278.541233] ? register_gifconf+0x70/0x70 [ 278.545438] dev_ioctl+0x698/0xcc0 [ 278.549007] sock_ioctl+0x484/0x690 [ 278.552666] ? routing_ioctl+0x890/0x890 [ 278.556147] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 278.556756] ? ___might_sleep+0x151/0x300 [ 278.556777] ? arch_local_save_flags+0x40/0x40 [ 278.556808] ? routing_ioctl+0x890/0x890 [ 278.577555] do_vfs_ioctl+0x1de/0x1720 [ 278.581472] ? ioctl_preallocate+0x300/0x300 [ 278.585902] ? selinux_file_mprotect+0x620/0x620 [ 278.590679] ? __sb_end_write+0xd9/0x110 [ 278.594758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 278.600305] ? fput+0x130/0x1a0 [ 278.603606] ? do_syscall_64+0x9a/0x820 [ 278.607604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.613159] ? security_file_ioctl+0x94/0xc0 [ 278.617589] ksys_ioctl+0xa9/0xd0 [ 278.621081] __x64_sys_ioctl+0x73/0xb0 [ 278.624991] do_syscall_64+0x1b9/0x820 [ 278.628908] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.634293] ? syscall_return_slowpath+0x5e0/0x5e0 [ 278.639236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.644103] ? trace_hardirqs_on_caller+0x310/0x310 [ 278.649141] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 278.654199] ? prepare_exit_to_usermode+0x291/0x3b0 [ 278.659247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.664139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.669347] RIP: 0033:0x457569 15:13:13 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000100), 0x80800) getsockopt$inet_dccp_int(r1, 0x21, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 278.672556] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.691469] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 278.699192] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 278.706466] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 278.706481] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 15:13:13 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x3f000000) 15:13:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x770a, &(0x7f0000000000)=""/165) [ 278.721357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 278.728636] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:13 executing program 1 (fault-call:6 fault-nth:19): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x5460, &(0x7f0000000000)=""/165) 15:13:13 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x3f00) 15:13:13 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='ip6tnl0\x00') 15:13:13 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x4000, 0x0) write$P9_RWSTAT(r0, &(0x7f00000001c0)={0x7, 0x7f, 0x2}, 0x7) fsetxattr$security_smack_entry(r0, &(0x7f0000000140)='security.SMACK64IPIN\x00', &(0x7f0000000180)='/dev/ashmem\x00', 0xc, 0x2) openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000500)=""/165) 15:13:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x5451, &(0x7f0000000000)=""/165) [ 278.981195] FAULT_INJECTION: forcing a failure. [ 278.981195] name failslab, interval 1, probability 0, space 0, times 0 [ 279.026831] CPU: 1 PID: 9065 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 279.033776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.033787] Call Trace: [ 279.045791] dump_stack+0x1c4/0x2b6 [ 279.049441] ? dump_stack_print_info.cold.1+0x20/0x20 [ 279.054664] should_fail.cold.4+0xa/0x17 [ 279.058745] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.063872] ? lock_release+0x970/0x970 [ 279.067860] ? arch_local_save_flags+0x40/0x40 [ 279.072483] ? graph_lock+0x170/0x170 [ 279.076377] ? graph_lock+0x170/0x170 [ 279.080215] ? find_held_lock+0x36/0x1c0 [ 279.084298] ? __lock_is_held+0xb5/0x140 [ 279.088385] ? ___might_sleep+0x1ed/0x300 [ 279.088407] ? arch_local_save_flags+0x40/0x40 [ 279.088434] ? kernfs_activate+0x21a/0x2c0 [ 279.088478] __should_failslab+0x124/0x180 [ 279.088502] should_failslab+0x9/0x14 [ 279.109491] kmem_cache_alloc+0x2be/0x730 [ 279.113660] ? lock_downgrade+0x900/0x900 [ 279.117826] ? do_raw_spin_lock+0xc1/0x230 [ 279.117849] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 279.117875] __kernfs_new_node+0x127/0x8d0 [ 279.131353] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 279.136122] ? graph_lock+0x170/0x170 [ 279.139955] ? __lock_is_held+0xb5/0x140 [ 279.144052] ? wait_for_completion+0x8a0/0x8a0 [ 279.148672] ? mutex_unlock+0xd/0x10 [ 279.152427] ? kernfs_activate+0x21a/0x2c0 [ 279.156682] ? kernfs_walk_and_get_ns+0x340/0x340 [ 279.161567] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 279.167126] ? kernfs_link_sibling+0x1d2/0x3b0 [ 279.171732] kernfs_new_node+0x95/0x120 [ 279.175747] __kernfs_create_file+0x5a/0x340 [ 279.180179] sysfs_add_file_mode_ns+0x222/0x530 [ 279.184882] internal_create_group+0x3df/0xd80 [ 279.189494] ? remove_files.isra.1+0x190/0x190 [ 279.194094] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.199652] ? kernfs_create_link+0x1d4/0x250 [ 279.204175] sysfs_create_groups+0x9b/0x141 [ 279.208508] device_add+0x67e/0x17b0 [ 279.212243] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 279.217350] ? dev_set_name+0xad/0xe0 [ 279.221159] ? device_initialize+0x5f0/0x5f0 [ 279.225879] ? rtnl_is_locked+0xb5/0xf0 [ 279.229859] ? rtnl_trylock+0x20/0x20 [ 279.233698] netdev_register_kobject+0x187/0x3f0 [ 279.238470] register_netdevice+0x99a/0x10f0 [ 279.242905] ? netdev_change_features+0x110/0x110 [ 279.247752] ? kasan_check_read+0x11/0x20 [ 279.251922] ? rcu_bh_qs+0xc0/0xc0 [ 279.255517] ip6_tnl_create2+0x25b/0x430 [ 279.259588] ? ip6_tnl_update+0x850/0x850 [ 279.263756] ip6_tnl_locate+0x6a4/0x9a0 [ 279.267743] ? ip6_tnl_create2+0x430/0x430 [ 279.272021] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.277582] ? _copy_from_user+0xdf/0x150 [ 279.281742] ip6_tnl_ioctl+0x5cd/0xbe0 [ 279.285648] ? ip6_tnl_locate+0x9a0/0x9a0 [ 279.289809] ? rcu_bh_qs+0xc0/0xc0 [ 279.293393] ? ip6_tnl_locate+0x9a0/0x9a0 [ 279.297546] dev_ifsioc+0x41d/0xa80 [ 279.301187] ? dev_ifsioc+0x41d/0xa80 [ 279.304994] ? register_gifconf+0x70/0x70 [ 279.309161] dev_ioctl+0x698/0xcc0 [ 279.312713] sock_ioctl+0x484/0x690 [ 279.316349] ? routing_ioctl+0x890/0x890 [ 279.320420] ? ___might_sleep+0x151/0x300 [ 279.324601] ? arch_local_save_flags+0x40/0x40 [ 279.329206] ? routing_ioctl+0x890/0x890 [ 279.333439] do_vfs_ioctl+0x1de/0x1720 [ 279.337341] ? ioctl_preallocate+0x300/0x300 [ 279.341767] ? selinux_file_mprotect+0x620/0x620 [ 279.346537] ? __sb_end_write+0xd9/0x110 [ 279.350622] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 279.356167] ? fput+0x130/0x1a0 [ 279.359453] ? do_syscall_64+0x9a/0x820 [ 279.363440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.368985] ? security_file_ioctl+0x94/0xc0 [ 279.373418] ksys_ioctl+0xa9/0xd0 [ 279.376885] __x64_sys_ioctl+0x73/0xb0 [ 279.380786] do_syscall_64+0x1b9/0x820 [ 279.384682] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 279.390079] ? syscall_return_slowpath+0x5e0/0x5e0 [ 279.395039] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.399904] ? trace_hardirqs_on_caller+0x310/0x310 [ 279.404943] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 279.409967] ? prepare_exit_to_usermode+0x291/0x3b0 [ 279.414993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.419897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.425090] RIP: 0033:0x457569 [ 279.428307] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.447214] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 279.454934] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 279.462206] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 279.469491] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 15:13:14 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x8000000000000000) 15:13:14 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x1, 0x60602) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000100)=0x80) [ 279.476760] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 279.484051] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:14 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000), 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:14 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x5450, &(0x7f0000000000)=""/165) 15:13:14 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a2, &(0x7f0000000080)='ip6tnl0\x00') 15:13:14 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x683, 0x210000) r1 = accept(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f00000001c0)=0x80) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000000)=""/165) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in=@broadcast, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'syzkaller0\x00', r3}) 15:13:14 executing program 1 (fault-call:6 fault-nth:20): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:14 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x200000000000000) [ 279.659440] FAULT_INJECTION: forcing a failure. [ 279.659440] name failslab, interval 1, probability 0, space 0, times 0 [ 279.693587] CPU: 0 PID: 9090 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 279.700456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.709828] Call Trace: [ 279.712442] dump_stack+0x1c4/0x2b6 [ 279.716104] ? dump_stack_print_info.cold.1+0x20/0x20 [ 279.721338] should_fail.cold.4+0xa/0x17 [ 279.725474] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.730597] ? lock_release+0x970/0x970 [ 279.734590] ? arch_local_save_flags+0x40/0x40 [ 279.739190] ? graph_lock+0x170/0x170 [ 279.743013] ? graph_lock+0x170/0x170 [ 279.746863] ? find_held_lock+0x36/0x1c0 [ 279.750944] ? __lock_is_held+0xb5/0x140 [ 279.755109] ? ___might_sleep+0x1ed/0x300 [ 279.759293] ? arch_local_save_flags+0x40/0x40 [ 279.763891] ? kernfs_activate+0x21a/0x2c0 [ 279.768156] __should_failslab+0x124/0x180 [ 279.772417] should_failslab+0x9/0x14 [ 279.776241] kmem_cache_alloc+0x2be/0x730 [ 279.780410] ? lock_downgrade+0x900/0x900 [ 279.784573] ? do_raw_spin_lock+0xc1/0x230 [ 279.788836] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 279.793876] __kernfs_new_node+0x127/0x8d0 [ 279.798152] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 279.802931] ? graph_lock+0x170/0x170 [ 279.806758] ? __lock_is_held+0xb5/0x140 [ 279.810839] ? wait_for_completion+0x8a0/0x8a0 [ 279.815454] ? mutex_unlock+0xd/0x10 [ 279.819190] ? kernfs_activate+0x21a/0x2c0 [ 279.823453] ? kernfs_walk_and_get_ns+0x340/0x340 [ 279.828321] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 279.833877] ? kernfs_link_sibling+0x1d2/0x3b0 [ 279.838489] kernfs_new_node+0x95/0x120 [ 279.842513] __kernfs_create_file+0x5a/0x340 [ 279.846951] sysfs_add_file_mode_ns+0x222/0x530 [ 279.851652] internal_create_group+0x3df/0xd80 [ 279.856283] ? remove_files.isra.1+0x190/0x190 [ 279.860891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.866476] ? kernfs_create_link+0x1d4/0x250 [ 279.870998] sysfs_create_groups+0x9b/0x141 [ 279.875356] device_add+0x67e/0x17b0 [ 279.879151] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 279.884260] ? dev_set_name+0xad/0xe0 [ 279.884280] ? device_initialize+0x5f0/0x5f0 [ 279.884300] ? rtnl_is_locked+0xb5/0xf0 [ 279.884316] ? rtnl_trylock+0x20/0x20 [ 279.884348] netdev_register_kobject+0x187/0x3f0 [ 279.884373] register_netdevice+0x99a/0x10f0 [ 279.884403] ? netdev_change_features+0x110/0x110 [ 279.892634] ? kasan_check_read+0x11/0x20 [ 279.892659] ? rcu_bh_qs+0xc0/0xc0 [ 279.892693] ip6_tnl_create2+0x25b/0x430 [ 279.892714] ? ip6_tnl_update+0x850/0x850 [ 279.892747] ip6_tnl_locate+0x6a4/0x9a0 [ 279.892775] ? ip6_tnl_create2+0x430/0x430 [ 279.923837] overlayfs: failed to resolve './file1': -2 [ 279.926410] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.926430] ? _copy_from_user+0xdf/0x150 [ 279.926456] ip6_tnl_ioctl+0x5cd/0xbe0 [ 279.926479] ? ip6_tnl_locate+0x9a0/0x9a0 [ 279.948186] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 279.949649] ? rcu_bh_qs+0xc0/0xc0 [ 279.949706] ? ip6_tnl_locate+0x9a0/0x9a0 [ 279.977561] dev_ifsioc+0x41d/0xa80 [ 279.981252] ? dev_ifsioc+0x41d/0xa80 [ 279.985092] ? register_gifconf+0x70/0x70 [ 279.989274] dev_ioctl+0x698/0xcc0 [ 279.992848] sock_ioctl+0x484/0x690 [ 279.996476] ? routing_ioctl+0x890/0x890 [ 280.000617] ? ___might_sleep+0x151/0x300 [ 280.004832] ? arch_local_save_flags+0x40/0x40 [ 280.009436] ? routing_ioctl+0x890/0x890 [ 280.013534] do_vfs_ioctl+0x1de/0x1720 [ 280.017472] ? ioctl_preallocate+0x300/0x300 [ 280.021896] ? selinux_file_mprotect+0x620/0x620 [ 280.026652] ? __sb_end_write+0xd9/0x110 [ 280.030735] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 280.036263] ? fput+0x130/0x1a0 [ 280.039539] ? do_syscall_64+0x9a/0x820 [ 280.043509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.049087] ? security_file_ioctl+0x94/0xc0 [ 280.053536] ksys_ioctl+0xa9/0xd0 [ 280.057024] __x64_sys_ioctl+0x73/0xb0 [ 280.060943] do_syscall_64+0x1b9/0x820 [ 280.064838] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.070223] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.075159] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.080066] ? trace_hardirqs_on_caller+0x310/0x310 [ 280.085083] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.090108] ? prepare_exit_to_usermode+0x291/0x3b0 [ 280.095163] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.100021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.105234] RIP: 0033:0x457569 [ 280.108434] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.127379] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 280.135102] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 280.142390] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 280.149661] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 15:13:15 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x4b49, &(0x7f0000000000)=""/165) 15:13:15 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:13:15 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x300) [ 280.156969] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 280.164227] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:15 executing program 1 (fault-call:6 fault-nth:21): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:15 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087703, &(0x7f0000000000)=""/165) 15:13:15 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8911, &(0x7f0000000080)='ip6tnl0\x00') [ 280.383813] FAULT_INJECTION: forcing a failure. [ 280.383813] name failslab, interval 1, probability 0, space 0, times 0 [ 280.427462] CPU: 1 PID: 9118 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 280.434363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.444191] Call Trace: [ 280.446807] dump_stack+0x1c4/0x2b6 [ 280.450458] ? dump_stack_print_info.cold.1+0x20/0x20 [ 280.455673] should_fail.cold.4+0xa/0x17 [ 280.459750] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.464878] ? lock_release+0x970/0x970 [ 280.468864] ? arch_local_save_flags+0x40/0x40 [ 280.473455] ? graph_lock+0x170/0x170 [ 280.477284] ? graph_lock+0x170/0x170 [ 280.481114] ? find_held_lock+0x36/0x1c0 [ 280.485188] ? __lock_is_held+0xb5/0x140 [ 280.489296] ? ___might_sleep+0x1ed/0x300 [ 280.493476] ? arch_local_save_flags+0x40/0x40 [ 280.498069] ? kernfs_activate+0x21a/0x2c0 [ 280.502325] __should_failslab+0x124/0x180 [ 280.506592] should_failslab+0x9/0x14 [ 280.510400] kmem_cache_alloc+0x2be/0x730 [ 280.514557] ? lock_downgrade+0x900/0x900 [ 280.518729] ? do_raw_spin_lock+0xc1/0x230 [ 280.522976] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 280.528003] __kernfs_new_node+0x127/0x8d0 [ 280.532267] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 280.537040] ? graph_lock+0x170/0x170 [ 280.540859] ? __lock_is_held+0xb5/0x140 [ 280.544930] ? wait_for_completion+0x8a0/0x8a0 [ 280.549548] ? mutex_unlock+0xd/0x10 [ 280.553284] ? kernfs_activate+0x21a/0x2c0 [ 280.557576] ? kernfs_walk_and_get_ns+0x340/0x340 [ 280.562430] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 280.567976] ? kernfs_link_sibling+0x1d2/0x3b0 [ 280.572613] kernfs_new_node+0x95/0x120 [ 280.576609] __kernfs_create_file+0x5a/0x340 [ 280.581042] sysfs_add_file_mode_ns+0x222/0x530 [ 280.585733] internal_create_group+0x3df/0xd80 [ 280.590334] ? remove_files.isra.1+0x190/0x190 [ 280.594934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.600478] ? kernfs_create_link+0x1d4/0x250 [ 280.604998] sysfs_create_groups+0x9b/0x141 [ 280.609354] device_add+0x67e/0x17b0 [ 280.613083] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 280.618218] ? dev_set_name+0xad/0xe0 [ 280.622041] ? device_initialize+0x5f0/0x5f0 [ 280.626459] ? rtnl_is_locked+0xb5/0xf0 [ 280.630441] ? rtnl_trylock+0x20/0x20 [ 280.634265] netdev_register_kobject+0x187/0x3f0 [ 280.639055] register_netdevice+0x99a/0x10f0 [ 280.643486] ? netdev_change_features+0x110/0x110 [ 280.648335] ? kasan_check_read+0x11/0x20 [ 280.652494] ? rcu_bh_qs+0xc0/0xc0 [ 280.656073] ip6_tnl_create2+0x25b/0x430 [ 280.660153] ? ip6_tnl_update+0x850/0x850 [ 280.664324] ip6_tnl_locate+0x6a4/0x9a0 [ 280.668314] ? ip6_tnl_create2+0x430/0x430 [ 280.672575] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.678123] ? _copy_from_user+0xdf/0x150 [ 280.682296] ip6_tnl_ioctl+0x5cd/0xbe0 [ 280.686195] ? ip6_tnl_locate+0x9a0/0x9a0 [ 280.690353] ? rcu_bh_qs+0xc0/0xc0 [ 280.693936] ? ip6_tnl_locate+0x9a0/0x9a0 [ 280.698123] dev_ifsioc+0x41d/0xa80 [ 280.701756] ? dev_ifsioc+0x41d/0xa80 [ 280.705578] ? register_gifconf+0x70/0x70 [ 280.709765] dev_ioctl+0x698/0xcc0 [ 280.713321] sock_ioctl+0x484/0x690 [ 280.716956] ? routing_ioctl+0x890/0x890 [ 280.721056] ? ___might_sleep+0x151/0x300 [ 280.725218] ? arch_local_save_flags+0x40/0x40 [ 280.729821] ? routing_ioctl+0x890/0x890 [ 280.733900] do_vfs_ioctl+0x1de/0x1720 [ 280.737804] ? ioctl_preallocate+0x300/0x300 [ 280.742231] ? selinux_file_mprotect+0x620/0x620 [ 280.746999] ? __sb_end_write+0xd9/0x110 [ 280.751080] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 280.756624] ? fput+0x130/0x1a0 [ 280.759913] ? do_syscall_64+0x9a/0x820 [ 280.763898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.769447] ? security_file_ioctl+0x94/0xc0 [ 280.773867] ksys_ioctl+0xa9/0xd0 [ 280.777349] __x64_sys_ioctl+0x73/0xb0 [ 280.781250] do_syscall_64+0x1b9/0x820 [ 280.785144] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.790517] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.795450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.800306] ? trace_hardirqs_on_caller+0x310/0x310 [ 280.805329] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.810355] ? prepare_exit_to_usermode+0x291/0x3b0 [ 280.815388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.820263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.825458] RIP: 0033:0x457569 [ 280.828663] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.847580] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 280.855307] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 280.862618] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 280.869889] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 280.877163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 280.884435] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:15 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:15 executing program 1 (fault-call:6 fault-nth:22): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:15 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x400000) 15:13:15 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)=@v1={0x1000000, [{0x9, 0x100000000}]}, 0xc, 0x1) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) sendmsg(r1, &(0x7f0000000680)={&(0x7f0000000340)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0)="6e81e52eb29411baca3f3d5a0b431dba6dd9de6dbe6e7ecd39bc36343c46f5cff800b59daf156b4256c100f929217fff8148516513028d0f0e069cf3035552b8a85e4421540bfe78483095c6e70d90624f10f99f028db67491e853ddd6eba39f582578d3efe67a31cde431df2ba3ff", 0x6f}, {&(0x7f0000000440)="ba3fd94283cd1c422310088e65ee09e30e05c20d52411fd8203698e9dcb88ae16a4cce0628643638c7c0167724e04dabfe8d2ef803bbdb0a777d116c5fb60a5a6db69fca27458b7c05d7428ab004972f175b9d4ce8e42317b2098b275ff3d9f87393980ad18f7b5019ca0b83e703bce5a07a24f070de3f64f8ae7f96e7462ba0975806c542adb9fa3129eb0df7082d21256c", 0x92}], 0x2, &(0x7f0000000540)=[{0xd8, 0x0, 0x9, "1320cf24c226426536536598e2e0d940c13740364c7574436e4cc61e754cb7300f490c12cac05640a4164da2c8492feaf52be04ead5da0b5197d776a8cd34fc84b6bbe9be6893c62fa7aa8fc18cdf4dc8d9c8a4c5b308a48dc6ee1358ace615882b81ea48968c12e7a48a62bb9cb44bd5ba491a0d460eac454fc2625d348cdb66af59166bc229a7d2f2931508232635409a6a30affe1701bf37275eed5de4cf47f3cc03b8046d49a2f0fe2aa2da78989efbfe5ae94247f654f6b5f62423220d5161fde3d2f"}, {0x18, 0x0, 0xd60, "6571c338cdb28a"}, {0x20, 0x119, 0x45, "15e440829ee07eebfa0139e4620ee469"}, {0x20, 0x111, 0x5, "a322d21a5b31c54f92cab3"}], 0x130, 0x40}, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', r2}) 15:13:15 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087707, &(0x7f0000000000)=""/165) 15:13:15 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') [ 281.039978] FAULT_INJECTION: forcing a failure. [ 281.039978] name failslab, interval 1, probability 0, space 0, times 0 [ 281.079503] CPU: 1 PID: 9132 Comm: syz-executor1 Not tainted 4.19.0+ #78 15:13:16 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0xc0189436, &(0x7f0000000000)=""/165) 15:13:16 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000180)=""/165) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000140)={0xca, 0x9, 0x8, 0xfffffffffffffffd, 0x8, 0x3}) fadvise64(r0, 0x0, 0x8, 0x2) [ 281.086409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.086420] Call Trace: [ 281.098381] dump_stack+0x1c4/0x2b6 [ 281.102046] ? dump_stack_print_info.cold.1+0x20/0x20 [ 281.107271] should_fail.cold.4+0xa/0x17 [ 281.111355] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.116480] ? lock_release+0x970/0x970 [ 281.120486] ? arch_local_save_flags+0x40/0x40 [ 281.125085] ? graph_lock+0x170/0x170 [ 281.128914] ? graph_lock+0x170/0x170 [ 281.132746] ? find_held_lock+0x36/0x1c0 15:13:16 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x6b6b6b00000000) [ 281.136822] ? __lock_is_held+0xb5/0x140 [ 281.136857] ? ___might_sleep+0x1ed/0x300 [ 281.136877] ? arch_local_save_flags+0x40/0x40 [ 281.136897] ? kernfs_activate+0x21a/0x2c0 [ 281.153941] __should_failslab+0x124/0x180 [ 281.158204] should_failslab+0x9/0x14 [ 281.162028] kmem_cache_alloc+0x2be/0x730 [ 281.166212] ? lock_downgrade+0x900/0x900 [ 281.170380] ? do_raw_spin_lock+0xc1/0x230 [ 281.170403] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 281.170426] __kernfs_new_node+0x127/0x8d0 [ 281.170449] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 281.170466] ? graph_lock+0x170/0x170 [ 281.170494] ? __lock_is_held+0xb5/0x140 [ 281.184000] ? wait_for_completion+0x8a0/0x8a0 [ 281.184046] ? mutex_unlock+0xd/0x10 [ 281.204958] ? kernfs_activate+0x21a/0x2c0 [ 281.209206] ? kernfs_walk_and_get_ns+0x340/0x340 [ 281.214086] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 281.219640] ? kernfs_link_sibling+0x1d2/0x3b0 [ 281.219668] kernfs_new_node+0x95/0x120 [ 281.219694] __kernfs_create_file+0x5a/0x340 [ 281.219719] sysfs_add_file_mode_ns+0x222/0x530 [ 281.219753] internal_create_group+0x3df/0xd80 [ 281.241969] ? remove_files.isra.1+0x190/0x190 [ 281.241997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.242014] ? kernfs_create_link+0x1d4/0x250 [ 281.242052] sysfs_create_groups+0x9b/0x141 [ 281.260988] device_add+0x67e/0x17b0 [ 281.264729] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 281.269851] ? dev_set_name+0xad/0xe0 [ 281.273673] ? device_initialize+0x5f0/0x5f0 [ 281.278099] ? rtnl_is_locked+0xb5/0xf0 [ 281.282091] ? rtnl_trylock+0x20/0x20 [ 281.285923] netdev_register_kobject+0x187/0x3f0 15:13:16 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x300000000000000) 15:13:16 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x1000, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/mls\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f00000000c0)={0x10001, 0x3ff}) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000100)) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) clock_nanosleep(0x5, 0x1, &(0x7f0000000180)={0x77359400}, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000140)) [ 281.290718] register_netdevice+0x99a/0x10f0 [ 281.295153] ? netdev_change_features+0x110/0x110 [ 281.300012] ? kasan_check_read+0x11/0x20 [ 281.304195] ? rcu_bh_qs+0xc0/0xc0 [ 281.307774] ip6_tnl_create2+0x25b/0x430 [ 281.311965] ? ip6_tnl_update+0x850/0x850 [ 281.316149] ip6_tnl_locate+0x6a4/0x9a0 [ 281.320152] ? ip6_tnl_create2+0x430/0x430 [ 281.324419] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 281.329975] ? _copy_from_user+0xdf/0x150 [ 281.334275] ip6_tnl_ioctl+0x5cd/0xbe0 [ 281.338192] ? ip6_tnl_locate+0x9a0/0x9a0 [ 281.342355] ? rcu_bh_qs+0xc0/0xc0 [ 281.345956] ? ip6_tnl_locate+0x9a0/0x9a0 [ 281.350120] dev_ifsioc+0x41d/0xa80 [ 281.353848] ? dev_ifsioc+0x41d/0xa80 [ 281.357672] ? register_gifconf+0x70/0x70 [ 281.361860] dev_ioctl+0x698/0xcc0 [ 281.365427] sock_ioctl+0x484/0x690 [ 281.369082] ? routing_ioctl+0x890/0x890 [ 281.373164] ? ___might_sleep+0x151/0x300 [ 281.377331] ? arch_local_save_flags+0x40/0x40 [ 281.381945] ? routing_ioctl+0x890/0x890 [ 281.386024] do_vfs_ioctl+0x1de/0x1720 15:13:16 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x3000000) [ 281.389945] ? ioctl_preallocate+0x300/0x300 [ 281.394378] ? selinux_file_mprotect+0x620/0x620 [ 281.399156] ? __sb_end_write+0xd9/0x110 [ 281.403240] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 281.408800] ? fput+0x130/0x1a0 [ 281.408819] ? do_syscall_64+0x9a/0x820 [ 281.408842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.421633] ? security_file_ioctl+0x94/0xc0 [ 281.426075] ksys_ioctl+0xa9/0xd0 [ 281.429551] __x64_sys_ioctl+0x73/0xb0 [ 281.433470] do_syscall_64+0x1b9/0x820 [ 281.437380] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 281.442786] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.447734] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.452603] ? trace_hardirqs_on_caller+0x310/0x310 [ 281.457643] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 281.462688] ? prepare_exit_to_usermode+0x291/0x3b0 [ 281.467755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.472628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.477840] RIP: 0033:0x457569 [ 281.481063] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.499972] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 281.499992] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 281.500002] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 281.500011] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 281.500020] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 281.500030] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 281.654467] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:16 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:16 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:13:16 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1000000) 15:13:16 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:13:16 executing program 1 (fault-call:6 fault-nth:23): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:16 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89b1, &(0x7f0000000080)='ip6tnl0\x00') [ 281.919348] FAULT_INJECTION: forcing a failure. [ 281.919348] name failslab, interval 1, probability 0, space 0, times 0 [ 281.937684] CPU: 1 PID: 9177 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 281.944616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.953973] Call Trace: [ 281.956590] dump_stack+0x1c4/0x2b6 [ 281.960237] ? dump_stack_print_info.cold.1+0x20/0x20 [ 281.965470] should_fail.cold.4+0xa/0x17 [ 281.969552] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.974673] ? lock_release+0x970/0x970 [ 281.978659] ? arch_local_save_flags+0x40/0x40 [ 281.983251] ? graph_lock+0x170/0x170 [ 281.987080] ? graph_lock+0x170/0x170 [ 281.990903] ? find_held_lock+0x36/0x1c0 [ 281.994989] ? __lock_is_held+0xb5/0x140 [ 281.999108] ? ___might_sleep+0x1ed/0x300 [ 282.003268] ? arch_local_save_flags+0x40/0x40 [ 282.007857] ? kernfs_activate+0x21a/0x2c0 [ 282.012113] __should_failslab+0x124/0x180 [ 282.016395] should_failslab+0x9/0x14 [ 282.020215] kmem_cache_alloc+0x2be/0x730 [ 282.024372] ? lock_downgrade+0x900/0x900 [ 282.028541] ? do_raw_spin_lock+0xc1/0x230 [ 282.032792] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 282.037859] __kernfs_new_node+0x127/0x8d0 [ 282.042128] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 282.046891] ? graph_lock+0x170/0x170 [ 282.050717] ? __lock_is_held+0xb5/0x140 [ 282.054788] ? wait_for_completion+0x8a0/0x8a0 [ 282.059395] ? mutex_unlock+0xd/0x10 [ 282.063115] ? kernfs_activate+0x21a/0x2c0 [ 282.067360] ? kernfs_walk_and_get_ns+0x340/0x340 [ 282.072211] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 282.077768] ? kernfs_link_sibling+0x1d2/0x3b0 [ 282.082370] kernfs_new_node+0x95/0x120 [ 282.086365] __kernfs_create_file+0x5a/0x340 [ 282.090787] sysfs_add_file_mode_ns+0x222/0x530 [ 282.095476] internal_create_group+0x3df/0xd80 [ 282.100088] ? remove_files.isra.1+0x190/0x190 [ 282.104684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.110231] ? kernfs_create_link+0x1d4/0x250 [ 282.114747] sysfs_create_groups+0x9b/0x141 [ 282.119089] device_add+0x67e/0x17b0 [ 282.122819] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 282.127926] ? dev_set_name+0xad/0xe0 [ 282.131732] ? device_initialize+0x5f0/0x5f0 [ 282.136158] ? rtnl_is_locked+0xb5/0xf0 [ 282.140141] ? rtnl_trylock+0x20/0x20 [ 282.143959] netdev_register_kobject+0x187/0x3f0 [ 282.148727] register_netdevice+0x99a/0x10f0 [ 282.153151] ? netdev_change_features+0x110/0x110 [ 282.158023] ? kasan_check_read+0x11/0x20 [ 282.162200] ? rcu_bh_qs+0xc0/0xc0 [ 282.165763] ip6_tnl_create2+0x25b/0x430 [ 282.169859] ? ip6_tnl_update+0x850/0x850 [ 282.174066] ip6_tnl_locate+0x6a4/0x9a0 [ 282.178060] ? ip6_tnl_create2+0x430/0x430 [ 282.182313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.187884] ? _copy_from_user+0xdf/0x150 [ 282.192059] ip6_tnl_ioctl+0x5cd/0xbe0 [ 282.195971] ? ip6_tnl_locate+0x9a0/0x9a0 [ 282.200129] ? rcu_bh_qs+0xc0/0xc0 [ 282.203714] ? ip6_tnl_locate+0x9a0/0x9a0 [ 282.207889] dev_ifsioc+0x41d/0xa80 [ 282.211541] ? dev_ifsioc+0x41d/0xa80 [ 282.215377] ? register_gifconf+0x70/0x70 [ 282.219553] dev_ioctl+0x698/0xcc0 [ 282.223125] sock_ioctl+0x484/0x690 [ 282.226771] ? routing_ioctl+0x890/0x890 [ 282.230841] ? ___might_sleep+0x151/0x300 [ 282.234998] ? arch_local_save_flags+0x40/0x40 [ 282.239612] ? routing_ioctl+0x890/0x890 [ 282.243708] do_vfs_ioctl+0x1de/0x1720 [ 282.247613] ? ioctl_preallocate+0x300/0x300 [ 282.252046] ? selinux_file_mprotect+0x620/0x620 [ 282.256835] ? __sb_end_write+0xd9/0x110 [ 282.260907] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 282.266448] ? fput+0x130/0x1a0 [ 282.269736] ? do_syscall_64+0x9a/0x820 [ 282.273723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.279281] ? security_file_ioctl+0x94/0xc0 [ 282.283699] ksys_ioctl+0xa9/0xd0 [ 282.287166] __x64_sys_ioctl+0x73/0xb0 [ 282.291069] do_syscall_64+0x1b9/0x820 [ 282.294988] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.300363] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.305296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.310152] ? trace_hardirqs_on_caller+0x310/0x310 [ 282.315176] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.320201] ? prepare_exit_to_usermode+0x291/0x3b0 [ 282.325231] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.330092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.335305] RIP: 0033:0x457569 [ 282.338535] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.357458] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:17 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0xc0045878, &(0x7f0000000000)=""/165) [ 282.365175] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 282.372451] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 282.379727] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 282.386999] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 282.394287] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:17 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x80000, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000240)=""/165) 15:13:17 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x4000000) 15:13:17 executing program 1 (fault-call:6 fault-nth:24): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:17 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)='ip6tnl0\x00') 15:13:17 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x7709, &(0x7f0000000000)=""/165) [ 282.679906] FAULT_INJECTION: forcing a failure. [ 282.679906] name failslab, interval 1, probability 0, space 0, times 0 [ 282.707677] CPU: 0 PID: 9204 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 282.714551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.714560] Call Trace: [ 282.714585] dump_stack+0x1c4/0x2b6 [ 282.714609] ? dump_stack_print_info.cold.1+0x20/0x20 [ 282.714670] should_fail.cold.4+0xa/0x17 [ 282.726610] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.726644] ? lock_release+0x970/0x970 [ 282.726690] ? arch_local_save_flags+0x40/0x40 [ 282.737678] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 282.739556] ? graph_lock+0x170/0x170 [ 282.739578] ? graph_lock+0x170/0x170 [ 282.739607] ? find_held_lock+0x36/0x1c0 [ 282.772915] ? __lock_is_held+0xb5/0x140 [ 282.777057] ? ___might_sleep+0x1ed/0x300 [ 282.781249] ? arch_local_save_flags+0x40/0x40 [ 282.785855] ? kernfs_activate+0x21a/0x2c0 [ 282.790115] __should_failslab+0x124/0x180 [ 282.794355] should_failslab+0x9/0x14 [ 282.798149] kmem_cache_alloc+0x2be/0x730 [ 282.802313] ? lock_downgrade+0x900/0x900 [ 282.806453] ? do_raw_spin_lock+0xc1/0x230 [ 282.810701] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 282.815713] __kernfs_new_node+0x127/0x8d0 [ 282.819962] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 282.824708] ? graph_lock+0x170/0x170 [ 282.828507] ? __lock_is_held+0xb5/0x140 [ 282.832577] ? wait_for_completion+0x8a0/0x8a0 [ 282.837177] ? mutex_unlock+0xd/0x10 [ 282.840915] ? kernfs_activate+0x21a/0x2c0 [ 282.845151] ? kernfs_walk_and_get_ns+0x340/0x340 [ 282.849994] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 282.855534] ? kernfs_link_sibling+0x1d2/0x3b0 [ 282.860131] kernfs_new_node+0x95/0x120 [ 282.864125] __kernfs_create_file+0x5a/0x340 [ 282.868551] sysfs_add_file_mode_ns+0x222/0x530 [ 282.873223] internal_create_group+0x3df/0xd80 [ 282.877806] ? remove_files.isra.1+0x190/0x190 [ 282.882402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.887930] ? kernfs_create_link+0x1d4/0x250 [ 282.892423] sysfs_create_groups+0x9b/0x141 [ 282.896744] device_add+0x67e/0x17b0 [ 282.900457] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 282.905571] ? dev_set_name+0xad/0xe0 [ 282.909367] ? device_initialize+0x5f0/0x5f0 [ 282.913767] ? rtnl_is_locked+0xb5/0xf0 [ 282.917729] ? rtnl_trylock+0x20/0x20 [ 282.921541] netdev_register_kobject+0x187/0x3f0 [ 282.926308] register_netdevice+0x99a/0x10f0 [ 282.930720] ? netdev_change_features+0x110/0x110 [ 282.935578] ? kasan_check_read+0x11/0x20 [ 282.939720] ? rcu_bh_qs+0xc0/0xc0 [ 282.943263] ip6_tnl_create2+0x25b/0x430 [ 282.947316] ? ip6_tnl_update+0x850/0x850 [ 282.951466] ip6_tnl_locate+0x6a4/0x9a0 [ 282.955433] ? ip6_tnl_create2+0x430/0x430 [ 282.959692] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.965221] ? _copy_from_user+0xdf/0x150 [ 282.969385] ip6_tnl_ioctl+0x5cd/0xbe0 [ 282.973267] ? ip6_tnl_locate+0x9a0/0x9a0 [ 282.977409] ? rcu_bh_qs+0xc0/0xc0 [ 282.980960] ? ip6_tnl_locate+0x9a0/0x9a0 [ 282.985135] dev_ifsioc+0x41d/0xa80 [ 282.988790] ? dev_ifsioc+0x41d/0xa80 [ 282.992583] ? register_gifconf+0x70/0x70 [ 282.996728] dev_ioctl+0x698/0xcc0 [ 283.000262] sock_ioctl+0x484/0x690 [ 283.003883] ? routing_ioctl+0x890/0x890 [ 283.007938] ? ___might_sleep+0x151/0x300 [ 283.012082] ? arch_local_save_flags+0x40/0x40 [ 283.016680] ? routing_ioctl+0x890/0x890 [ 283.020778] do_vfs_ioctl+0x1de/0x1720 [ 283.024687] ? ioctl_preallocate+0x300/0x300 [ 283.029092] ? selinux_file_mprotect+0x620/0x620 [ 283.033853] ? __sb_end_write+0xd9/0x110 [ 283.037943] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 283.043483] ? fput+0x130/0x1a0 [ 283.046774] ? do_syscall_64+0x9a/0x820 [ 283.050744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.056273] ? security_file_ioctl+0x94/0xc0 [ 283.060678] ksys_ioctl+0xa9/0xd0 [ 283.064126] __x64_sys_ioctl+0x73/0xb0 [ 283.068054] do_syscall_64+0x1b9/0x820 [ 283.071978] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.077346] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.082279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.087118] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.092148] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 283.097172] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.102183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.107048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.112260] RIP: 0033:0x457569 [ 283.115444] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.134333] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 283.142032] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 283.149300] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 283.156576] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 283.163835] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 283.171091] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:18 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:18 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000140)={0x4, 0x7ff, 0x1132, 0xff, 0x7}) 15:13:18 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x80086601, &(0x7f0000000000)=""/165) 15:13:18 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x6b6b6b00) 15:13:18 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5421, &(0x7f0000000080)='ip6tnl0\x00') 15:13:18 executing program 1 (fault-call:6 fault-nth:25): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:18 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087708, &(0x7f0000000000)=""/165) 15:13:18 executing program 5: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/create\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1', "f24af36c8526c44ed93e0d860a65c16e7607af570424896401650ed8729b133491d87acbf859cc0f08fb580c7873c085d1e53d3efd47569cd7c5292efb7dc24f65146979b195524be483024f972d6aa0a53c21"}, 0x57) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x406, r0) fcntl$notify(r0, 0x402, 0x6) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x53a, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000000)=""/165) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000140)=0x4) [ 283.364324] FAULT_INJECTION: forcing a failure. [ 283.364324] name failslab, interval 1, probability 0, space 0, times 0 [ 283.378628] CPU: 0 PID: 9226 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 283.385500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.394861] Call Trace: [ 283.397464] dump_stack+0x1c4/0x2b6 [ 283.401116] ? dump_stack_print_info.cold.1+0x20/0x20 [ 283.406367] should_fail.cold.4+0xa/0x17 [ 283.410460] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.415594] ? lock_release+0x970/0x970 [ 283.419591] ? arch_local_save_flags+0x40/0x40 [ 283.424194] ? graph_lock+0x170/0x170 [ 283.428021] ? graph_lock+0x170/0x170 [ 283.431895] ? find_held_lock+0x36/0x1c0 [ 283.435187] QAT: Invalid ioctl [ 283.435971] ? __lock_is_held+0xb5/0x140 [ 283.436016] ? ___might_sleep+0x1ed/0x300 [ 283.447465] ? arch_local_save_flags+0x40/0x40 [ 283.452076] ? kernfs_activate+0x21a/0x2c0 [ 283.456342] __should_failslab+0x124/0x180 [ 283.458976] QAT: Invalid ioctl [ 283.460592] should_failslab+0x9/0x14 [ 283.460612] kmem_cache_alloc+0x2be/0x730 [ 283.460630] ? lock_downgrade+0x900/0x900 [ 283.460646] ? do_raw_spin_lock+0xc1/0x230 [ 283.460668] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 283.485199] __kernfs_new_node+0x127/0x8d0 [ 283.489456] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 283.494228] ? graph_lock+0x170/0x170 [ 283.498116] ? __lock_is_held+0xb5/0x140 [ 283.502192] ? wait_for_completion+0x8a0/0x8a0 [ 283.506806] ? mutex_unlock+0xd/0x10 [ 283.510550] ? kernfs_activate+0x21a/0x2c0 [ 283.514806] ? kernfs_walk_and_get_ns+0x340/0x340 [ 283.519670] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 283.525221] ? kernfs_link_sibling+0x1d2/0x3b0 [ 283.529837] kernfs_new_node+0x95/0x120 [ 283.533849] __kernfs_create_file+0x5a/0x340 [ 283.538295] sysfs_add_file_mode_ns+0x222/0x530 [ 283.543017] internal_create_group+0x3df/0xd80 [ 283.547654] ? remove_files.isra.1+0x190/0x190 [ 283.552269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.558538] ? kernfs_create_link+0x1d4/0x250 [ 283.563077] sysfs_create_groups+0x9b/0x141 [ 283.567423] device_add+0x67e/0x17b0 [ 283.571167] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 283.576292] ? dev_set_name+0xad/0xe0 [ 283.580111] ? device_initialize+0x5f0/0x5f0 [ 283.584564] ? rtnl_is_locked+0xb5/0xf0 [ 283.588570] ? rtnl_trylock+0x20/0x20 [ 283.592400] netdev_register_kobject+0x187/0x3f0 [ 283.597184] register_netdevice+0x99a/0x10f0 [ 283.601609] ? netdev_change_features+0x110/0x110 [ 283.606468] ? kasan_check_read+0x11/0x20 [ 283.606492] ? rcu_bh_qs+0xc0/0xc0 [ 283.614198] ip6_tnl_create2+0x25b/0x430 [ 283.618280] ? ip6_tnl_update+0x850/0x850 [ 283.618313] ip6_tnl_locate+0x6a4/0x9a0 [ 283.618337] ? ip6_tnl_create2+0x430/0x430 [ 283.618368] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.618389] ? _copy_from_user+0xdf/0x150 [ 283.626511] ip6_tnl_ioctl+0x5cd/0xbe0 [ 283.626539] ? ip6_tnl_locate+0x9a0/0x9a0 [ 283.626558] ? rcu_bh_qs+0xc0/0xc0 [ 283.626612] ? ip6_tnl_locate+0x9a0/0x9a0 [ 283.636346] dev_ifsioc+0x41d/0xa80 [ 283.636361] ? dev_ifsioc+0x41d/0xa80 15:13:18 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8995, &(0x7f0000000080)='ip6tnl0\x00') 15:13:18 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x80087601, &(0x7f0000000000)=""/165) 15:13:18 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000000)=0x85b) 15:13:18 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0xc020660b, &(0x7f0000000000)=""/165) [ 283.636380] ? register_gifconf+0x70/0x70 [ 283.636416] dev_ioctl+0x698/0xcc0 [ 283.644485] sock_ioctl+0x484/0x690 [ 283.644507] ? routing_ioctl+0x890/0x890 [ 283.644525] ? ___might_sleep+0x151/0x300 [ 283.644550] ? arch_local_save_flags+0x40/0x40 [ 283.652256] ? routing_ioctl+0x890/0x890 [ 283.652278] do_vfs_ioctl+0x1de/0x1720 [ 283.652308] ? ioctl_preallocate+0x300/0x300 [ 283.660090] ? selinux_file_mprotect+0x620/0x620 [ 283.660115] ? __sb_end_write+0xd9/0x110 [ 283.660138] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 283.660152] ? fput+0x130/0x1a0 [ 283.660170] ? do_syscall_64+0x9a/0x820 [ 283.660193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.668134] ? security_file_ioctl+0x94/0xc0 [ 283.668158] ksys_ioctl+0xa9/0xd0 [ 283.668182] __x64_sys_ioctl+0x73/0xb0 [ 283.668203] do_syscall_64+0x1b9/0x820 [ 283.668221] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.668241] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.675411] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.675434] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.675454] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 283.675474] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.675498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.683725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.683740] RIP: 0033:0x457569 [ 283.683757] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.683767] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 283.692433] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 283.692445] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 283.692466] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 283.692477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 283.692500] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 283.853813] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:19 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:19 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8927, &(0x7f0000000080)='ip6tnl0\x00') 15:13:19 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x2, &(0x7f0000000000)=""/165) 15:13:19 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000100)={[0xfffffffffffff000, 0x4, 0x6, 0x685, 0x200, 0xf7, 0x7, 0xd2a, 0x100000000, 0x8000, 0x7, 0x2, 0x1ff, 0x6, 0x5, 0x2], 0xd000, 0x2}) 15:13:19 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x400000000000) 15:13:19 executing program 1 (fault-call:6 fault-nth:26): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 284.607329] FAULT_INJECTION: forcing a failure. [ 284.607329] name failslab, interval 1, probability 0, space 0, times 0 [ 284.648727] CPU: 1 PID: 9273 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 284.655609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.655621] Call Trace: [ 284.667604] dump_stack+0x1c4/0x2b6 [ 284.671251] ? dump_stack_print_info.cold.1+0x20/0x20 [ 284.676471] should_fail.cold.4+0xa/0x17 [ 284.680556] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.685695] ? lock_release+0x970/0x970 [ 284.689693] ? arch_local_save_flags+0x40/0x40 [ 284.694297] ? graph_lock+0x170/0x170 [ 284.698125] ? graph_lock+0x170/0x170 [ 284.698160] ? find_held_lock+0x36/0x1c0 [ 284.698182] ? __lock_is_held+0xb5/0x140 [ 284.698212] ? ___might_sleep+0x1ed/0x300 [ 284.710143] ? arch_local_save_flags+0x40/0x40 [ 284.710161] ? kernfs_activate+0x21a/0x2c0 [ 284.710192] __should_failslab+0x124/0x180 [ 284.718920] should_failslab+0x9/0x14 [ 284.718952] kmem_cache_alloc+0x2be/0x730 [ 284.718971] ? lock_downgrade+0x900/0x900 [ 284.718987] ? do_raw_spin_lock+0xc1/0x230 [ 284.719008] ? __sanitizer_cov_trace_cmp8+0x18/0x20 15:13:19 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8933, &(0x7f0000000080)='ip6tnl0\x00') 15:13:19 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0xfcffffffffff0f00) [ 284.719029] __kernfs_new_node+0x127/0x8d0 [ 284.719062] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 284.757933] ? graph_lock+0x170/0x170 [ 284.761765] ? __lock_is_held+0xb5/0x140 [ 284.765870] ? wait_for_completion+0x8a0/0x8a0 [ 284.770502] ? mutex_unlock+0xd/0x10 [ 284.774240] ? kernfs_activate+0x21a/0x2c0 [ 284.778498] ? kernfs_walk_and_get_ns+0x340/0x340 [ 284.783353] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 284.788906] ? kernfs_link_sibling+0x1d2/0x3b0 [ 284.793513] kernfs_new_node+0x95/0x120 15:13:19 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8992, &(0x7f0000000080)='ip6tnl0\x00') [ 284.797549] __kernfs_create_file+0x5a/0x340 [ 284.801984] sysfs_add_file_mode_ns+0x222/0x530 [ 284.806688] internal_create_group+0x3df/0xd80 [ 284.811305] ? remove_files.isra.1+0x190/0x190 [ 284.815932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.821489] ? kernfs_create_link+0x1d4/0x250 [ 284.826011] sysfs_create_groups+0x9b/0x141 [ 284.830367] device_add+0x67e/0x17b0 [ 284.834105] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 284.839222] ? dev_set_name+0xad/0xe0 [ 284.843133] ? device_initialize+0x5f0/0x5f0 [ 284.847561] ? rtnl_is_locked+0xb5/0xf0 [ 284.851572] ? rtnl_trylock+0x20/0x20 [ 284.855403] netdev_register_kobject+0x187/0x3f0 [ 284.860202] register_netdevice+0x99a/0x10f0 [ 284.864642] ? netdev_change_features+0x110/0x110 [ 284.869505] ? kasan_check_read+0x11/0x20 [ 284.873701] ? rcu_bh_qs+0xc0/0xc0 [ 284.877291] ip6_tnl_create2+0x25b/0x430 [ 284.881373] ? ip6_tnl_update+0x850/0x850 [ 284.885588] ip6_tnl_locate+0x6a4/0x9a0 [ 284.889627] ? ip6_tnl_create2+0x430/0x430 [ 284.889661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.889679] ? _copy_from_user+0xdf/0x150 [ 284.889702] ip6_tnl_ioctl+0x5cd/0xbe0 [ 284.889726] ? ip6_tnl_locate+0x9a0/0x9a0 [ 284.899499] ? rcu_bh_qs+0xc0/0xc0 [ 284.899577] ? ip6_tnl_locate+0x9a0/0x9a0 [ 284.899592] dev_ifsioc+0x41d/0xa80 [ 284.899606] ? dev_ifsioc+0x41d/0xa80 [ 284.899622] ? register_gifconf+0x70/0x70 [ 284.899650] dev_ioctl+0x698/0xcc0 [ 284.899673] sock_ioctl+0x484/0x690 [ 284.899690] ? routing_ioctl+0x890/0x890 [ 284.899709] ? ___might_sleep+0x151/0x300 15:13:19 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x4000) [ 284.899727] ? arch_local_save_flags+0x40/0x40 [ 284.899758] ? routing_ioctl+0x890/0x890 [ 284.899777] do_vfs_ioctl+0x1de/0x1720 [ 284.899801] ? ioctl_preallocate+0x300/0x300 [ 284.899823] ? selinux_file_mprotect+0x620/0x620 [ 284.899857] ? __sb_end_write+0xd9/0x110 [ 284.907345] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 284.907891] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 284.907906] ? fput+0x130/0x1a0 [ 284.907928] ? do_syscall_64+0x9a/0x820 [ 284.955399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.968434] ? security_file_ioctl+0x94/0xc0 [ 284.968458] ksys_ioctl+0xa9/0xd0 [ 284.968482] __x64_sys_ioctl+0x73/0xb0 [ 284.968504] do_syscall_64+0x1b9/0x820 [ 284.968522] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.968543] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.968583] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.029727] ? trace_hardirqs_on_caller+0x310/0x310 [ 285.034778] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 285.039829] ? prepare_exit_to_usermode+0x291/0x3b0 [ 285.044885] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.049746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.049760] RIP: 0033:0x457569 [ 285.049776] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.049785] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 285.049807] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 285.092081] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 15:13:20 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x3) 15:13:20 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) [ 285.099366] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 285.106737] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 285.114198] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:20 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:20 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x541b, &(0x7f0000000000)=""/165) 15:13:20 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1f00000000000000) 15:13:20 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891e, &(0x7f0000000080)='ip6tnl0\x00') 15:13:20 executing program 1 (fault-call:6 fault-nth:27): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:20 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x800, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000080)={0xfffffffffffffffe, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0x7, 0x4) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/165) [ 285.535016] FAULT_INJECTION: forcing a failure. [ 285.535016] name failslab, interval 1, probability 0, space 0, times 0 [ 285.548579] CPU: 0 PID: 9319 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 285.555437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.564794] Call Trace: [ 285.567397] dump_stack+0x1c4/0x2b6 [ 285.571059] ? dump_stack_print_info.cold.1+0x20/0x20 [ 285.576303] should_fail.cold.4+0xa/0x17 [ 285.580390] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.585513] ? lock_release+0x970/0x970 [ 285.589495] ? arch_local_save_flags+0x40/0x40 [ 285.594109] ? graph_lock+0x170/0x170 [ 285.597916] ? graph_lock+0x170/0x170 [ 285.601732] ? find_held_lock+0x36/0x1c0 [ 285.605805] ? __lock_is_held+0xb5/0x140 [ 285.609888] ? ___might_sleep+0x1ed/0x300 [ 285.614070] ? arch_local_save_flags+0x40/0x40 [ 285.618662] ? kernfs_activate+0x21a/0x2c0 [ 285.622927] __should_failslab+0x124/0x180 [ 285.627171] should_failslab+0x9/0x14 [ 285.630991] kmem_cache_alloc+0x2be/0x730 [ 285.635177] ? lock_downgrade+0x900/0x900 [ 285.639329] ? do_raw_spin_lock+0xc1/0x230 [ 285.643575] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 285.648615] __kernfs_new_node+0x127/0x8d0 [ 285.652864] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 285.657646] ? graph_lock+0x170/0x170 [ 285.661466] ? __lock_is_held+0xb5/0x140 [ 285.665534] ? wait_for_completion+0x8a0/0x8a0 [ 285.670139] ? mutex_unlock+0xd/0x10 [ 285.673876] ? kernfs_activate+0x21a/0x2c0 [ 285.678154] ? kernfs_walk_and_get_ns+0x340/0x340 [ 285.683007] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 285.688558] ? kernfs_link_sibling+0x1d2/0x3b0 [ 285.693154] kernfs_new_node+0x95/0x120 [ 285.697140] __kernfs_create_file+0x5a/0x340 [ 285.701573] sysfs_add_file_mode_ns+0x222/0x530 [ 285.706274] internal_create_group+0x3df/0xd80 [ 285.710879] ? remove_files.isra.1+0x190/0x190 [ 285.715493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.721034] ? kernfs_create_link+0x1d4/0x250 [ 285.725561] sysfs_create_groups+0x9b/0x141 [ 285.729895] device_add+0x67e/0x17b0 [ 285.733624] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 285.738732] ? dev_set_name+0xad/0xe0 [ 285.742539] ? device_initialize+0x5f0/0x5f0 [ 285.746956] ? rtnl_is_locked+0xb5/0xf0 [ 285.750954] ? rtnl_trylock+0x20/0x20 [ 285.754776] netdev_register_kobject+0x187/0x3f0 [ 285.759553] register_netdevice+0x99a/0x10f0 [ 285.763979] ? netdev_change_features+0x110/0x110 [ 285.768829] ? kasan_check_read+0x11/0x20 [ 285.772990] ? rcu_bh_qs+0xc0/0xc0 [ 285.776556] ip6_tnl_create2+0x25b/0x430 [ 285.780631] ? ip6_tnl_update+0x850/0x850 [ 285.784811] ip6_tnl_locate+0x6a4/0x9a0 [ 285.788798] ? ip6_tnl_create2+0x430/0x430 [ 285.793056] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 285.798631] ? _copy_from_user+0xdf/0x150 [ 285.802791] ip6_tnl_ioctl+0x5cd/0xbe0 [ 285.806694] ? ip6_tnl_locate+0x9a0/0x9a0 [ 285.810851] ? rcu_bh_qs+0xc0/0xc0 [ 285.814438] ? ip6_tnl_locate+0x9a0/0x9a0 [ 285.818602] dev_ifsioc+0x41d/0xa80 [ 285.822231] ? dev_ifsioc+0x41d/0xa80 [ 285.826054] ? register_gifconf+0x70/0x70 [ 285.830248] dev_ioctl+0x698/0xcc0 [ 285.833801] sock_ioctl+0x484/0x690 [ 285.837437] ? routing_ioctl+0x890/0x890 [ 285.841507] ? ___might_sleep+0x151/0x300 [ 285.845698] ? arch_local_save_flags+0x40/0x40 [ 285.850299] ? routing_ioctl+0x890/0x890 [ 285.854369] do_vfs_ioctl+0x1de/0x1720 [ 285.858271] ? ioctl_preallocate+0x300/0x300 [ 285.862692] ? selinux_file_mprotect+0x620/0x620 [ 285.867463] ? __sb_end_write+0xd9/0x110 [ 285.871536] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 285.877085] ? fput+0x130/0x1a0 [ 285.880375] ? do_syscall_64+0x9a/0x820 [ 285.884360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.889905] ? security_file_ioctl+0x94/0xc0 [ 285.894323] ksys_ioctl+0xa9/0xd0 [ 285.897787] __x64_sys_ioctl+0x73/0xb0 [ 285.901700] do_syscall_64+0x1b9/0x820 [ 285.905620] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 285.910992] ? syscall_return_slowpath+0x5e0/0x5e0 [ 285.915924] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.920776] ? trace_hardirqs_on_caller+0x310/0x310 [ 285.925798] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 285.930828] ? prepare_exit_to_usermode+0x291/0x3b0 [ 285.935858] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.940718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.945914] RIP: 0033:0x457569 [ 285.949117] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.968024] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 285.975767] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 15:13:20 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x100000000000000) 15:13:20 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087602, &(0x7f0000000000)=""/165) 15:13:21 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000140)) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000000)=""/165) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x4170, r1, 0x3d) [ 285.983045] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 285.990326] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 285.997599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 286.004877] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:21 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x3f00000000000000) 15:13:21 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40086602, &(0x7f0000000000)=""/165) 15:13:21 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x2, &(0x7f0000000080)='ip6tnl0\x00') [ 286.412814] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:22 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:22 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 15:13:22 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x1e000000) 15:13:22 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x891f, &(0x7f0000000080)='ip6tnl0\x00') 15:13:22 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x7706, &(0x7f0000000000)=""/165) 15:13:22 executing program 1 (fault-call:6 fault-nth:28): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:22 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40000, 0x10) r2 = openat(r1, &(0x7f0000000140)='./file0\x00', 0x0, 0x84) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) 15:13:22 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x8000000000012, r0, 0x2000000000000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x4020c0, 0x0) [ 287.217126] FAULT_INJECTION: forcing a failure. [ 287.217126] name failslab, interval 1, probability 0, space 0, times 0 15:13:22 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8924, &(0x7f0000000080)='ip6tnl0\x00') [ 287.272359] CPU: 0 PID: 9369 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 287.279490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.288860] Call Trace: [ 287.291472] dump_stack+0x1c4/0x2b6 [ 287.295138] ? dump_stack_print_info.cold.1+0x20/0x20 [ 287.300375] should_fail.cold.4+0xa/0x17 [ 287.304468] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.309600] ? lock_release+0x970/0x970 [ 287.313595] ? arch_local_save_flags+0x40/0x40 [ 287.318196] ? graph_lock+0x170/0x170 [ 287.322022] ? graph_lock+0x170/0x170 [ 287.325898] ? find_held_lock+0x36/0x1c0 [ 287.329988] ? __lock_is_held+0xb5/0x140 [ 287.334525] ? ___might_sleep+0x1ed/0x300 [ 287.338693] ? arch_local_save_flags+0x40/0x40 [ 287.343290] ? kernfs_activate+0x21a/0x2c0 [ 287.347557] __should_failslab+0x124/0x180 [ 287.351818] should_failslab+0x9/0x14 [ 287.355632] kmem_cache_alloc+0x2be/0x730 [ 287.359798] ? lock_downgrade+0x900/0x900 [ 287.363962] ? do_raw_spin_lock+0xc1/0x230 15:13:22 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:13:22 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x20080000001) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:13:22 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3ff, 0x0) getdents64(r0, &(0x7f0000000200)=""/203, 0xcb) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x40087705, &(0x7f0000000140)=""/165) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x29, 0x2d, 0x0, 0x8700) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 287.368213] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 287.373254] __kernfs_new_node+0x127/0x8d0 [ 287.377515] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 287.382294] ? graph_lock+0x170/0x170 [ 287.386129] ? __lock_is_held+0xb5/0x140 [ 287.390213] ? wait_for_completion+0x8a0/0x8a0 [ 287.394835] ? mutex_unlock+0xd/0x10 [ 287.398567] ? kernfs_activate+0x21a/0x2c0 [ 287.402829] ? kernfs_walk_and_get_ns+0x340/0x340 [ 287.407693] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 287.413251] ? kernfs_link_sibling+0x1d2/0x3b0 [ 287.417864] kernfs_new_node+0x95/0x120 [ 287.421864] __kernfs_create_file+0x5a/0x340 [ 287.426304] sysfs_add_file_mode_ns+0x222/0x530 [ 287.431018] internal_create_group+0x3df/0xd80 [ 287.435713] ? remove_files.isra.1+0x190/0x190 [ 287.440321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.446664] ? kernfs_create_link+0x1d4/0x250 [ 287.451191] sysfs_create_groups+0x9b/0x141 [ 287.455529] device_add+0x67e/0x17b0 [ 287.459260] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 287.464368] ? dev_set_name+0xad/0xe0 [ 287.468191] ? device_initialize+0x5f0/0x5f0 [ 287.472608] ? rtnl_is_locked+0xb5/0xf0 [ 287.476623] ? rtnl_trylock+0x20/0x20 [ 287.480444] netdev_register_kobject+0x187/0x3f0 [ 287.485240] register_netdevice+0x99a/0x10f0 [ 287.489662] ? netdev_change_features+0x110/0x110 [ 287.494510] ? kasan_check_read+0x11/0x20 [ 287.498670] ? rcu_bh_qs+0xc0/0xc0 [ 287.502249] ip6_tnl_create2+0x25b/0x430 [ 287.506323] ? ip6_tnl_update+0x850/0x850 [ 287.510491] ip6_tnl_locate+0x6a4/0x9a0 [ 287.514478] ? ip6_tnl_create2+0x430/0x430 [ 287.518737] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.524283] ? _copy_from_user+0xdf/0x150 [ 287.528448] ip6_tnl_ioctl+0x5cd/0xbe0 [ 287.532349] ? ip6_tnl_locate+0x9a0/0x9a0 [ 287.536508] ? rcu_bh_qs+0xc0/0xc0 [ 287.540109] ? ip6_tnl_locate+0x9a0/0x9a0 [ 287.544265] dev_ifsioc+0x41d/0xa80 [ 287.547893] ? dev_ifsioc+0x41d/0xa80 [ 287.551704] ? register_gifconf+0x70/0x70 [ 287.555867] dev_ioctl+0x698/0xcc0 [ 287.559418] sock_ioctl+0x484/0x690 [ 287.563096] ? routing_ioctl+0x890/0x890 [ 287.567168] ? ___might_sleep+0x151/0x300 [ 287.571347] ? arch_local_save_flags+0x40/0x40 [ 287.575952] ? routing_ioctl+0x890/0x890 [ 287.580025] do_vfs_ioctl+0x1de/0x1720 [ 287.583947] ? ioctl_preallocate+0x300/0x300 [ 287.588369] ? selinux_file_mprotect+0x620/0x620 [ 287.593136] ? __sb_end_write+0xd9/0x110 [ 287.597208] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 287.602748] ? fput+0x130/0x1a0 [ 287.606035] ? do_syscall_64+0x9a/0x820 [ 287.610051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.615603] ? security_file_ioctl+0x94/0xc0 [ 287.620028] ksys_ioctl+0xa9/0xd0 [ 287.623510] __x64_sys_ioctl+0x73/0xb0 [ 287.627416] do_syscall_64+0x1b9/0x820 [ 287.631309] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.636683] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.641619] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.646472] ? trace_hardirqs_on_caller+0x310/0x310 [ 287.651498] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 287.656522] ? prepare_exit_to_usermode+0x291/0x3b0 [ 287.661552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.666415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.671609] RIP: 0033:0x457569 [ 287.674810] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.693734] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.701459] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 287.708754] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 287.716025] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 287.723310] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 287.730584] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 287.934610] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:23 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:23 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x9, 0x3) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000240)) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x40087705, &(0x7f0000000000)=""/165) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x8000, 0x800) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0xffff, 0x3, 0x9}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r3, 0x40fc}, 0x8) 15:13:23 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000000)=""/165) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x5, @ipv4={[], [], @multicast2}, 0x80}], 0x1c) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSETMODE(r2, 0x4b3a, 0x10000) 15:13:23 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000001c0)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x200000) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0x18, "b6baefbdf937666013d01ff514d1a50eaeedb4728bef29df"}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000100)={r3, 0x80000000}, &(0x7f0000000140)=0x8) 15:13:23 executing program 1 (fault-call:6 fault-nth:29): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:23 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40087602, &(0x7f0000000080)='ip6tnl0\x00') 15:13:23 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x20002000000000, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000340)=""/165) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x90000, 0x0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000180)={'eql\x00', 0xffffffff}) 15:13:23 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc0189436, &(0x7f0000000080)='ip6tnl0\x00') [ 288.713297] FAULT_INJECTION: forcing a failure. [ 288.713297] name failslab, interval 1, probability 0, space 0, times 0 15:13:23 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) [ 288.794668] CPU: 0 PID: 9415 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 288.801641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.811010] Call Trace: [ 288.813630] dump_stack+0x1c4/0x2b6 [ 288.817283] ? dump_stack_print_info.cold.1+0x20/0x20 [ 288.822517] should_fail.cold.4+0xa/0x17 [ 288.826603] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.831731] ? lock_release+0x970/0x970 [ 288.835724] ? arch_local_save_flags+0x40/0x40 [ 288.840328] ? graph_lock+0x170/0x170 15:13:23 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x200000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x80) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) mkdirat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x1ff) fstat(r1, &(0x7f0000000180)) [ 288.844154] ? graph_lock+0x170/0x170 [ 288.847984] ? find_held_lock+0x36/0x1c0 [ 288.852084] ? __lock_is_held+0xb5/0x140 [ 288.856180] ? ___might_sleep+0x1ed/0x300 [ 288.860351] ? arch_local_save_flags+0x40/0x40 [ 288.864944] ? kernfs_activate+0x21a/0x2c0 [ 288.869232] __should_failslab+0x124/0x180 [ 288.873489] should_failslab+0x9/0x14 [ 288.877316] kmem_cache_alloc+0x2be/0x730 [ 288.881476] ? lock_downgrade+0x900/0x900 [ 288.885640] ? do_raw_spin_lock+0xc1/0x230 [ 288.889898] ? __sanitizer_cov_trace_cmp8+0x18/0x20 15:13:23 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8993, &(0x7f0000000080)='ip6tnl0\x00') [ 288.894937] __kernfs_new_node+0x127/0x8d0 [ 288.899201] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 288.903987] ? graph_lock+0x170/0x170 [ 288.907816] ? __lock_is_held+0xb5/0x140 [ 288.911904] ? wait_for_completion+0x8a0/0x8a0 [ 288.916517] ? mutex_unlock+0xd/0x10 [ 288.920249] ? kernfs_activate+0x21a/0x2c0 [ 288.924506] ? kernfs_walk_and_get_ns+0x340/0x340 [ 288.929363] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 288.934915] ? kernfs_link_sibling+0x1d2/0x3b0 [ 288.939521] kernfs_new_node+0x95/0x120 15:13:23 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x80000000, 0x7fff}, {0xfffffffffffffffe, 0x8}]}, 0x14, 0x1) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000000)={0x8, 0x9}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 288.943531] __kernfs_create_file+0x5a/0x340 [ 288.947959] sysfs_add_file_mode_ns+0x222/0x530 [ 288.952660] internal_create_group+0x3df/0xd80 [ 288.957280] ? remove_files.isra.1+0x190/0x190 [ 288.961927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.967483] ? kernfs_create_link+0x1d4/0x250 [ 288.972011] sysfs_create_groups+0x9b/0x141 [ 288.976365] device_add+0x67e/0x17b0 [ 288.980143] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 288.985274] ? dev_set_name+0xad/0xe0 [ 288.989110] ? device_initialize+0x5f0/0x5f0 [ 288.993542] ? rtnl_is_locked+0xb5/0xf0 [ 288.997532] ? rtnl_trylock+0x20/0x20 [ 289.001366] netdev_register_kobject+0x187/0x3f0 [ 289.006145] register_netdevice+0x99a/0x10f0 [ 289.010577] ? netdev_change_features+0x110/0x110 [ 289.015440] ? kasan_check_read+0x11/0x20 [ 289.019614] ? rcu_bh_qs+0xc0/0xc0 [ 289.023188] ip6_tnl_create2+0x25b/0x430 [ 289.027275] ? ip6_tnl_update+0x850/0x850 [ 289.031456] ip6_tnl_locate+0x6a4/0x9a0 [ 289.035459] ? ip6_tnl_create2+0x430/0x430 [ 289.039737] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 289.045297] ? _copy_from_user+0xdf/0x150 [ 289.049469] ip6_tnl_ioctl+0x5cd/0xbe0 [ 289.053386] ? ip6_tnl_locate+0x9a0/0x9a0 [ 289.057562] ? rcu_bh_qs+0xc0/0xc0 [ 289.061157] ? ip6_tnl_locate+0x9a0/0x9a0 [ 289.065319] dev_ifsioc+0x41d/0xa80 [ 289.065334] ? dev_ifsioc+0x41d/0xa80 [ 289.065353] ? register_gifconf+0x70/0x70 [ 289.065383] dev_ioctl+0x698/0xcc0 [ 289.065408] sock_ioctl+0x484/0x690 [ 289.072856] ? routing_ioctl+0x890/0x890 [ 289.072876] ? ___might_sleep+0x151/0x300 [ 289.072896] ? arch_local_save_flags+0x40/0x40 [ 289.072933] ? routing_ioctl+0x890/0x890 [ 289.080625] do_vfs_ioctl+0x1de/0x1720 [ 289.080652] ? ioctl_preallocate+0x300/0x300 [ 289.080677] ? selinux_file_mprotect+0x620/0x620 [ 289.080701] ? __sb_end_write+0xd9/0x110 [ 289.080724] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 289.080744] ? fput+0x130/0x1a0 [ 289.088439] ? do_syscall_64+0x9a/0x820 [ 289.088477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.088495] ? security_file_ioctl+0x94/0xc0 [ 289.088517] ksys_ioctl+0xa9/0xd0 [ 289.088539] __x64_sys_ioctl+0x73/0xb0 [ 289.088558] do_syscall_64+0x1b9/0x820 [ 289.152368] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.157747] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.162670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.167506] ? trace_hardirqs_on_caller+0x310/0x310 [ 289.172525] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 289.177534] ? prepare_exit_to_usermode+0x291/0x3b0 [ 289.182555] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.187418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.192612] RIP: 0033:0x457569 [ 289.195821] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.214766] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 289.214786] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 289.214795] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 289.214803] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 289.214812] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 289.214822] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 [ 289.261910] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 289.360324] overlayfs: failed to resolve './file1': -2 15:13:24 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:24 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x4000, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000140)=""/39) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:13:24 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x8fc) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dfff6) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_get$uid(0x3, r1) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r3, &(0x7f0000000a80)=""/249, 0xf9, 0x10100, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000a40)={0x84, @dev={0xac, 0x14, 0x14, 0x17}, 0x4e20, 0x3, 'fo\x00', 0x5, 0x6, 0x59}, 0x2c) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000200)={{{@in, @in6=@loopback, 0x4e20, 0x10001, 0x4e21, 0x0, 0xa, 0x20, 0x80, 0x3f, r4, r1}, {0x2, 0x1000, 0x7, 0xb10, 0x7, 0x4, 0x2, 0x1f}, {0x4, 0xfff, 0xd34, 0x20}, 0x0, 0x6e6bb7, 0x2, 0x0, 0x1, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0xa}, 0x4d4, 0x3c}, 0xa, @in6=@loopback, 0x34ff, 0x3, 0x2, 0x6, 0x9, 0x1, 0xff}}, 0xe8) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000100)={'dummy0\x00', {0x2, 0x4e24, @rand_addr=0x80000001}}) 15:13:24 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x902, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) 15:13:24 executing program 1 (fault-call:6 fault-nth:30): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:24 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8942, &(0x7f0000000080)='ip6tnl0\x00') 15:13:24 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4000) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x40087705, &(0x7f0000000000)=""/165) getsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 289.625985] FAULT_INJECTION: forcing a failure. [ 289.625985] name failslab, interval 1, probability 0, space 0, times 0 [ 289.682745] CPU: 1 PID: 9461 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 289.689640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.699006] Call Trace: [ 289.701630] dump_stack+0x1c4/0x2b6 [ 289.705286] ? dump_stack_print_info.cold.1+0x20/0x20 [ 289.710517] should_fail.cold.4+0xa/0x17 [ 289.714619] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.719762] ? lock_release+0x970/0x970 [ 289.723759] ? arch_local_save_flags+0x40/0x40 [ 289.728357] ? graph_lock+0x170/0x170 [ 289.732180] ? graph_lock+0x170/0x170 [ 289.736013] ? find_held_lock+0x36/0x1c0 [ 289.740105] ? __lock_is_held+0xb5/0x140 [ 289.744201] ? ___might_sleep+0x1ed/0x300 [ 289.748365] ? arch_local_save_flags+0x40/0x40 [ 289.752988] ? kernfs_activate+0x21a/0x2c0 [ 289.757254] __should_failslab+0x124/0x180 [ 289.761515] should_failslab+0x9/0x14 [ 289.765345] kmem_cache_alloc+0x2be/0x730 [ 289.769514] ? lock_downgrade+0x900/0x900 [ 289.773679] ? do_raw_spin_lock+0xc1/0x230 [ 289.777945] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 289.782982] __kernfs_new_node+0x127/0x8d0 [ 289.787255] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 289.792030] ? graph_lock+0x170/0x170 [ 289.795875] ? __lock_is_held+0xb5/0x140 [ 289.799959] ? wait_for_completion+0x8a0/0x8a0 [ 289.804586] ? mutex_unlock+0xd/0x10 [ 289.808319] ? kernfs_activate+0x21a/0x2c0 [ 289.812585] ? kernfs_walk_and_get_ns+0x340/0x340 [ 289.817459] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 289.823022] ? kernfs_link_sibling+0x1d2/0x3b0 [ 289.827643] kernfs_new_node+0x95/0x120 [ 289.831644] __kernfs_create_file+0x5a/0x340 [ 289.836093] sysfs_add_file_mode_ns+0x222/0x530 [ 289.840799] internal_create_group+0x3df/0xd80 [ 289.845413] ? remove_files.isra.1+0x190/0x190 [ 289.845440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.845458] ? kernfs_create_link+0x1d4/0x250 [ 289.845497] sysfs_create_groups+0x9b/0x141 [ 289.855642] device_add+0x67e/0x17b0 [ 289.855672] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 289.855689] ? dev_set_name+0xad/0xe0 [ 289.855707] ? device_initialize+0x5f0/0x5f0 [ 289.855727] ? rtnl_is_locked+0xb5/0xf0 [ 289.855743] ? rtnl_trylock+0x20/0x20 [ 289.855774] netdev_register_kobject+0x187/0x3f0 [ 289.855798] register_netdevice+0x99a/0x10f0 [ 289.898582] ? netdev_change_features+0x110/0x110 [ 289.903452] ? kasan_check_read+0x11/0x20 [ 289.907631] ? rcu_bh_qs+0xc0/0xc0 [ 289.911210] ip6_tnl_create2+0x25b/0x430 [ 289.915292] ? ip6_tnl_update+0x850/0x850 [ 289.915875] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 289.919471] ip6_tnl_locate+0x6a4/0x9a0 [ 289.919496] ? ip6_tnl_create2+0x430/0x430 [ 289.919526] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 289.941224] ? _copy_from_user+0xdf/0x150 [ 289.945395] ip6_tnl_ioctl+0x5cd/0xbe0 [ 289.949341] ? ip6_tnl_locate+0x9a0/0x9a0 [ 289.953516] ? rcu_bh_qs+0xc0/0xc0 [ 289.957167] ? ip6_tnl_locate+0x9a0/0x9a0 [ 289.961340] dev_ifsioc+0x41d/0xa80 [ 289.965001] ? dev_ifsioc+0x41d/0xa80 [ 289.968880] ? register_gifconf+0x70/0x70 [ 289.973086] dev_ioctl+0x698/0xcc0 [ 289.976655] sock_ioctl+0x484/0x690 [ 289.980307] ? routing_ioctl+0x890/0x890 [ 289.984397] ? ___might_sleep+0x151/0x300 [ 289.988580] ? arch_local_save_flags+0x40/0x40 [ 289.993182] ? routing_ioctl+0x890/0x890 [ 289.997246] do_vfs_ioctl+0x1de/0x1720 [ 290.001242] ? ioctl_preallocate+0x300/0x300 [ 290.005680] ? selinux_file_mprotect+0x620/0x620 [ 290.010476] ? __sb_end_write+0xd9/0x110 [ 290.014543] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 290.020096] ? fput+0x130/0x1a0 [ 290.023372] ? do_syscall_64+0x9a/0x820 [ 290.027355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.032903] ? security_file_ioctl+0x94/0xc0 [ 290.037322] ksys_ioctl+0xa9/0xd0 [ 290.040794] __x64_sys_ioctl+0x73/0xb0 [ 290.044691] do_syscall_64+0x1b9/0x820 [ 290.048580] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.053961] ? syscall_return_slowpath+0x5e0/0x5e0 [ 290.058902] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.063763] ? trace_hardirqs_on_caller+0x310/0x310 [ 290.068860] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 290.073872] ? prepare_exit_to_usermode+0x291/0x3b0 [ 290.078898] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.083746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.088922] RIP: 0033:0x457569 [ 290.092105] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.110999] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 290.118699] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 290.125956] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 15:13:25 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0xd, 0x2, 0xff, 0x1, 0x9, 0x6, 0xfffffffffffff000}, &(0x7f0000000040)=0x20) fadvise64(r0, 0x47, 0x401, 0x3) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x24a600, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:13:25 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) [ 290.133230] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 290.140485] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 290.147753] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:25 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)='ip6tnl0\x00') 15:13:25 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x403fffc, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80, 0x800) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100), 0x4) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x200, 0x2) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) fallocate(r1, 0x8, 0x200, 0x3) 15:13:25 executing program 1 (fault-call:6 fault-nth:31): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 290.430837] FAULT_INJECTION: forcing a failure. [ 290.430837] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 290.443465] CPU: 1 PID: 9501 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 290.450318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.459687] Call Trace: [ 290.462311] dump_stack+0x1c4/0x2b6 [ 290.465970] ? dump_stack_print_info.cold.1+0x20/0x20 [ 290.471217] should_fail.cold.4+0xa/0x17 [ 290.475310] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 290.480430] ? debug_smp_processor_id+0x1c/0x20 [ 290.485149] ? perf_trace_lock_acquire+0x15b/0x800 [ 290.490109] ? is_bpf_text_address+0xac/0x170 [ 290.494648] ? mark_held_locks+0x130/0x130 [ 290.498910] ? debug_smp_processor_id+0x1c/0x20 [ 290.503601] ? perf_trace_lock_acquire+0x15b/0x800 [ 290.508545] ? delete_node+0x30e/0xd20 [ 290.512454] ? graph_lock+0x170/0x170 [ 290.516285] ? idr_destroy+0x1c0/0x1c0 [ 290.520199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.525754] ? check_preemption_disabled+0x48/0x280 [ 290.530785] ? debug_smp_processor_id+0x1c/0x20 [ 290.535480] ? perf_trace_lock_acquire+0x15b/0x800 [ 290.540432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.546003] ? should_fail+0x22d/0xd01 [ 290.549921] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 290.555061] __alloc_pages_nodemask+0x34b/0xde0 [ 290.559783] ? __alloc_pages_slowpath+0x2d70/0x2d70 [ 290.564828] ? find_held_lock+0x36/0x1c0 [ 290.568928] ? ___might_sleep+0x1ed/0x300 [ 290.573097] ? trace_hardirqs_off+0xb8/0x310 [ 290.577528] cache_grow_begin+0x91/0x8c0 [ 290.581620] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.587179] ? check_preemption_disabled+0x48/0x280 [ 290.592223] kmem_cache_alloc+0x665/0x730 [ 290.596389] ? lock_downgrade+0x900/0x900 [ 290.600561] __kernfs_new_node+0x127/0x8d0 [ 290.600598] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 290.609612] ? graph_lock+0x170/0x170 [ 290.613448] ? __lock_is_held+0xb5/0x140 [ 290.617526] ? wait_for_completion+0x8a0/0x8a0 [ 290.617563] ? mutex_unlock+0xd/0x10 [ 290.617589] ? kernfs_activate+0x21a/0x2c0 [ 290.617610] ? kernfs_walk_and_get_ns+0x340/0x340 [ 290.635027] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 290.640611] ? kernfs_link_sibling+0x1d2/0x3b0 [ 290.645231] kernfs_new_node+0x95/0x120 [ 290.649246] __kernfs_create_file+0x5a/0x340 [ 290.653689] sysfs_add_file_mode_ns+0x222/0x530 [ 290.658484] internal_create_group+0x3df/0xd80 [ 290.663105] ? remove_files.isra.1+0x190/0x190 [ 290.667720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.673277] ? kernfs_create_link+0x1d4/0x250 [ 290.677815] sysfs_create_groups+0x9b/0x141 [ 290.682156] device_add+0x67e/0x17b0 [ 290.685895] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 290.691012] ? dev_set_name+0xad/0xe0 [ 290.694842] ? device_initialize+0x5f0/0x5f0 [ 290.699295] ? rtnl_is_locked+0xb5/0xf0 [ 290.699312] ? rtnl_trylock+0x20/0x20 [ 290.699341] netdev_register_kobject+0x187/0x3f0 [ 290.711865] register_netdevice+0x99a/0x10f0 [ 290.716300] ? netdev_change_features+0x110/0x110 [ 290.721161] ? kasan_check_read+0x11/0x20 [ 290.725336] ? rcu_bh_qs+0xc0/0xc0 [ 290.728915] ip6_tnl_create2+0x25b/0x430 [ 290.733000] ? ip6_tnl_update+0x850/0x850 [ 290.737195] ip6_tnl_locate+0x6a4/0x9a0 [ 290.741199] ? ip6_tnl_create2+0x430/0x430 [ 290.745474] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.751034] ? _copy_from_user+0xdf/0x150 [ 290.755219] ip6_tnl_ioctl+0x5cd/0xbe0 [ 290.759147] ? ip6_tnl_locate+0x9a0/0x9a0 [ 290.763311] ? rcu_bh_qs+0xc0/0xc0 [ 290.766906] ? ip6_tnl_locate+0x9a0/0x9a0 [ 290.771075] dev_ifsioc+0x41d/0xa80 [ 290.774715] ? dev_ifsioc+0x41d/0xa80 [ 290.778531] ? register_gifconf+0x70/0x70 [ 290.778562] dev_ioctl+0x698/0xcc0 [ 290.778595] sock_ioctl+0x484/0x690 [ 290.789908] ? routing_ioctl+0x890/0x890 [ 290.793994] ? ___might_sleep+0x151/0x300 [ 290.798164] ? arch_local_save_flags+0x40/0x40 [ 290.802785] ? routing_ioctl+0x890/0x890 [ 290.806876] do_vfs_ioctl+0x1de/0x1720 [ 290.810804] ? ioctl_preallocate+0x300/0x300 [ 290.815249] ? selinux_file_mprotect+0x620/0x620 [ 290.820033] ? __sb_end_write+0xd9/0x110 [ 290.824155] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 290.829717] ? fput+0x130/0x1a0 [ 290.833015] ? do_syscall_64+0x9a/0x820 [ 290.837030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.842607] ? security_file_ioctl+0x94/0xc0 [ 290.847065] ksys_ioctl+0xa9/0xd0 [ 290.850557] __x64_sys_ioctl+0x73/0xb0 [ 290.854480] do_syscall_64+0x1b9/0x820 [ 290.858386] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.863762] ? syscall_return_slowpath+0x5e0/0x5e0 [ 290.868702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.873575] ? trace_hardirqs_on_caller+0x310/0x310 15:13:25 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:25 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:13:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x400, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x20000, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) r1 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x1, 0x80) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000240)={0x7, {{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0x18}, 0x5e2}}}, 0x88) 15:13:25 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4020940d, &(0x7f0000000080)='ip6tnl0\x00') 15:13:25 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0xfffffffffffffffd, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x109000) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000080)={0x1, 0x2b7d}) 15:13:25 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x4000, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000140)={'vcan0\x00', 0x77e}) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:13:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000001c0)={0x1, 0x0, {0x31, 0x36, 0x10001, 0x16, 0xb, 0x3, 0x6, 0xb, 0xffffffffffffffff}}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x400) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) 15:13:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x220003, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140)={0x4, 0x7, 0x3f, 0x2}, 0x6) 15:13:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x208002, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x6d0, 0x140, 0x388, 0x4c8, 0x388, 0x388, 0x600, 0x600, 0x600, 0x600, 0x600, 0x5, &(0x7f0000000180), {[{{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0x24, 0x101, 0x2, 0x22, 0x2}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x8, @ipv6=@local, @ipv4=@multicast2, @gre_key=0xfff, @port=0x4e24}}}, {{@ipv6={@ipv4={[], [], @rand_addr=0x9}, @local, [0xff000000, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff, 0xffffff00, 0xffffff00], 'tunl0\x00', 'yam0\x00', {0xff}, {0xff}, 0x1d, 0x1f7, 0x2}, 0x0, 0x200, 0x248, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x5b067499, 0x4ccb, 0x8000, 0x0, 0x9, 0x6, [@empty, @dev={0xfe, 0x80, [], 0x1e}, @mcast1, @ipv4={[], [], @remote}, @ipv4={[], [], @rand_addr=0x20}, @mcast2, @ipv4={[], [], @multicast1}, @empty, @empty, @remote, @remote, @local, @local, @local, @empty, @ipv4={[], [], @broadcast}], 0x1}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x4, @ipv6=@mcast1, @ipv6=@local, @icmp_id=0x64, @gre_key=0x400}}}, {{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@inet=@tcp={0x30, 'tcp\x00', 0x0, {0x4e20, 0x4e22, 0x4e20, 0x4e22, 0x4, 0x1, 0x10, 0x4}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@loopback, @ipv6=@loopback, @icmp_id=0x68, @icmp_id=0x65}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xf, 0x6, 0x6, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@rand_addr=0x6, 'dummy0\x00', 0x80}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x730) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000002640)=@assoc_value={0x0, 0x4}, &(0x7f0000002a00)=0x8) sendmmsg(r1, &(0x7f00000051c0)=[{{0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000001380)="268698437c7161b2dccde50973026bc454f685c589e0dc", 0x17}, {&(0x7f0000002a40)="2236b4e34754669375dcddeaebbc65c23962c6b5927d6ea47905206fdd1a161e9ee8775f434896d53180962f62ca982b7cf081994a23563e3180a08e67c7b95377ef6583e3c31974428e16b54d7168d977ff626f8c041c37de43aae0c44fc79bdbd51bc093566b52662d", 0x6a}, {&(0x7f0000002ac0)="315b6fb8f0c7864054c28c5e27f9d0061744e2163edbbb0bb7c3d01b92d6f3dbdab76e67fe322eec7601670dd04cb63217b528a9fbdf2c38d6a37538561ffd3b9126fe9e5a882935b25f102bdf69544c6790d67ba25ad34716e57f", 0x5b}, {&(0x7f0000002b40)="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", 0x1000}, {&(0x7f0000003b40)="64b5437e4aef71dd53aa71f1505c91be8ca0c88bdf9f597ed2c33b03382892ff30fe3505a53b6f97adf9c6c70b3dc5fb9eac08a9e0831d00c1fbe29d3cfeccf6febab0690de520763d7a5acdffc850f2f46771e3fa8b6bf49aff57763a663bbf26619f79faeb48ce73ed4a88885f682ead1fb6dd00aa6b7c7c1ef17f5042495a631c7231c745c8104a295a96dd5d42e21eb071b71bb81776ee5db0fb6d8e8692a133a55403e8", 0xa6}, {&(0x7f0000003c00)="400257a7ea56811b8f1945f245532676a5d8fe87f493d5e7e06fe6344617a77abb159a0c80148abd434092fdf64f07a3492e13ad2100af0991c5d3eaacfbd867187ddcd19e58120e2eec34b2937331df8e8b72207ff5bd9f79483927f062014085dbc4eca22d51437c82c6de049129a79d77af5a5e0f2853ae542f63d19c546f0b80712c58d3e2c16cab40175209161bc6b9c7a150b3868dd3cb5535212678cc168918c7637de359246478053c26ce53afc9", 0xb2}, {&(0x7f0000003cc0)="ee04fbb7855d4b5ab2c67fbec58cbfcf6687707fa3d5afc63a", 0x19}, {&(0x7f0000003d00)="82b19f7c731ba4092cbf19972575ef1d9f4157f72e88461a8a930e10615fb841e4d12757b9731e546e94e578a0ecde2952bb98aee5be272e4719b1cd7897c5fe893fb8b087133c78a0d95096ff03a7c0e7966ddd9b71ca4b62ade36ab1ba2f3ab783b5263779598de24765", 0x6b}, {&(0x7f0000003d80)="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", 0x1000}], 0x9, &(0x7f0000004e40)=[{0xe0, 0x0, 0x1, "77ca74ec626a9e88321fa7c7fee0be1127cecd7f36e23269977af9a497602edbfcf0a2b50f66ac17a0e6eb4e3d27f5ae06488c21b638819e0956d399133b165826bc265e8f718215b0f3f12d306fc704769a30d5c91c58180a8cbd3c0c7942df9c880e770100f71f42b5dc90fa0b66630f0e26e8090b262eaf4577294e1dbaac93941f92adf09dc7355ce8138b006f6885cce848ee61098a1128c3ae26cfc0a9df989e89cc6c591d2e90fbcf4ef1bfd51f9da8fc5cb3f427375c56bf95737efe1f44559eac7d1d75bf"}, {0x38, 0x113, 0x7, "f917300310da508fd1351fe2c5cd5bffa5d2cd4f833d17fe0b9377fc83eebfbcb43d12bdf4"}, {0x100, 0x107, 0x8, "95beb665cc31c36b3570ab249f1bd486ab93707c15d9b5877130055335837149b43e200cc7259f182a82617a11976b01eb033a89dd74293e90182e56d6be33067f042d7646c7f5936f367ef43b5d06d047a231ca24d2f1aab12c2242136a32a6496cd96659d811972b062d1c846fe103af7503904355adfd574b8d74d9c504e3a2cf458766862a1e38662ff217c4ec2740c552b3dfc21d990f7cfb464bdbd74e66e66c19d978ca6449f7fae7488aaa903831b7fdc0d212878e84f0622fdc40f7a2da2a8b6e7727eb676e849dcd793de241370ff59b74654f0e9d79af8cf479df6c8e487ab5e21afecb904523b53f0c"}, {0x28, 0x10f, 0x2, "fde0de896e5f569b8c5fc676dd94dbd5d8b69c315d33"}, {0x110, 0x11, 0x0, "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"}], 0x350, 0x40000}, 0x9}], 0x1, 0x90) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000001280)={r2, 0xf0, "97e4ed6d8e9f5eabb2315bc8a198c22be372339683200dacff0d707b41ea014de235ddaa904925da01855634620d45610a5668540c81f0dc127fca1e53a165fbad4168cab25fdad70611550612f5c86b85d78a5da9f5d3fef9611f1d7d4bdb23d93d057d53be620deec29eb0c2bb732cccdb483c175c36e87db242b1c4e1e63707cb286151957d2e50bfb7d3932e6557dc0075294aa2e40c9987b079c32258e6a3ffb2541c64262d33e74fed8aa02a1d17b93b83ace37a2fa6fbebf31a3060476a1e29a597a1fb697090d258edda2c84773bce031d624e84231d6151a7bcad9d77e630475536286921e514510decb333"}, &(0x7f0000001480)=0xf8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000013c0)=@sack_info={0x0, 0x400, 0x3f}, &(0x7f0000005200)=0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000001440)={0x0, 0xffffffffffff50d7}, &(0x7f0000002680)=0x8) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000002600)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000001a40)={0x0, @in={{0x2, 0x4e20, @remote}}, [0xff, 0x3, 0x54, 0x1, 0x100, 0xbc40, 0x2, 0x2, 0x633, 0x5, 0x6, 0x0, 0x0, 0x552f, 0x7ff]}, &(0x7f0000001b40)=0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000001b80)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000001bc0)=0x1c) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000001e00)={0x0, 0x40, 0x789f, 0x2f7a5e3b}, &(0x7f0000001e40)=0x10) sendmmsg$inet_sctp(r1, &(0x7f0000002480)=[{&(0x7f0000000940)=@in={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000dc0)=[{&(0x7f0000000980)="594983740e62bb325ef5373a1a60e316e9d19d066b19cac2965e2538655a7d32afd32e9ace74a90577e67dc0fd73cfb7876f4ccfac576788be64a3ac7625fa44ff0f6bfc1b6d0e8cf0df802a29d7d5f58fd2650fbd0f03eee704ae8c8373a0164fd9bee60d71841316c743c53db9657097a444e5b8ebb24887ad8749b5c6926cdb0958338423991b3ad872e404450134383f338b25a2b7b71380b8a04e6804dad4d941e0ac95f91e7c111e0b8f76a97e0cd47b5d8086be89cf15e8127c3023bc66318e648ce14ff154d4ab3f97a4058a18dfc7405af3", 0xd6}, {&(0x7f0000000a80)="c232a95034696ba3c8dbcb5a37aa2935c2287184061bd9214a678e58da01f1c209111e75b142312f0e465cfec7077b998782fc38f91424ed289b7a8f36a2bc7ba2b57ddc643cfafd1adf8bd46b57053c713802118200f4b99c8d0c80f9c126b99107026ebb1c2446325b67be2947d8bc4094cc1d5f0c011081172ad9064ff9a9fbe7fc34cd50c6c84d3476050de70710341b6926b38ce60ab402d6d502d2366e3fa42896d1ff6d4155a54a58797d6ad0e278c1d4fe17fb386d74a0c25af174443d5d6888728cb2be4b959fc1b3384f850a", 0xd1}, {&(0x7f0000000b80)="4c34a2ebf92064dd5ad5f289657db4a6641885548052d80bafb13a693b20f0e6406682fb82df3ae014d2be872da3cf595fdb8ca09ec03567acd10301ff665d4af2cd98722d9deb88358fd604f97982784811748c22420a408a23cba02620f010ebe81b6d89999df774f8a0cf857842a39a7b42232214b9288114ffc24c01e04df79da90ef7a886e438fb244e5ca4319ea878a73ecd163ef96190594e467363a77b661c249d3df61ead608e8144e175696736664a93f6268c9438adeee036015d18e4399866539f90d0cf", 0xca}, {&(0x7f0000000c80)="6d81c4a4e63bba394ed14a7f084a1dec00a19b658987dc8d2451a1bf013bcf748eeee7cf43170ba469900dd1e6e153c468873f5d681c", 0x36}, {&(0x7f0000000cc0)="52aec5a220533396b35e6a62837baae02dd6616debbacd2bba6d0cd5b02999660bc3bef738e8f085d6b778ad428b53b6635d792f0d97f911a7155a9414cbd429e6d81e63e584baa0b4c54ecda171b30d498182530ce8220409f922", 0x5b}, {&(0x7f0000000d40)="0780c391ff13f2e189399d2134a74e4cfbed257e47664c747ac40fe6a9249421eb636eadd01fe5c1f5f55215b7624071e9c202bd8f6130e677ce2937b98199f2a55b6f18fa5253625f", 0x49}], 0x6, &(0x7f0000000e40)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0xfe}}], 0x18, 0x4004080}, {&(0x7f0000000e80)=@in6={0xa, 0x4e24, 0x8, @remote, 0xb1bb}, 0x1c, &(0x7f0000001200)=[{&(0x7f0000000ec0)="4846cecb0ba5c2db24ee6e5db78acfba37f5e27be998be7c6440ac4ef3d0539823ce42965dca90dd3bc19c548f233169b99b606095ccb3556f9cbd66eb516d377e80b630a898dc2b5ff5c18b6d791705cfe3be844028c81a60b259d4ce74e5b000f379be4eed744bf4619a1aa20c535f6074ea99116ee9f0b3a56a00f9f1b89a9218eaa35674dc7165d7ab6e12a81c9e9bdf8c72423a7d2e02791fdd88b6a3d12b35ce395105ee7a184a1e6fc135c532e120ca1b7fd421e527523f44e24fd56e0ed54b374c65662a5ffa4671492d0ebc35b09cf93cc6f2", 0xd7}, {&(0x7f0000000fc0)="76d4fd05191fc408f1b1b6c6f87f8e46e3b4eabfaf46a29f3508712e13005185ab0a034322d8fcfdd760060b236894cfd7277c6bd76cee863f305c64f3084f8896e9c4d4af6df82e1390db7719025d", 0x4f}, {&(0x7f0000001040)="84591be68f495bd7cf0bb970133c1eb539c9bc", 0x13}, {&(0x7f0000001080)="2b30301333e9c2f060624d260ba6864fca3538f2b5c82b01902714f555a52a21857d867bf83da94e992818e67f891990014aa5304139b37ba1f783be9177bab323af3c31c11c866704d4627d6c637ac0ef4b11422faa9c1f45", 0x59}, {&(0x7f0000001100)="d1b504a7a24a6a7b226eb3d830988acb41f6888f9347695f9ce78bbf5f7903d501995bc7f9e87f6458db85db188e1184c0897b5856cd8b584d882f69f369396776153cf8429c0c2fa77bb32070aa7c4b52150de9873817033b73449e2c8dd97ee19aa9114c062757f009f6a39a636c43b50c9bffba66c237f19b36bd0791a9165e7dc85e9f3a82afc7526e389c81965aff196734ec39b9d48d1d427848279fa7e700f415a58a28835a5ece25a3b8c91a1d3389e66413063c03d22341f324fbecfe54ec", 0xc3}], 0x5, &(0x7f00000014c0)=[@init={0x18, 0x84, 0x0, {0x0, 0x68, 0x8bf, 0x100}}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0x8000, 0x4075, 0x89a5, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @sndrcv={0x30, 0x84, 0x1, {0xfffffffffffffff8, 0x1, 0x8001, 0x4, 0x1, 0xffffffffffffffc1, 0x8000, 0x3, r4}}, @sndrcv={0x30, 0x84, 0x1, {0x4, 0x10000, 0x206, 0x0, 0xf7, 0xfffffffffffffffa, 0x0, 0x10000, r5}}], 0xe8, 0x40}, {&(0x7f00000015c0)=@in6={0xa, 0x4e22, 0xffffffff, @mcast2}, 0x1c, &(0x7f0000001700)=[{&(0x7f0000001600)="dc6b138e89e5d9c587adaa90fda63b2698bb90b306b1c8e9969ced31446ea9457a4f7edd9ce9b1f78f1aebc609a210c5dc54a98c1386ee50204b7a66072602217156ffcf1a7d1d7bb8dca8e6574c744e8ace7f4f08c8cd154623923d5b78c42d75465cd2cf24180bd5cc09515181d082fc8b153ea2071586638f5684412459736d33ee7938a457149aff5e8c57f756c8ee956e462f30642f51f1f84a602920f311aedd1b3811e963e1092aea728ec2493d204274eb0e44d711ca042896fa5d00b1c57e57c3769284a4cde57b8508977d181e2e2478f93fe400a65bc1586ae36a372eee206168f8264651ecbeb2138541a5", 0xf1}], 0x1, &(0x7f0000001740)=[@authinfo={0x18, 0x84, 0x6, {0x9}}], 0x18, 0x1}, {&(0x7f0000001780)=@in6={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x1e}, 0x5}, 0x1c, &(0x7f0000001a00)=[{&(0x7f00000017c0)="62d183ce03248fe4fac87f76a4628aa50a", 0x11}, {&(0x7f0000001800)="8daac1a1b037fc90de9b75d9", 0xc}, {&(0x7f0000001840)="923203615a5983f94bcb59827e85a356677c4f4dc356639857cbf7e09d11c24ce609a091b2b0fbb23657b658b67040a9f797fc7011f07602cdba17323c361374707b266723f7f485ce756002618f14cdbf0f2876d6bbb7129699f6fed0489dd673883eacff16fe8f2c4482711c0424eeb42fcf41ac2ab4e616105dcf0820556eb721670c6a57c75d8a1e857f13be302db330b1f690e24c3eff4b768546c20e98daf178d64fd254f30905f2d4b7ebf14ed4ce804177224c4be07937e83b77478afacb9861b52a780f1631f2b9d9fe4525d6673d919db5fdac58dbc9c8015bebccf6d3e67ad40b1af2d092bea964f0855ebca8", 0xf2}, {&(0x7f0000001940)="02d5da433adc6e15596673ea41b16db5167531fd03a9c99111291452aae3941ce340ebb18198690dee870861106d2bb8d6e5ec7e30907e8e47a1c0f22130384c43640164fe414cf4a3a18417a0dd77bf90ce13ec7eb2a64d27fc1d16804002bccd84080cbdc5814edbf61cf3c2309accd58bd18fb314afdb792ef423e8d6c87a7f660658fa5ac895ae428067785d458809fd840b2e1b329b1271a6ef87a464977f95", 0xa2}], 0x4, &(0x7f0000001c00)=[@sndrcv={0x30, 0x84, 0x1, {0x800, 0x8001, 0x8, 0x80000001, 0x2, 0xffffffffffff0000, 0x3f, 0x0, r6}}, @init={0x18, 0x84, 0x0, {0x80, 0x1, 0x1, 0x400}}, @sndrcv={0x30, 0x84, 0x1, {0xd95, 0x302, 0x1, 0x4, 0x3, 0x0, 0xff, 0x80000000, r7}}], 0x78}, {&(0x7f0000001c80)=@in={0x2, 0x4e22, @local}, 0x10, &(0x7f0000001dc0)=[{&(0x7f0000001cc0)="6e35fe0bcb3e22615769ae87e22116efc85b8c0564dec4a20578243602817b837adae191f21ed9563059227bc3eeceddb97d694e45c8a6e05148ea9ee98147366ebda43b5495bb99e53946d418db80c97f2c49542a82a3db1bc2b40cda0bd12bf8d1a3590d0c9970a630a57fb1624e64a0d2edf73a99dee42fa9410e86ac49e08a4aa8dc03b07a249c99068c13e41fd237819894b4ebe7d7a415a1d0ce877d0e13aafd5bcb147338cbb72ed1db34dd44375ff614b368522bed9167be8718b544531709ef061483349e40bd3047efc32f17959d288a629b51869c46b36d3a33affe7d9d2c78506cd04d", 0xe9}], 0x1, &(0x7f0000001e80)=ANY=[@ANYBLOB="180000d9e594fa8992e3a40006000000800000000000000018000000000000008400000000000000820008002100ff0f180000000000000084000038ec0007000000e00000020000000018000000000000008400000005000000000000000400000030000000000000408400000001000000890fff07000200000900000005000000ff0f00001f0000000000", @ANYRES32=r8], 0x90, 0x81}, {&(0x7f0000001f40)=@in6={0xa, 0x4e22, 0x4, @mcast2, 0x8}, 0x1c, &(0x7f0000002400)=[{&(0x7f0000001f80)="a8ce22aadedf94867b6edbd0df892d3acd8d931602fabfa4d0f9f5", 0x1b}, {&(0x7f0000001fc0)="fcb210f4eb5b823b7df102ef6c652fb8bf7eb573e1cfb28f9fa66885dddd3b908a", 0x21}, {&(0x7f0000002000)="117aad434487262cdea0e43a40324274a6f4a058d6b8b8721a4f9c33561da82cb2ae309466f3eab028afadf0d5d6e71ac8125217eff15dd05a4ae9adabb16e9ccfe783c5d323d0e84230db8fb81e5c2586b20411896c303c7402a08b6203803e7ce64d9af51bb845fc76eb5baf687861e84ce312ccd86cd4a50780bd4950a83be549cf709d1462244d10ce6a80ceb59133a74a56c383694b4dc2bd82856769e40957e37f8d0edb8f4740ed0326927e6d2c050ebb08a7da6a29cb36091f4516bb9d0317c642faddc0d63339ac303ac288206a947dc916ceb2dc99751addc2f5", 0xdf}, {&(0x7f0000002100)="5dd7139a249a78219e844b7e56eb0fad108e1688c32ee83d0889c6cc18251a1174314002f5cc25afca33ca23dea70ebabcbcc9f1d007b72949c13df1ad67103ffa2c6bbbd78baa9ce731e8420580d1c7500163ed71f8c3d2ad08bbe9491fe5804024f224cea208ba40fd6013049989614e424cebd9143c5a39ca95cda190c3c66f345978305f530a9fc815c59fd2c4192d00072f4f68447a1318d300d448af1bdbdea53adfdb9b70dd9daa5c7eae5fdfac2e29d4425fea1aee46001b6e10d9e682a4c59d7944f44cc6cf7bcf", 0xcc}, {&(0x7f0000002200)="88bdb01df071f43bdc2082154837c45f0d744ee5cd58f1bb7831ea2bc6789fed478b2d65edbf74190f16a9536f5d31fd20f400822bf55b7153539e606074e39b6c784a9bb21908fb77e3523d16a5e2d595b236edfd38b383606b30c62b38c21a65908140231fab9c849a3b4e73f20051ed9a5043455facd896b276fb0b7f407d133abad13cb4cce0d9bde3e3f936f0dc5303", 0x92}, {&(0x7f00000022c0)="dddd5ef38b6c86715d2aef970fe0ca5ba9ac7f434acafd23f2151437a493c97318b7b5209479fdd7414784641e45ed11eb4aaef03ef6e6bdf15281f4ae94f4f1df7717f16ae8eebb1a9c5b0133cbcf020a3926851d884e18f94d95e3a47f52f9bd858fc5a9a7", 0x66}, {&(0x7f0000002340)="f4c2ddf70c11f5d9ee4794d729d2fb0dd41adf22b2cbd6366d6a2738cfea8daa1f11431f412752a1fef83b367a3ad3025de9bdb82942c8120d85e77a97780801", 0x40}, {&(0x7f0000002380)="77b784eb77431e2ed6d905ca447d3a7feb055977416049e97b0ae4bc83d1e8e450bbddc868617eba6a8b76dde6d5c6322cd37b1de4f5ded531ca7611fc126ae66a646711f83b454d", 0x48}], 0x8, 0x0, 0x0, 0x1}], 0x6, 0x4001) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000026c0)={0x4, {{0xa, 0x4e22, 0x0, @local, 0x21}}, 0x1, 0x5, [{{0xa, 0x4e22, 0x7, @mcast2, 0xfffffffffffffffa}}, {{0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x16}, 0x362}}, {{0xa, 0x4e20, 0x7f, @dev={0xfe, 0x80, [], 0x16}, 0x79fc}}, {{0xa, 0x4e24, 0xed6, @local, 0xea3}}, {{0xa, 0x4e24, 0x8, @ipv4, 0x8}}]}, 0x310) 15:13:25 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x440402, 0x0) lookup_dcookie(0x4, &(0x7f00000001c0)=""/148, 0x94) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0xb7a, 0x600400) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x1e) [ 290.878614] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 290.883647] ? prepare_exit_to_usermode+0x291/0x3b0 [ 290.888688] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.893555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.898768] RIP: 0033:0x457569 [ 290.901994] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.902005] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:13:25 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x80086601, &(0x7f0000000080)='ip6tnl0\x00') [ 290.902025] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 290.902036] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 290.902057] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 290.902067] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 290.902077] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:25 executing program 1 (fault-call:6 fault-nth:32): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 291.114164] FAULT_INJECTION: forcing a failure. [ 291.114164] name failslab, interval 1, probability 0, space 0, times 0 [ 291.130695] CPU: 1 PID: 9540 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 291.137585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.146951] Call Trace: [ 291.149561] dump_stack+0x1c4/0x2b6 [ 291.153225] ? dump_stack_print_info.cold.1+0x20/0x20 [ 291.158461] should_fail.cold.4+0xa/0x17 [ 291.162600] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.167755] ? lock_release+0x970/0x970 [ 291.171755] ? arch_local_save_flags+0x40/0x40 [ 291.176369] ? graph_lock+0x170/0x170 [ 291.180195] ? graph_lock+0x170/0x170 [ 291.184027] ? find_held_lock+0x36/0x1c0 [ 291.188125] ? __lock_is_held+0xb5/0x140 [ 291.192222] ? ___might_sleep+0x1ed/0x300 [ 291.196394] ? arch_local_save_flags+0x40/0x40 [ 291.201002] ? kernfs_activate+0x21a/0x2c0 [ 291.205293] __should_failslab+0x124/0x180 [ 291.205322] should_failslab+0x9/0x14 [ 291.213365] kmem_cache_alloc+0x2be/0x730 [ 291.213385] ? lock_downgrade+0x900/0x900 [ 291.213403] ? do_raw_spin_lock+0xc1/0x230 [ 291.213423] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 291.213445] __kernfs_new_node+0x127/0x8d0 [ 291.213469] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 291.213499] ? graph_lock+0x170/0x170 [ 291.213529] ? __lock_is_held+0xb5/0x140 [ 291.213560] ? wait_for_completion+0x8a0/0x8a0 [ 291.213612] ? mutex_unlock+0xd/0x10 [ 291.247813] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 291.252546] ? kernfs_activate+0x21a/0x2c0 [ 291.252575] ? kernfs_walk_and_get_ns+0x340/0x340 [ 291.273323] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 291.278883] ? kernfs_link_sibling+0x1d2/0x3b0 [ 291.283491] kernfs_new_node+0x95/0x120 [ 291.287534] __kernfs_create_file+0x5a/0x340 [ 291.291995] sysfs_add_file_mode_ns+0x222/0x530 [ 291.296719] internal_create_group+0x3df/0xd80 [ 291.301339] ? remove_files.isra.1+0x190/0x190 [ 291.305952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.311513] ? kernfs_create_link+0x1d4/0x250 [ 291.316038] sysfs_create_groups+0x9b/0x141 [ 291.320399] device_add+0x67e/0x17b0 [ 291.324144] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 291.329268] ? dev_set_name+0xad/0xe0 [ 291.333317] ? device_initialize+0x5f0/0x5f0 [ 291.337733] ? rtnl_is_locked+0xb5/0xf0 [ 291.341712] ? rtnl_trylock+0x20/0x20 [ 291.345529] netdev_register_kobject+0x187/0x3f0 [ 291.350278] register_netdevice+0x99a/0x10f0 [ 291.354683] ? netdev_change_features+0x110/0x110 [ 291.359537] ? kasan_check_read+0x11/0x20 [ 291.363700] ? rcu_bh_qs+0xc0/0xc0 [ 291.367243] ip6_tnl_create2+0x25b/0x430 [ 291.371313] ? ip6_tnl_update+0x850/0x850 [ 291.375466] ip6_tnl_locate+0x6a4/0x9a0 [ 291.379438] ? ip6_tnl_create2+0x430/0x430 [ 291.383693] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.389220] ? _copy_from_user+0xdf/0x150 [ 291.393390] ip6_tnl_ioctl+0x5cd/0xbe0 [ 291.397273] ? ip6_tnl_locate+0x9a0/0x9a0 [ 291.401414] ? rcu_bh_qs+0xc0/0xc0 [ 291.404966] ? ip6_tnl_locate+0x9a0/0x9a0 [ 291.409105] dev_ifsioc+0x41d/0xa80 [ 291.412734] ? dev_ifsioc+0x41d/0xa80 [ 291.416529] ? register_gifconf+0x70/0x70 [ 291.420689] dev_ioctl+0x698/0xcc0 [ 291.424261] sock_ioctl+0x484/0x690 [ 291.427880] ? routing_ioctl+0x890/0x890 [ 291.431933] ? ___might_sleep+0x151/0x300 [ 291.436080] ? arch_local_save_flags+0x40/0x40 [ 291.440663] ? routing_ioctl+0x890/0x890 [ 291.444729] do_vfs_ioctl+0x1de/0x1720 [ 291.448635] ? ioctl_preallocate+0x300/0x300 [ 291.453051] ? selinux_file_mprotect+0x620/0x620 [ 291.457974] ? __sb_end_write+0xd9/0x110 [ 291.462055] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.467648] ? fput+0x130/0x1a0 [ 291.470937] ? do_syscall_64+0x9a/0x820 [ 291.474921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.480449] ? security_file_ioctl+0x94/0xc0 [ 291.484854] ksys_ioctl+0xa9/0xd0 [ 291.488300] __x64_sys_ioctl+0x73/0xb0 [ 291.492186] do_syscall_64+0x1b9/0x820 [ 291.496088] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.501449] ? syscall_return_slowpath+0x5e0/0x5e0 [ 291.506397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.511236] ? trace_hardirqs_on_caller+0x310/0x310 [ 291.516258] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 291.521281] ? prepare_exit_to_usermode+0x291/0x3b0 [ 291.526309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.531158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.536339] RIP: 0033:0x457569 [ 291.539536] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.558461] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.566183] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 291.573578] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 291.580954] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 291.588220] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 291.595482] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:26 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:26 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x400040, 0x0) r1 = socket(0x4, 0xa, 0x40000) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000100)=0x4, 0x4) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:13:26 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000000040)=""/58, &(0x7f0000000080)=0x3a) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:13:26 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$can_bcm(r1, &(0x7f0000000240)={&(0x7f0000000140), 0x10, &(0x7f0000000200)={&(0x7f0000000180)={0x1, 0x8b0, 0x2, {}, {0x77359400}, {0x3, 0x1000, 0x7, 0x2}, 0x1, @can={{0x0, 0x8ed, 0x5, 0x10001}, 0x8, 0x3, 0x0, 0x0, "7f03d24c17a63cfc"}}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) 15:13:26 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5450, &(0x7f0000000080)='ip6tnl0\x00') 15:13:26 executing program 1 (fault-call:6 fault-nth:33): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:26 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) fcntl$setpipe(r1, 0x407, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000200)=0x14b, 0x4) fcntl$setstatus(r2, 0x4, 0x42000) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r2, &(0x7f00000002c0), 0x400000000000174, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='<\x00']) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000100)=0x2, 0x4) fstat(0xffffffffffffffff, &(0x7f0000000340)) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) 15:13:26 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x40000, 0x0) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000140)) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) [ 291.768514] FAULT_INJECTION: forcing a failure. [ 291.768514] name failslab, interval 1, probability 0, space 0, times 0 15:13:26 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8947, &(0x7f0000000080)='ip6tnl0\x00') [ 291.835627] CPU: 1 PID: 9567 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 291.842522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.851894] Call Trace: [ 291.854509] dump_stack+0x1c4/0x2b6 [ 291.858307] ? dump_stack_print_info.cold.1+0x20/0x20 [ 291.863546] should_fail.cold.4+0xa/0x17 [ 291.867641] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.872878] ? lock_release+0x970/0x970 [ 291.877016] ? arch_local_save_flags+0x40/0x40 [ 291.881627] ? graph_lock+0x170/0x170 [ 291.885445] ? graph_lock+0x170/0x170 [ 291.889280] ? find_held_lock+0x36/0x1c0 [ 291.893372] ? __lock_is_held+0xb5/0x140 [ 291.897473] ? ___might_sleep+0x1ed/0x300 [ 291.901648] ? arch_local_save_flags+0x40/0x40 [ 291.906250] ? kernfs_activate+0x21a/0x2c0 [ 291.910525] __should_failslab+0x124/0x180 [ 291.914786] should_failslab+0x9/0x14 [ 291.918612] kmem_cache_alloc+0x2be/0x730 [ 291.922886] ? lock_downgrade+0x900/0x900 [ 291.927081] ? do_raw_spin_lock+0xc1/0x230 [ 291.931341] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 291.936385] __kernfs_new_node+0x127/0x8d0 [ 291.940653] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 291.945433] ? graph_lock+0x170/0x170 [ 291.949265] ? __lock_is_held+0xb5/0x140 [ 291.953639] ? wait_for_completion+0x8a0/0x8a0 [ 291.958263] ? mutex_unlock+0xd/0x10 [ 291.961998] ? kernfs_activate+0x21a/0x2c0 [ 291.966267] ? kernfs_walk_and_get_ns+0x340/0x340 [ 291.971136] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 291.976696] ? kernfs_link_sibling+0x1d2/0x3b0 [ 291.981396] kernfs_new_node+0x95/0x120 [ 291.985464] __kernfs_create_file+0x5a/0x340 [ 291.989907] sysfs_add_file_mode_ns+0x222/0x530 [ 291.994770] internal_create_group+0x3df/0xd80 [ 291.999387] ? remove_files.isra.1+0x190/0x190 [ 292.004002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.009601] ? kernfs_create_link+0x1d4/0x250 [ 292.014139] sysfs_create_groups+0x9b/0x141 [ 292.018516] device_add+0x67e/0x17b0 [ 292.022272] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 292.027392] ? dev_set_name+0xad/0xe0 [ 292.031217] ? device_initialize+0x5f0/0x5f0 [ 292.035647] ? rtnl_is_locked+0xb5/0xf0 [ 292.039643] ? rtnl_trylock+0x20/0x20 [ 292.043478] netdev_register_kobject+0x187/0x3f0 [ 292.048350] register_netdevice+0x99a/0x10f0 [ 292.052785] ? netdev_change_features+0x110/0x110 [ 292.057649] ? kasan_check_read+0x11/0x20 [ 292.061824] ? rcu_bh_qs+0xc0/0xc0 [ 292.065402] ip6_tnl_create2+0x25b/0x430 [ 292.069484] ? ip6_tnl_update+0x850/0x850 [ 292.073675] ip6_tnl_locate+0x6a4/0x9a0 [ 292.077676] ? ip6_tnl_create2+0x430/0x430 [ 292.081985] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.087576] ? _copy_from_user+0xdf/0x150 [ 292.091760] ip6_tnl_ioctl+0x5cd/0xbe0 [ 292.095680] ? ip6_tnl_locate+0x9a0/0x9a0 [ 292.099865] ? rcu_bh_qs+0xc0/0xc0 [ 292.103472] ? ip6_tnl_locate+0x9a0/0x9a0 [ 292.107647] dev_ifsioc+0x41d/0xa80 [ 292.111293] ? dev_ifsioc+0x41d/0xa80 [ 292.115215] ? register_gifconf+0x70/0x70 [ 292.119398] dev_ioctl+0x698/0xcc0 [ 292.123026] sock_ioctl+0x484/0x690 [ 292.126749] ? routing_ioctl+0x890/0x890 [ 292.130962] ? ___might_sleep+0x151/0x300 [ 292.135136] ? arch_local_save_flags+0x40/0x40 [ 292.139760] ? routing_ioctl+0x890/0x890 [ 292.143848] do_vfs_ioctl+0x1de/0x1720 [ 292.147896] ? ioctl_preallocate+0x300/0x300 [ 292.152343] ? selinux_file_mprotect+0x620/0x620 [ 292.157440] ? __sb_end_write+0xd9/0x110 [ 292.161526] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 292.167092] ? fput+0x130/0x1a0 [ 292.170663] ? do_syscall_64+0x9a/0x820 [ 292.174667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.180471] ? security_file_ioctl+0x94/0xc0 [ 292.185266] ksys_ioctl+0xa9/0xd0 [ 292.188748] __x64_sys_ioctl+0x73/0xb0 [ 292.192765] do_syscall_64+0x1b9/0x820 [ 292.196676] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.202073] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.207343] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.212430] ? trace_hardirqs_on_caller+0x310/0x310 [ 292.217468] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 292.222505] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.227554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.232439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.237656] RIP: 0033:0x457569 [ 292.240904] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.259824] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.267910] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 292.275204] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 15:13:27 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000080)={0x2, 0x1, &(0x7f0000000040)=""/26, &(0x7f0000000100)=""/226, &(0x7f0000000200)=""/108, 0x100000}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 292.282490] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 292.289776] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 292.297073] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:27 executing program 1 (fault-call:6 fault-nth:34): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:27 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4b47, &(0x7f0000000080)='ip6tnl0\x00') [ 292.592736] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 292.637925] FAULT_INJECTION: forcing a failure. [ 292.637925] name failslab, interval 1, probability 0, space 0, times 0 [ 292.679611] CPU: 0 PID: 9602 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 292.686507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.695873] Call Trace: [ 292.698481] dump_stack+0x1c4/0x2b6 [ 292.702133] ? dump_stack_print_info.cold.1+0x20/0x20 [ 292.707364] should_fail.cold.4+0xa/0x17 [ 292.711452] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.716571] ? lock_release+0x970/0x970 [ 292.720559] ? arch_local_save_flags+0x40/0x40 [ 292.725168] ? graph_lock+0x170/0x170 [ 292.728970] ? graph_lock+0x170/0x170 [ 292.732791] ? find_held_lock+0x36/0x1c0 [ 292.736913] ? __lock_is_held+0xb5/0x140 [ 292.741005] ? ___might_sleep+0x1ed/0x300 [ 292.745196] ? arch_local_save_flags+0x40/0x40 [ 292.749795] ? kernfs_activate+0x21a/0x2c0 [ 292.754080] __should_failslab+0x124/0x180 [ 292.758345] should_failslab+0x9/0x14 [ 292.762166] kmem_cache_alloc+0x2be/0x730 [ 292.766331] ? lock_downgrade+0x900/0x900 [ 292.770501] ? do_raw_spin_lock+0xc1/0x230 [ 292.774768] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 292.779777] __kernfs_new_node+0x127/0x8d0 [ 292.784012] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 292.788778] ? graph_lock+0x170/0x170 [ 292.792580] ? __lock_is_held+0xb5/0x140 [ 292.796639] ? wait_for_completion+0x8a0/0x8a0 [ 292.801228] ? mutex_unlock+0xd/0x10 [ 292.804928] ? kernfs_activate+0x21a/0x2c0 [ 292.809157] ? kernfs_walk_and_get_ns+0x340/0x340 [ 292.814001] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 292.819537] ? kernfs_link_sibling+0x1d2/0x3b0 [ 292.824113] kernfs_new_node+0x95/0x120 [ 292.828117] __kernfs_create_file+0x5a/0x340 [ 292.832539] sysfs_add_file_mode_ns+0x222/0x530 [ 292.837211] internal_create_group+0x3df/0xd80 [ 292.841805] ? remove_files.isra.1+0x190/0x190 [ 292.846383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.851939] ? kernfs_create_link+0x1d4/0x250 [ 292.856428] sysfs_create_groups+0x9b/0x141 [ 292.860742] device_add+0x67e/0x17b0 [ 292.864466] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 292.869599] ? dev_set_name+0xad/0xe0 [ 292.873403] ? device_initialize+0x5f0/0x5f0 [ 292.877802] ? rtnl_is_locked+0xb5/0xf0 [ 292.881790] ? rtnl_trylock+0x20/0x20 [ 292.885588] netdev_register_kobject+0x187/0x3f0 [ 292.890339] register_netdevice+0x99a/0x10f0 [ 292.894801] ? netdev_change_features+0x110/0x110 [ 292.899632] ? kasan_check_read+0x11/0x20 [ 292.903772] ? rcu_bh_qs+0xc0/0xc0 [ 292.907314] ip6_tnl_create2+0x25b/0x430 [ 292.911372] ? ip6_tnl_update+0x850/0x850 [ 292.915520] ip6_tnl_locate+0x6a4/0x9a0 [ 292.919517] ? ip6_tnl_create2+0x430/0x430 [ 292.923751] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.929279] ? _copy_from_user+0xdf/0x150 [ 292.933421] ip6_tnl_ioctl+0x5cd/0xbe0 [ 292.937300] ? ip6_tnl_locate+0x9a0/0x9a0 [ 292.941438] ? rcu_bh_qs+0xc0/0xc0 [ 292.945008] ? ip6_tnl_locate+0x9a0/0x9a0 [ 292.949149] dev_ifsioc+0x41d/0xa80 [ 292.952760] ? dev_ifsioc+0x41d/0xa80 [ 292.956551] ? register_gifconf+0x70/0x70 [ 292.960695] dev_ioctl+0x698/0xcc0 [ 292.964236] sock_ioctl+0x484/0x690 [ 292.967894] ? routing_ioctl+0x890/0x890 [ 292.971969] ? ___might_sleep+0x151/0x300 [ 292.976130] ? arch_local_save_flags+0x40/0x40 [ 292.980712] ? routing_ioctl+0x890/0x890 [ 292.984762] do_vfs_ioctl+0x1de/0x1720 [ 292.988644] ? ioctl_preallocate+0x300/0x300 [ 292.993064] ? selinux_file_mprotect+0x620/0x620 [ 292.997817] ? __sb_end_write+0xd9/0x110 [ 293.001874] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 293.007398] ? fput+0x130/0x1a0 [ 293.010667] ? do_syscall_64+0x9a/0x820 [ 293.014634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.020164] ? security_file_ioctl+0x94/0xc0 [ 293.024577] ksys_ioctl+0xa9/0xd0 [ 293.028037] __x64_sys_ioctl+0x73/0xb0 [ 293.031958] do_syscall_64+0x1b9/0x820 [ 293.035847] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 293.041203] ? syscall_return_slowpath+0x5e0/0x5e0 [ 293.046120] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.050953] ? trace_hardirqs_on_caller+0x310/0x310 [ 293.055959] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 293.060989] ? prepare_exit_to_usermode+0x291/0x3b0 [ 293.065999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.070835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.076010] RIP: 0033:0x457569 [ 293.079195] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.098097] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.105814] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 293.113075] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 293.120334] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 15:13:28 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1c1000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000100)) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:13:28 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='exofs\x00', 0x4, &(0x7f00000001c0)='em1user}cgroup\x00') 15:13:28 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x10100, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) 15:13:28 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x2, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:28 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8931, &(0x7f0000000080)='ip6tnl0\x00') [ 293.127606] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 293.134861] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:28 executing program 1 (fault-call:6 fault-nth:35): sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:28 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x200000, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x1ff, 0x3, 0xcedc}) 15:13:28 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x3, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) write(r0, &(0x7f00000000c0)="bacbd39b78b4af525b27f74c96c9236db2c98c8d1fa951", 0x17) 15:13:28 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000080)='ip6tnl0\x00') 15:13:28 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x3) r1 = geteuid() syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2, &(0x7f0000000080)=[{&(0x7f0000000100)="4becbf788e8bc61f952091e2b52ff20c536da81f5aaf47da6ee125d5e0f4fdd7182395631b24554fbc6695c01f3f79d89763261362d85056931becc58f1ac0ee65e1f33b5207c2855aed21a60ee76d77e146dfbdc1d63947fac9993f9353edbc72ed3c6c0afa", 0x66, 0x4}, {&(0x7f0000000180)="14fe6bd78aaaa02d134bc524affc6c2ac47c54f06dcf29fe29a3d6d292a3d56f5615d405696835ab94633660cd13f16bcc1a8e252b3166b02332ee7a76b9d6650bf27e21dde39b8ee576f75ae06dca9c1f32884711954a49d6bf56829336c3639e26f8f0b8fc79cc71198852fc44428f6b2cef53ea439d9fefc74a3a512392ac8d35d8e0c70ba12f4bdd781a8f9870a65c9526a2545a4dfbb380ec8ab04eda347b962f4f31f7be99de65eec6b75515169dc3c07398b61081f675dfefb902e4435c5f0e2d42096c5b0fbe93d03b62d05bcc1e5b7cf8757d", 0xd7, 0x4}], 0x20020, &(0x7f00000004c0)=ANY=[@ANYBLOB='mode=0x0000000000000000,map=acorn,uid<', @ANYRESDEC=r1, @ANYBLOB="52509e77b7b96f68f4c463855df000"]) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000440)='/dev/usbmon#\x00', 0xd3, 0x60200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f0000000480)=0x10001) 15:13:28 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x840, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000140)={&(0x7f0000003000/0x2000)=nil, 0x0, 0x5, 0x30, &(0x7f0000ffe000/0x1000)=nil, 0x2e}) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0x6}, 0x28, 0x3) [ 293.378756] FAULT_INJECTION: forcing a failure. [ 293.378756] name failslab, interval 1, probability 0, space 0, times 0 [ 293.442911] CPU: 1 PID: 9626 Comm: syz-executor1 Not tainted 4.19.0+ #78 [ 293.449812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.459178] Call Trace: [ 293.461793] dump_stack+0x1c4/0x2b6 [ 293.465437] ? dump_stack_print_info.cold.1+0x20/0x20 [ 293.470667] should_fail.cold.4+0xa/0x17 [ 293.474749] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 293.479870] ? lock_release+0x970/0x970 [ 293.483851] ? arch_local_save_flags+0x40/0x40 [ 293.488449] ? graph_lock+0x170/0x170 [ 293.492266] ? graph_lock+0x170/0x170 [ 293.496093] ? find_held_lock+0x36/0x1c0 [ 293.500173] ? __lock_is_held+0xb5/0x140 [ 293.504262] ? ___might_sleep+0x1ed/0x300 [ 293.508431] ? arch_local_save_flags+0x40/0x40 [ 293.513028] ? kernfs_activate+0x21a/0x2c0 [ 293.517299] __should_failslab+0x124/0x180 [ 293.521554] should_failslab+0x9/0x14 [ 293.525378] kmem_cache_alloc+0x2be/0x730 [ 293.529539] ? lock_downgrade+0x900/0x900 [ 293.533704] ? ___preempt_schedule+0x16/0x18 [ 293.538125] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 293.543159] __kernfs_new_node+0x127/0x8d0 [ 293.547405] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 293.552176] ? graph_lock+0x170/0x170 [ 293.555996] ? __lock_is_held+0xb5/0x140 [ 293.560078] ? wait_for_completion+0x8a0/0x8a0 [ 293.564688] ? mutex_unlock+0xd/0x10 [ 293.568409] ? kernfs_activate+0x21a/0x2c0 [ 293.572662] ? kernfs_walk_and_get_ns+0x340/0x340 [ 293.577538] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 293.583090] ? kernfs_link_sibling+0x1d2/0x3b0 [ 293.587692] kernfs_new_node+0x95/0x120 [ 293.591689] __kernfs_create_file+0x5a/0x340 [ 293.596117] sysfs_add_file_mode_ns+0x222/0x530 [ 293.600809] internal_create_group+0x3df/0xd80 [ 293.605416] ? remove_files.isra.1+0x190/0x190 [ 293.610057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.615618] ? kernfs_create_link+0x1d4/0x250 [ 293.620139] sysfs_create_groups+0x9b/0x141 [ 293.624501] device_add+0x67e/0x17b0 [ 293.628240] ? get_device_parent.isra.27+0x5a0/0x5a0 [ 293.633360] ? dev_set_name+0xad/0xe0 [ 293.637172] ? device_initialize+0x5f0/0x5f0 [ 293.641597] ? rtnl_is_locked+0xb5/0xf0 [ 293.645612] ? rtnl_trylock+0x20/0x20 [ 293.649436] netdev_register_kobject+0x187/0x3f0 [ 293.654210] register_netdevice+0x99a/0x10f0 [ 293.658632] ? netdev_change_features+0x110/0x110 [ 293.663484] ? kasan_check_read+0x11/0x20 [ 293.667649] ? rcu_bh_qs+0xc0/0xc0 [ 293.671214] ip6_tnl_create2+0x25b/0x430 [ 293.675287] ? ip6_tnl_update+0x850/0x850 [ 293.679475] ip6_tnl_locate+0x6a4/0x9a0 [ 293.683481] ? ip6_tnl_create2+0x430/0x430 [ 293.687739] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 293.693299] ? _copy_from_user+0xdf/0x150 [ 293.697469] ip6_tnl_ioctl+0x5cd/0xbe0 [ 293.701383] ? ip6_tnl_locate+0x9a0/0x9a0 [ 293.705553] ? rcu_bh_qs+0xc0/0xc0 [ 293.709176] ? ip6_tnl_locate+0x9a0/0x9a0 [ 293.713340] dev_ifsioc+0x41d/0xa80 [ 293.716978] ? dev_ifsioc+0x41d/0xa80 [ 293.720791] ? register_gifconf+0x70/0x70 [ 293.725069] dev_ioctl+0x698/0xcc0 [ 293.728627] sock_ioctl+0x484/0x690 [ 293.732265] ? routing_ioctl+0x890/0x890 [ 293.736371] ? ___might_sleep+0x151/0x300 [ 293.740536] ? arch_local_save_flags+0x40/0x40 [ 293.745152] ? routing_ioctl+0x890/0x890 [ 293.749224] do_vfs_ioctl+0x1de/0x1720 [ 293.753134] ? ioctl_preallocate+0x300/0x300 [ 293.757557] ? selinux_file_mprotect+0x620/0x620 [ 293.762335] ? __sb_end_write+0xd9/0x110 [ 293.766415] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 293.771959] ? fput+0x130/0x1a0 [ 293.775250] ? do_syscall_64+0x9a/0x820 [ 293.779241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.784822] ? security_file_ioctl+0x94/0xc0 [ 293.789271] ksys_ioctl+0xa9/0xd0 [ 293.792744] __x64_sys_ioctl+0x73/0xb0 [ 293.796652] do_syscall_64+0x1b9/0x820 [ 293.800661] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 293.806050] ? syscall_return_slowpath+0x5e0/0x5e0 [ 293.810994] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.815850] ? trace_hardirqs_on_caller+0x310/0x310 [ 293.820888] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 293.825922] ? prepare_exit_to_usermode+0x291/0x3b0 [ 293.830957] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.835822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.841019] RIP: 0033:0x457569 [ 293.844228] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.863145] RSP: 002b:00007f2f7908bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.870869] RAX: ffffffffffffffda RBX: 00007f2f7908bc90 RCX: 0000000000457569 [ 293.878251] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 293.885529] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 15:13:28 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x4, 0x8000) [ 293.892804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f7908c6d4 [ 293.900688] R13: 00000000004c8630 R14: 00000000004d0828 R15: 0000000000000006 15:13:28 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r1, &(0x7f0000000140)=0x4) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000003c0)=0x2, 0x4) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x80000000008dffff) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@local, @in6=@local, 0x4e20, 0x1, 0x5, 0x1000, 0x2, 0x80, 0x80, 0x0, 0x0, r3}, {0x3, 0x1, 0x8, 0xedc6, 0x6, 0x6, 0x800, 0x1}, {0xd2d2, 0x80, 0x8, 0x2}, 0x6, 0x6e6bb8, 0x2, 0x1, 0x3, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4d4, 0x3e}, 0xa, @in=@broadcast, 0x3505, 0x4, 0x1, 0x1, 0xffffffffffff8000, 0x2, 0x10}}, 0xe8) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rfkill\x00', 0xc04a975d661c445d, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000180)={0x0, 0x3f}) mmap(&(0x7f0000700000/0x3000)=nil, 0x3000, 0x100000000000000, 0x41010, r2, 0x0) 15:13:28 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40086602, &(0x7f0000000080)='ip6tnl0\x00') [ 294.101155] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 15:13:29 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) [ 294.350952] overlayfs: failed to resolve './file1': -2 15:13:29 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x200000001a, &(0x7f0000222000)=0x9, 0x4) shutdown(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000a00)='lo.\x00', 0x0, 0x100, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000248) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x20000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) r3 = getpid() ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000340)={0x1, 0x0, [0x0]}) sched_setscheduler(r3, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000700)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000440)=&(0x7f0000000380)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)={0x84, @remote, 0x4e20, 0x0, 'dh\x00', 0x28, 0x0, 0x42}, 0x2c) fcntl$getown(r0, 0x9) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f00000003c0)) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/59) connect$inet6(0xffffffffffffffff, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:13:29 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x8000, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x40087705, &(0x7f0000000000)=""/165) 15:13:29 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 15:13:29 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/165) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x54, r2, 0x300, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x8800}, 0x0) fchdir(r1) 15:13:29 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7fffffffffffffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x782, 0x0) 15:13:29 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000600)=@generic={0x0, "c097dfc733773e4dbe875d202386d905568031517b14d5f7a87da1781d40ddeb8d27b926213f10c6983440b9b69f95b8e7be714a2d19f880f08c45d6f3c48db4a04a3ac44a965f29596ec3981bb827ca175556e5b88458c8f16c2a34122c4e99eaff47a6b83b787fae30327b54572bd7fbd7ad36a87636ab644c0c0c1ab4"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x2}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f00000006c0), 0xffffffffffffe43, 0x0, 0x0, 0x8084}, 0x0) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000080)='ip6tnl0\x00') [ 294.530673] ------------[ cut here ]------------ [ 294.561748] memory commitment underflow [ 294.561927] WARNING: CPU: 1 PID: 9678 at mm/util.c:652 __vm_enough_memory+0x738/0x960 [ 294.573924] Kernel panic - not syncing: panic_on_warn set ... [ 294.573924] [ 294.581315] CPU: 1 PID: 9678 Comm: blkid Not tainted 4.19.0+ #78 [ 294.587463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.596819] Call Trace: [ 294.599421] dump_stack+0x1c4/0x2b6 [ 294.603087] ? dump_stack_print_info.cold.1+0x20/0x20 [ 294.608312] panic+0x238/0x4e7 [ 294.611529] ? add_taint.cold.5+0x16/0x16 [ 294.615714] ? __warn.cold.8+0x5/0x4a [ 294.619532] ? __warn+0xe8/0x1d0 [ 294.621480] kobject: 'loop2' (000000003da46716): kobject_uevent_env [ 294.622924] ? __vm_enough_memory+0x738/0x960 [ 294.633824] __warn.cold.8+0x20/0x4a [ 294.637568] ? rcu_bh_qs+0xc0/0xc0 [ 294.641131] ? __vm_enough_memory+0x738/0x960 [ 294.645644] report_bug+0x254/0x2d0 [ 294.649294] do_error_trap+0x1fc/0x4d0 [ 294.650012] kobject: 'loop2' (000000003da46716): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 294.653200] ? math_error+0x3f0/0x3f0 [ 294.653220] ? vprintk_default+0x28/0x30 [ 294.653237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.653257] ? trace_hardirqs_on_caller+0x310/0x310 [ 294.653276] ? printk+0xa7/0xcf [ 294.683746] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.688623] do_invalid_op+0x1b/0x20 [ 294.692355] invalid_op+0x14/0x20 [ 294.695846] RIP: 0010:__vm_enough_memory+0x738/0x960 15:13:29 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x8000, 0x0) write$P9_RLINK(r1, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x80000000008dffff) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 15:13:29 executing program 5: [ 294.700958] Code: b2 d2 ff 0f b6 85 28 fe ff ff 84 c0 0f 85 4a fa ff ff e8 3b b1 d2 ff 48 c7 c7 20 87 12 88 c6 05 50 c3 42 08 01 e8 e8 75 9c ff <0f> 0b 48 b8 00 00 00 00 00 fc ff df 4c 89 f2 48 c1 ea 03 0f b6 14 [ 294.719962] RSP: 0018:ffff880184447668 EFLAGS: 00010286 [ 294.725358] RAX: 0000000000000000 RBX: 1ffff10030888ed1 RCX: 0000000000000000 [ 294.732638] RDX: 0000000000000000 RSI: ffffffff8164d6e5 RDI: 0000000000000005 [ 294.739929] RBP: ffff880184447850 R08: ffff8801844a8140 R09: ffffed003b5e3ee2 [ 294.743963] kobject: 'loop5' (0000000024c9c332): kobject_uevent_env [ 294.747217] R10: ffffed003b5e3ee2 R11: ffff8801daf1f717 R12: ffff880184447828 [ 294.747228] R13: 0000000000000c61 R14: ffffffff8941dc20 R15: 0000000000000001 [ 294.747260] ? vprintk_func+0x85/0x181 [ 294.747283] ? __vm_enough_memory+0x738/0x960 [ 294.747301] ? vm_commit_limit+0xd0/0xd0 [ 294.747325] ? kasan_check_read+0x11/0x20 [ 294.784867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.790436] ? cred_has_capability+0x1e1/0x430 [ 294.795036] ? selinux_ipv4_output+0x50/0x50 [ 294.799482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.802297] kobject: 'loop5' (0000000024c9c332): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 294.805030] ? validate_mm+0x509/0x630 [ 294.805063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.805078] ? cap_capable+0x1f9/0x260 [ 294.805109] security_vm_enough_memory_mm+0x9d/0xc0 [ 294.805129] mmap_region+0x3ad/0x1cd0 [ 294.805159] ? __x64_sys_brk+0x7d0/0x7d0 [ 294.840864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.846442] ? mpx_unmapped_area_check+0xd8/0x108 [ 294.851313] ? arch_get_unmapped_area+0x750/0x750 [ 294.856188] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 15:13:29 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x1, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000000)=""/165) [ 294.861743] ? selinux_mmap_addr+0x2d/0x110 [ 294.866084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.871646] ? security_mmap_addr+0x80/0xa0 [ 294.875989] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 294.881581] ? get_unmapped_area+0x292/0x3b0 [ 294.886018] do_mmap+0xa22/0x1230 [ 294.889504] ? mmap_region+0x1cd0/0x1cd0 [ 294.893591] ? vm_mmap_pgoff+0x1b5/0x2c0 [ 294.897669] ? down_read_killable+0x1f0/0x1f0 [ 294.902183] ? security_mmap_file+0x174/0x1b0 [ 294.906705] vm_mmap_pgoff+0x213/0x2c0 [ 294.910639] ? vma_is_stack_for_current+0xd0/0xd0 [ 294.915500] ? up_write+0x7b/0x220 [ 294.915724] kobject: 'loop0' (00000000578a2e26): kobject_uevent_env [ 294.919081] ? up_read+0x110/0x110 [ 294.919104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.919141] ksys_mmap_pgoff+0x4da/0x660 [ 294.919159] ? do_syscall_64+0x9a/0x820 [ 294.919178] ? find_mergeable_anon_vma+0xd0/0xd0 [ 294.919195] ? trace_hardirqs_on+0xbd/0x310 [ 294.919209] ? mprotect_fixup+0xc60/0xc60 [ 294.919229] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.919246] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 294.919269] __x64_sys_mmap+0xe9/0x1b0 [ 294.932709] kobject: 'loop0' (00000000578a2e26): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 294.934760] do_syscall_64+0x1b9/0x820 [ 294.934779] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 294.934799] ? syscall_return_slowpath+0x5e0/0x5e0 [ 294.934815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.934835] ? trace_hardirqs_on_caller+0x310/0x310 [ 294.934853] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 294.934873] ? prepare_exit_to_usermode+0x291/0x3b0 [ 294.934897] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.934923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.934944] RIP: 0033:0x7f9b65bdb3ea [ 294.948686] overlayfs: failed to resolve './file1': -2 [ 294.952059] Code: 48 8d 3d 81 69 00 00 b2 84 e8 52 ec ff ff f7 d8 89 05 ae ad 20 00 eb c6 90 90 90 90 90 90 90 90 49 89 ca b8 09 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 8a ad 20 00 31 d2 48 29 c2 89 [ 294.952069] RSP: 002b:00007ffe2191aef8 EFLAGS: 00000206 ORIG_RAX: 0000000000000009 [ 294.952087] RAX: ffffffffffffffda RBX: 00007f9b65de34c8 RCX: 00007f9b65bdb3ea [ 294.952097] RDX: 0000000000000003 RSI: 0000000000004000 RDI: 00007f9b65bc1000 [ 294.952106] RBP: 00007ffe2191b1c0 R08: 0000000000000003 R09: 0000000000023000 [ 294.952116] R10: 0000000000000812 R11: 0000000000000206 R12: 00007ffe2191b2a8 [ 294.952131] R13: 0000000000000002 R14: 00007ffe2191af70 R15: 00007ffe2191af40 [ 295.048533] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. [ 295.061084] Kernel Offset: disabled [ 295.108978] Rebooting in 86400 seconds..