='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 5: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:38 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 1: r0 = creat(&(0x7f0000001dc0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x6) 21:37:38 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:38 executing program 5: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100), 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 5: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:38 executing program 5: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:38 executing program 1: r0 = creat(&(0x7f0000001dc0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)) mount(&(0x7f0000000100)=@nbd={'/dev/nbd'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x6) 21:37:39 executing program 1: prctl$void(0x1e) socketpair(0x0, 0xe, 0x45, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x7fffe) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vhci\x00', 0x80, 0x0) ioctl$BLKGETSIZE(r5, 0x1260, &(0x7f0000000700)) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000e40), &(0x7f0000000f40)=0x8) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) r6 = syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x3ff, 0x101000) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r2) write$P9_RREADDIR(r4, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) fstat(r3, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='./file1\x00', r8, r11) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000c00)=[{&(0x7f0000000580)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000440)="86d0bdd6917e637848521fb1a42596e952b4901c", 0x14}, {&(0x7f0000000600)="e16719207f7f26c3620db37d89332ac8d854ccd273d9d497036dbf2b5794e078f04fb1b790328a742f177fb2c5c57efb091efc829692e32cf01813a732d66c8d", 0x40}, {&(0x7f0000000640)="c285728be9f20cdaa7ee8e74444f988b6a2f7304e6193bad", 0x18}], 0x3, &(0x7f0000000f80)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r3, @ANYBLOB="38000000000000000100000001000000", @ANYRES32=r6, @ANYRES32=r1, @ANYRES32=r6, @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r4, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r3, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r1, @ANYRES32=r3, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r1, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r11, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r10, @ANYRES32=r9, @ANYBLOB="2f02dc704f5e02b37858b47661891f84b9367c785e0bd911fcfe517850ae884b1757e37f8b5841dcf32a088df91ec98de171e273fa6e1fcdfeea90aa7250d04caaaf6ede5448b343e17af9"], 0x158, 0x10}, {&(0x7f0000000880)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000940)="d948b415d5794684459017d739b7b3843b988581a4f0ba4de4fdcd7efa92511d", 0x20}, {&(0x7f0000000980)="4da0ad99795645882fc86bd518036ff0c6b53bb1a38399322cbf90085109158486dbd776a938a66342cc0eb26dc05cdee84b9f7202461ac0087b355d17768c4af488b1d3958cc74a1073b992423b4ee4600953e9fa0b45e1d3036a2be733d8446036f70c11858e2a53b9799eb64cd3325e18427f4fbe508f49e53304377949cf1f88cb206d98400ca5a7990fac90", 0x8e}, {&(0x7f0000000a40)="52ec0592b26610abe496b3de7c654715f6a11eb0c00621b142be6f06dfa91223b7967471b20e1079879e7c98084920017dde83474223d07fd27b6a247a412bf12ac2b563cbbec475773f2f5b7951d3bf839f4f6cf801e532448c8a79f34c2188acd8e606af9d24f8502906653bcbca0ff6d3073a00aac34c7a04b04d9f7029727a91c6ac2088", 0x86}], 0x3, &(0x7f0000000b40)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r7, r10, r9}, @rights={0x10}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r7, r10, r11}], 0xa8, 0x8080}], 0x2, 0x0) r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000cc0)=@sack_info={0x0, 0x6, 0x5}, &(0x7f0000000d00)=0xc) sendmsg$nl_netfilter(r6, &(0x7f0000001180)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001140)={&(0x7f0000000780)={0xac, 0x13, 0xb, 0x400, 0x70bd26, 0x25dfdbfe, {0x3, 0x0, 0x2}, [@typed={0x8, 0x90, @pid=r7}, @typed={0x8, 0x4b, @fd=r12}, @typed={0x8, 0x3d, @uid=r8}, @nested={0x80, 0x16, [@generic="3ddb27738fb59b784a81ed42d970d981005b2ec68a8d9727d42d36b8ed5a493b1433ccbd0cd31ac0248534676797234ffef8fc37e9b928f5d86fb1b325e9f501478854dfe04bfca915c4cab23999b7c70df205e9078914b22483b694e17bbcfac4efaa166759485db851e35ff9e066e8f767c13dc667400449e252e9"]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4}, 0x4000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000d40)={r13, @in={{0x2, 0x4e22, @broadcast}}, 0x2, 0x4, 0xffffffff, 0xfe6, 0x6}, &(0x7f0000000e00)=0x98) write$FUSE_IOCTL(r6, &(0x7f0000000c80)={0x20, 0x0, 0x4, {0x2, 0x4, 0x8, 0x20}}, 0x20) lsetxattr$system_posix_acl(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f00000011c0)=ANY=[@ANYBLOB="02000000010007000000000002000100", @ANYRES32=0x0, @ANYBLOB="02000200d985717888314aace4f0226470280c5702ba24f0f8da09196d504fcd80e77e34015105c127161020e401b6cfedcf83b1412056eef3ac63edf01badbf257628ffb113d953293a81280bdc59a5c69b7886bdf89e5cab2ad4", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02000600", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="040004000000000008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="10000100000000002000050000000000"], 0x8c, 0x3) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000040)) 21:37:39 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:39 executing program 5: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 229.324628] 9pnet: Insufficient options for proto=fd [ 229.337596] 9pnet: Insufficient options for proto=fd [ 229.373218] 9pnet: Insufficient options for proto=fd [ 229.419886] 9pnet: Insufficient options for proto=fd 21:37:39 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x9) setsockopt$inet_buf(r0, 0x0, 0x30000000010, &(0x7f0000000140)="02000100020001b400000002072065480100000000000000", 0x18) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x10001, 0x0, 0x207, 0x6, 0x5ecc, 0x5f5, 0x1, 0x10001, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYBLOB="6e00000021cb10c830b57099cb729d40b564cbbc3005e3ad1126989b4c942e018efcbcd637566a75b61e1bb766d201d6a3f550b5ffa5a5856fde3f791dc061ee8fe015ca383c31ff589a3099512083b2d169bd7d14dc701ccc6a7828a65221516cd685ee742db5f9b167c8fd32f5e3463800"], &(0x7f0000000100)=0x76) r3 = semget(0x1, 0x0, 0x0) semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f0000000000)=""/59) 21:37:39 executing program 5: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:39 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$notify(r0, 0x402, 0x10) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000000c0)={"6c6f000acc0000000000000000002600", {0x2, 0x0, @rand_addr}}) fcntl$setsig(r0, 0xa, 0x0) 21:37:39 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:39 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 5: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100), 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ef, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f00000000c0)=0x8, 0x4) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) 21:37:39 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 5: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:39 executing program 1: r0 = socket(0x400020000000010, 0x2, 0x0) write(r0, &(0x7f00000001c0)="1f00000056000d6dfcffff05bc0203030701ff2104173f8100000002030039", 0x1f) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000300)) recvfrom(r0, &(0x7f0000000200)=""/249, 0xf9, 0x0, &(0x7f0000000000)=@in={0x2, 0x0, @multicast1}, 0x705000) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)=r3) 21:37:39 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}]}) 21:37:39 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:39 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:39 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100), 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 230.135136] overlayfs: missing 'workdir' 21:37:40 executing program 1: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x100000000000003, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000100)) 21:37:40 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 230.304418] overlayfs: missing 'lowerdir' 21:37:40 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}]}) 21:37:40 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x140) bind$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2715, @my=0x1}, 0xf3) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x109) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 21:37:40 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 230.448069] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore 21:37:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x140) bind$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2715, @my=0x1}, 0xf3) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x109) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 21:37:40 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 230.502742] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 230.522614] overlayfs: missing 'workdir' 21:37:40 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x140) bind$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2715, @my=0x1}, 0xf3) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x109) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 21:37:40 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r4, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:40 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x140) bind$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x2715, @my=0x1}, 0xf3) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x109) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) [ 230.691097] overlayfs: missing 'lowerdir' 21:37:40 executing program 3 (fault-call:4 fault-nth:0): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 230.784832] FAULT_INJECTION: forcing a failure. [ 230.784832] name failslab, interval 1, probability 0, space 0, times 1 [ 230.815857] CPU: 1 PID: 8788 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 230.823073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.832461] Call Trace: [ 230.835249] dump_stack+0x1c4/0x2b4 [ 230.838922] ? dump_stack_print_info.cold.2+0x52/0x52 [ 230.844136] ? get_pid_task+0xd6/0x1a0 [ 230.848047] should_fail.cold.4+0xa/0x17 [ 230.852747] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 230.852766] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 230.852779] ? find_vpid+0xf0/0xf0 [ 230.852801] ? __f_unlock_pos+0x19/0x20 [ 230.867226] ? lock_downgrade+0x900/0x900 [ 230.867244] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 230.867263] ? proc_fail_nth_write+0x9e/0x210 21:37:40 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 230.885405] ? proc_cwd_link+0x1d0/0x1d0 [ 230.889485] ? ___might_sleep+0x1ed/0x300 [ 230.893691] ? do_raw_spin_unlock+0xa7/0x2f0 [ 230.898123] ? fs_reclaim_acquire+0x20/0x20 [ 230.902461] ? lock_downgrade+0x900/0x900 [ 230.904532] ovl_get_fh: 65 callbacks suppressed [ 230.904540] overlayfs: invalid origin (7900) [ 230.906636] ? ___might_sleep+0x1ed/0x300 [ 230.906654] ? __inode_security_revalidate+0xd9/0x120 [ 230.906670] ? arch_local_save_flags+0x40/0x40 [ 230.906691] ? fsnotify_first_mark+0x350/0x350 21:37:40 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 230.912280] overlayfs: invalid origin (7900) [ 230.915761] ? __fsnotify_parent+0xcc/0x420 [ 230.915780] ? fsnotify+0x12f0/0x12f0 [ 230.915799] __should_failslab+0x124/0x180 [ 230.915817] should_failslab+0x9/0x14 [ 230.954824] __kmalloc_track_caller+0x2d0/0x750 [ 230.959523] ? strncpy_from_user+0x510/0x510 [ 230.963944] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 230.969503] ? strndup_user+0x77/0xd0 [ 230.973307] memdup_user+0x2c/0xa0 [ 230.976871] strndup_user+0x77/0xd0 [ 230.980512] ksys_mount+0x3c/0x140 [ 230.984048] __x64_sys_mount+0xbe/0x150 [ 230.988048] do_syscall_64+0x1b9/0x820 [ 230.991958] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 230.997361] ? syscall_return_slowpath+0x5e0/0x5e0 [ 231.002299] ? trace_hardirqs_on_caller+0x310/0x310 [ 231.007324] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 231.012382] ? recalc_sigpending_tsk+0x180/0x180 [ 231.012397] ? kasan_check_write+0x14/0x20 [ 231.012418] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.021412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.021429] RIP: 0033:0x457579 [ 231.034622] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.053531] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 231.061258] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 231.068528] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 231.075781] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 21:37:40 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='bcsh0\x00') sendmsg$nl_xfrm(r1, &(0x7f0000000000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="b800000019000100000000000000dd5ff5e8751fdf2d62aa27ae2f67e01000010000000000000800000000000000000000001700000000000000000000000000dddaff57233f11759abf37d00f1a9afa7d1cf3557e499498c2b63d723fc8545ec009675636a5787a5417438ccd07a4ac5ac190cea641be6155273267b7940101ac131594a97f0b5dca03d1f27fc667a373d316", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x2d, &(0x7f00000001c0)={0x77359400}, 0x10) 21:37:40 executing program 5 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:40 executing program 3 (fault-call:4 fault-nth:1): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 231.083033] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 231.090284] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 231.122800] FAULT_INJECTION: forcing a failure. [ 231.122800] name failslab, interval 1, probability 0, space 0, times 0 [ 231.142025] CPU: 1 PID: 8804 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #53 [ 231.149227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.158589] Call Trace: [ 231.161196] dump_stack+0x1c4/0x2b4 [ 231.164859] ? dump_stack_print_info.cold.2+0x52/0x52 [ 231.170067] ? get_pid_task+0xd6/0x1a0 [ 231.173976] should_fail.cold.4+0xa/0x17 [ 231.178054] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 231.183880] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 231.183899] ? find_vpid+0xf0/0xf0 [ 231.192556] ? __f_unlock_pos+0x19/0x20 [ 231.192598] ? lock_downgrade+0x900/0x900 [ 231.192621] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 231.206269] ? proc_fail_nth_write+0x9e/0x210 [ 231.210767] ? proc_cwd_link+0x1d0/0x1d0 [ 231.214841] ? ___might_sleep+0x1ed/0x300 [ 231.218999] ? do_raw_spin_unlock+0xa7/0x2f0 [ 231.219022] ? fs_reclaim_acquire+0x20/0x20 [ 231.219040] ? lock_downgrade+0x900/0x900 [ 231.231905] ? ___might_sleep+0x1ed/0x300 [ 231.235497] FAULT_INJECTION: forcing a failure. [ 231.235497] name failslab, interval 1, probability 0, space 0, times 0 [ 231.236076] ? __inode_security_revalidate+0xd9/0x120 [ 231.252427] ? arch_local_save_flags+0x40/0x40 [ 231.257034] ? fsnotify_first_mark+0x350/0x350 [ 231.261626] ? __fsnotify_parent+0xcc/0x420 [ 231.263906] overlayfs: invalid origin (7900) [ 231.265962] ? fsnotify+0x12f0/0x12f0 [ 231.265984] __should_failslab+0x124/0x180 [ 231.265999] should_failslab+0x9/0x14 [ 231.266021] __kmalloc_track_caller+0x2d0/0x750 [ 231.276443] overlayfs: invalid origin (7900) [ 231.278458] ? strncpy_from_user+0x510/0x510 [ 231.278476] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 231.278489] ? strndup_user+0x77/0xd0 [ 231.278507] memdup_user+0x2c/0xa0 [ 231.308624] strndup_user+0x77/0xd0 [ 231.312261] ksys_mount+0x3c/0x140 [ 231.315807] __x64_sys_mount+0xbe/0x150 [ 231.319807] do_syscall_64+0x1b9/0x820 [ 231.323721] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 231.329113] ? syscall_return_slowpath+0x5e0/0x5e0 [ 231.334058] ? trace_hardirqs_on_caller+0x310/0x310 [ 231.339105] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 231.344143] ? recalc_sigpending_tsk+0x180/0x180 [ 231.348916] ? kasan_check_write+0x14/0x20 [ 231.353157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.358021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.363222] RIP: 0033:0x457579 [ 231.366427] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.385336] RSP: 002b:00007f1d288ddc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:37:41 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:41 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:41 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xc4, 0x400000) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000080)={0x1f, 0xa9, &(0x7f0000000180)="d2e4e15b82986a2a551eb704856ca088c3fe49a4378606c17d88ff2ab3841752fc6913caa7e59f6abf270214d0046eeeeb278471ba022a23aecd0119909747a85aa313ad77bc9bab4d0bf5cba31eba6463af7775b89452e1cbf5074caa1a0ad3ac05752f42ef05ef0f8794aa21c2f74f6153d7cc136cc34c183cb59bea172698655e39b61ebba4ecbf67788185c4f186ee2d6d70ba6b02ccce547c447888e0431d9b75b31765cd43d4"}) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r3, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, &(0x7f0000000fe0)) epoll_pwait(r1, &(0x7f0000000140)=[{}], 0x1, 0xfffffbfffffffff7, &(0x7f0000000100), 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000000)={0x40000a0002003}) [ 231.393052] RAX: ffffffffffffffda RBX: 00007f1d288ddc90 RCX: 0000000000457579 [ 231.400332] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 231.407612] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 231.414880] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d288de6d4 [ 231.422148] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 231.435117] CPU: 0 PID: 8811 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 231.442326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.451684] Call Trace: [ 231.454284] dump_stack+0x1c4/0x2b4 [ 231.457923] ? dump_stack_print_info.cold.2+0x52/0x52 [ 231.463129] ? __kernel_text_address+0xd/0x40 [ 231.467624] ? unwind_get_return_address+0x61/0xa0 [ 231.472558] should_fail.cold.4+0xa/0x17 [ 231.475374] overlayfs: invalid origin (7900) [ 231.476665] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 231.476686] ? save_stack+0xa9/0xd0 [ 231.489809] ? save_stack+0x43/0xd0 [ 231.493454] ? kasan_kmalloc+0xc7/0xe0 [ 231.497376] ? __kmalloc_track_caller+0x14a/0x750 [ 231.502697] ? memdup_user+0x2c/0xa0 [ 231.506417] ? strndup_user+0x77/0xd0 [ 231.510221] ? ksys_mount+0x3c/0x140 [ 231.513942] ? do_syscall_64+0x1b9/0x820 [ 231.518013] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.523391] ? proc_fail_nth_write+0x9e/0x210 [ 231.527894] ? proc_cwd_link+0x1d0/0x1d0 [ 231.531969] ? ___might_sleep+0x1ed/0x300 [ 231.536129] ? do_raw_spin_unlock+0xa7/0x2f0 21:37:41 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) r1 = mmap$binder(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x3000002, 0x100010, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x70, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0e630c4001000000040000000000000012634840040000000000000001000000000000000000000010000000000000000000000000000000000000002000000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[], @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB="700000000000000028000000000002003000000000000000200078841b5b330ed5f2f337ff5b000000000000"], @ANYBLOB="008000000000000009631040", @ANYRES64=r1, @ANYBLOB="0300000000000000"], 0xf8, 0x0, &(0x7f0000000480)="354922d87d1ad98ae5cc9f6875d9a0a38cc2a77ae4377d7b82045987df82b6c7ec1314bdcd7c40735f8730a04b571c66afd99daff750f13363c65363c4daf010309a5181078b2ea0e706ccb282a1037248a66398381be61a943fd4c8cc9d407383fd56bc8ba3389f33b072dfa439695bbe2f005b5c5242087641003646fbd4dbc6cd1fbd71d103efe3889fc821ea36e22369af544a779b20fd82866dd1f485ffa25927e77ad6003a8e2dee1076b90cd845bc4e882e691876d8250268457d7c118c8c1af2efd65f0ed1a2bce549acd65ad56ce416e448d57cf73f4520fac728f6b8f464558c41f6be5a0b0c3cd3bc5d88e28232763ac060fa"}) r2 = socket(0x10, 0x803, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000600)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x3}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r3, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40800}, 0x20000000) clock_nanosleep(0x5, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, &(0x7f0000000040)) sendto(r2, &(0x7f0000000080)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") recvmmsg(r2, &(0x7f0000003080)=[{{&(0x7f0000000180)=@xdp, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000380)=""/245, 0xf5}}, {{&(0x7f0000002740)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000002880), 0x37f, &(0x7f00000028c0)=""/147, 0x93}}], 0x2, 0x0, &(0x7f0000003600)={0x0, 0x989680}) ioctl(r4, 0xffffffffffff0000, &(0x7f0000000100)="a9e3f4f288f44e46d79897e16411011ab89136ba7b3b905818f92cd63e693a054e3216693375d101ac13e84a2eeaf08ea36c705726ae210376") [ 231.539750] audit: type=1400 audit(1539034661.270:58): avc: denied { block_suspend } for pid=8820 comm="syz-executor1" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 231.540555] ? fs_reclaim_acquire+0x20/0x20 [ 231.569603] ? lock_downgrade+0x900/0x900 [ 231.573769] ? ___might_sleep+0x1ed/0x300 [ 231.577936] ? arch_local_save_flags+0x40/0x40 [ 231.582529] ? lock_release+0x970/0x970 [ 231.586513] ? arch_local_save_flags+0x40/0x40 [ 231.591108] __should_failslab+0x124/0x180 [ 231.595344] should_failslab+0x9/0x14 [ 231.599153] __kmalloc_track_caller+0x2d0/0x750 [ 231.603817] ? strncpy_from_user+0x510/0x510 [ 231.608214] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 231.613736] ? strndup_user+0x77/0xd0 [ 231.617521] memdup_user+0x2c/0xa0 [ 231.621054] strndup_user+0x77/0xd0 [ 231.624709] ksys_mount+0x73/0x140 [ 231.628258] __x64_sys_mount+0xbe/0x150 [ 231.632232] do_syscall_64+0x1b9/0x820 [ 231.636127] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 231.641484] ? syscall_return_slowpath+0x5e0/0x5e0 [ 231.646435] ? trace_hardirqs_on_caller+0x310/0x310 [ 231.651451] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 231.656452] ? recalc_sigpending_tsk+0x180/0x180 [ 231.661192] ? kasan_check_write+0x14/0x20 [ 231.665435] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.670269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.675447] RIP: 0033:0x457579 21:37:41 executing program 5 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:41 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 231.678646] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.697529] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 231.705240] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 231.712493] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 231.719766] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 231.727044] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 231.734317] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:37:41 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)="e91f7189591e9233614b00", 0x6000, 0x4) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x26) listen(r0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000100)="4c0000001400197f09004b0101048c590188ffffcf3d34740600d4ff5bffff00e7e5ed7d00000000c8550000000000002758d60034650c0326356cdb47f6aaaa956086cbfe0db35200af4486", 0x4c}], 0x1) [ 231.820444] FAULT_INJECTION: forcing a failure. [ 231.820444] name failslab, interval 1, probability 0, space 0, times 0 [ 231.847964] overlayfs: invalid origin (7900) [ 231.853169] overlayfs: invalid origin (7900) [ 231.876205] overlayfs: invalid origin (7900) [ 231.880155] CPU: 0 PID: 8833 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #53 [ 231.887848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.897207] Call Trace: [ 231.899813] dump_stack+0x1c4/0x2b4 [ 231.903462] ? dump_stack_print_info.cold.2+0x52/0x52 [ 231.908664] ? __kernel_text_address+0xd/0x40 [ 231.913182] ? unwind_get_return_address+0x61/0xa0 [ 231.918125] should_fail.cold.4+0xa/0x17 [ 231.922198] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 231.927316] ? save_stack+0xa9/0xd0 [ 231.930956] ? save_stack+0x43/0xd0 [ 231.934566] ? kasan_kmalloc+0xc7/0xe0 [ 231.938460] ? __kmalloc_track_caller+0x14a/0x750 [ 231.943284] ? memdup_user+0x2c/0xa0 [ 231.947018] ? strndup_user+0x77/0xd0 [ 231.950820] ? ksys_mount+0x3c/0x140 [ 231.954525] ? do_syscall_64+0x1b9/0x820 [ 231.958571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.963955] ? proc_fail_nth_write+0x9e/0x210 [ 231.968453] ? proc_cwd_link+0x1d0/0x1d0 [ 231.972517] ? ___might_sleep+0x1ed/0x300 [ 231.976665] ? do_raw_spin_unlock+0xa7/0x2f0 [ 231.981067] ? fs_reclaim_acquire+0x20/0x20 [ 231.985375] ? lock_downgrade+0x900/0x900 [ 231.989511] ? ___might_sleep+0x1ed/0x300 [ 231.993648] ? arch_local_save_flags+0x40/0x40 [ 231.998224] ? lock_release+0x970/0x970 [ 232.002197] ? arch_local_save_flags+0x40/0x40 [ 232.006792] __should_failslab+0x124/0x180 [ 232.011032] should_failslab+0x9/0x14 [ 232.014826] __kmalloc_track_caller+0x2d0/0x750 [ 232.019486] ? strncpy_from_user+0x510/0x510 [ 232.023914] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.029438] ? strndup_user+0x77/0xd0 [ 232.033224] memdup_user+0x2c/0xa0 [ 232.036747] strndup_user+0x77/0xd0 [ 232.040373] ksys_mount+0x73/0x140 [ 232.043899] __x64_sys_mount+0xbe/0x150 [ 232.047873] do_syscall_64+0x1b9/0x820 [ 232.051752] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 232.057104] ? syscall_return_slowpath+0x5e0/0x5e0 [ 232.062024] ? trace_hardirqs_on_caller+0x310/0x310 [ 232.067028] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 232.072032] ? recalc_sigpending_tsk+0x180/0x180 [ 232.076793] ? kasan_check_write+0x14/0x20 [ 232.081017] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.085849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.091033] RIP: 0033:0x457579 [ 232.094264] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.113152] RSP: 002b:00007f1d288ddc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:37:42 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:42 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:42 executing program 3 (fault-call:4 fault-nth:2): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:42 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:42 executing program 5 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 232.120855] RAX: ffffffffffffffda RBX: 00007f1d288ddc90 RCX: 0000000000457579 [ 232.128117] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 232.135395] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 232.142659] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d288de6d4 [ 232.149945] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:37:42 executing program 1: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 232.266436] FAULT_INJECTION: forcing a failure. [ 232.266436] name failslab, interval 1, probability 0, space 0, times 0 [ 232.291566] FAULT_INJECTION: forcing a failure. [ 232.291566] name failslab, interval 1, probability 0, space 0, times 0 [ 232.293832] overlayfs: invalid origin (7900) [ 232.306291] overlayfs: invalid origin (7900) [ 232.311762] CPU: 1 PID: 8852 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 232.318957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.328310] Call Trace: [ 232.330914] dump_stack+0x1c4/0x2b4 [ 232.334555] ? dump_stack_print_info.cold.2+0x52/0x52 [ 232.339772] ? __kernel_text_address+0xd/0x40 [ 232.344274] ? unwind_get_return_address+0x61/0xa0 [ 232.349238] should_fail.cold.4+0xa/0x17 [ 232.353312] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 232.358428] ? save_stack+0xa9/0xd0 [ 232.362060] ? kasan_kmalloc+0xc7/0xe0 [ 232.365984] ? __kmalloc_track_caller+0x14a/0x750 [ 232.370841] ? memdup_user+0x2c/0xa0 [ 232.374559] ? strndup_user+0x77/0xd0 [ 232.378379] ? ksys_mount+0x73/0x140 [ 232.382102] ? __x64_sys_mount+0xbe/0x150 [ 232.386270] ? do_syscall_64+0x1b9/0x820 [ 232.390358] ? proc_fail_nth_write+0x9e/0x210 [ 232.394858] ? proc_cwd_link+0x1d0/0x1d0 [ 232.398931] ? ___might_sleep+0x1ed/0x300 [ 232.403095] ? do_raw_spin_unlock+0xa7/0x2f0 [ 232.407529] ? fs_reclaim_acquire+0x20/0x20 [ 232.411867] ? lock_downgrade+0x900/0x900 [ 232.416026] ? ___might_sleep+0x1ed/0x300 [ 232.420210] ? arch_local_save_flags+0x40/0x40 [ 232.424796] ? lock_release+0x970/0x970 [ 232.428783] ? arch_local_save_flags+0x40/0x40 [ 232.433372] ? usercopy_warn+0x110/0x110 [ 232.437442] __should_failslab+0x124/0x180 [ 232.441684] should_failslab+0x9/0x14 [ 232.445494] kmem_cache_alloc_trace+0x2d7/0x750 [ 232.450171] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.455720] ? _copy_from_user+0xdf/0x150 [ 232.459878] copy_mount_options+0x5f/0x380 21:37:42 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng, 0x2, 0x1) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000010c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000005980)=0x10) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x100000001, 0xe166, 0x1000, 0x0, 0x3f, 0x3, 0x338, 0x38, 0x24d, 0xffff, 0x4d1, 0x20, 0x1, 0x80000000, 0x19b2400000, 0xaa}, [{0x60000002, 0x7fff, 0xffff, 0x9, 0x3, 0x2, 0x5, 0x8001}], "ba07f000f6f21b5f", [[], [], [], [], [], [], [], [], []]}, 0x960) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x10000, 0x800, 0x9, 0x80, 0x100}) 21:37:42 executing program 2: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 232.464124] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.469684] ksys_mount+0xd0/0x140 [ 232.473236] __x64_sys_mount+0xbe/0x150 [ 232.477223] do_syscall_64+0x1b9/0x820 [ 232.481144] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 232.486512] ? syscall_return_slowpath+0x5e0/0x5e0 [ 232.491452] ? trace_hardirqs_on_caller+0x310/0x310 [ 232.496478] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 232.501499] ? recalc_sigpending_tsk+0x180/0x180 [ 232.506250] ? kasan_check_write+0x14/0x20 [ 232.510493] ? trace_hardirqs_off_thunk+0x1a/0x1c 21:37:42 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 232.515352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.520542] RIP: 0033:0x457579 [ 232.523743] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.542659] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 232.542674] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 232.542683] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 21:37:42 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 232.542691] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 232.542699] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 232.542706] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 232.547542] CPU: 1 PID: 8860 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #53 [ 232.565017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.603359] Call Trace: [ 232.605966] dump_stack+0x1c4/0x2b4 [ 232.610130] ? dump_stack_print_info.cold.2+0x52/0x52 21:37:42 executing program 3 (fault-call:4 fault-nth:3): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 232.615343] ? __kernel_text_address+0xd/0x40 [ 232.619846] ? unwind_get_return_address+0x61/0xa0 [ 232.624795] should_fail.cold.4+0xa/0x17 [ 232.628911] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 232.634040] ? save_stack+0xa9/0xd0 [ 232.637674] ? kasan_kmalloc+0xc7/0xe0 [ 232.641583] ? __kmalloc_track_caller+0x14a/0x750 [ 232.646446] ? memdup_user+0x2c/0xa0 [ 232.650168] ? strndup_user+0x77/0xd0 [ 232.653977] ? ksys_mount+0x73/0x140 [ 232.656348] FAULT_INJECTION: forcing a failure. [ 232.656348] name failslab, interval 1, probability 0, space 0, times 0 [ 232.657699] ? __x64_sys_mount+0xbe/0x150 [ 232.657717] ? do_syscall_64+0x1b9/0x820 [ 232.657743] ? proc_fail_nth_write+0x9e/0x210 [ 232.681621] ? proc_cwd_link+0x1d0/0x1d0 [ 232.685699] ? ___might_sleep+0x1ed/0x300 [ 232.689861] ? do_raw_spin_unlock+0xa7/0x2f0 [ 232.694281] ? fs_reclaim_acquire+0x20/0x20 [ 232.698609] ? lock_downgrade+0x900/0x900 [ 232.702765] ? ___might_sleep+0x1ed/0x300 [ 232.706928] ? arch_local_save_flags+0x40/0x40 [ 232.711539] ? lock_release+0x970/0x970 [ 232.715534] ? arch_local_save_flags+0x40/0x40 [ 232.720130] ? usercopy_warn+0x110/0x110 [ 232.724217] __should_failslab+0x124/0x180 [ 232.728454] should_failslab+0x9/0x14 [ 232.732264] kmem_cache_alloc_trace+0x2d7/0x750 [ 232.736944] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.742487] ? _copy_from_user+0xdf/0x150 [ 232.746642] copy_mount_options+0x5f/0x380 [ 232.750896] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.756463] ksys_mount+0xd0/0x140 [ 232.760007] __x64_sys_mount+0xbe/0x150 [ 232.764002] do_syscall_64+0x1b9/0x820 [ 232.767901] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 232.773270] ? syscall_return_slowpath+0x5e0/0x5e0 [ 232.778204] ? trace_hardirqs_on_caller+0x310/0x310 [ 232.783243] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 232.788274] ? recalc_sigpending_tsk+0x180/0x180 [ 232.793030] ? kasan_check_write+0x14/0x20 [ 232.797269] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.802145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.807333] RIP: 0033:0x457579 [ 232.810525] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.829425] RSP: 002b:00007f1d288ddc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 232.837136] RAX: ffffffffffffffda RBX: 00007f1d288ddc90 RCX: 0000000000457579 [ 232.844407] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 232.851677] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 232.858950] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d288de6d4 [ 232.866217] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 232.873501] CPU: 0 PID: 8870 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 232.880700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.890044] Call Trace: [ 232.892626] dump_stack+0x1c4/0x2b4 [ 232.896248] ? dump_stack_print_info.cold.2+0x52/0x52 [ 232.901424] should_fail.cold.4+0xa/0x17 [ 232.905469] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 232.910560] ? is_bpf_text_address+0xac/0x170 [ 232.915038] ? lock_downgrade+0x900/0x900 [ 232.919171] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 232.924955] ? kasan_check_read+0x11/0x20 [ 232.929109] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 232.934386] ? rcu_bh_qs+0xc0/0xc0 [ 232.937923] ? unwind_dump+0x190/0x190 [ 232.941799] ? fs_reclaim_acquire+0x20/0x20 [ 232.946107] ? lock_downgrade+0x900/0x900 [ 232.950242] ? ___might_sleep+0x1ed/0x300 [ 232.954372] ? arch_local_save_flags+0x40/0x40 [ 232.958940] __should_failslab+0x124/0x180 [ 232.963158] should_failslab+0x9/0x14 [ 232.966946] kmem_cache_alloc+0x2be/0x730 [ 232.971123] ? proc_cwd_link+0x1d0/0x1d0 [ 232.975170] ? ___might_sleep+0x1ed/0x300 [ 232.979314] getname_flags+0xd0/0x5a0 [ 232.983100] user_path_at_empty+0x2d/0x50 [ 232.987252] do_mount+0x177/0x31f0 [ 232.990778] ? ___might_sleep+0x1ed/0x300 [ 232.994909] ? copy_mount_string+0x40/0x40 [ 232.999138] ? copy_mount_options+0x5f/0x380 [ 233.003530] ? kasan_unpoison_shadow+0x35/0x50 [ 233.008092] ? kasan_kmalloc+0xc7/0xe0 [ 233.011992] ? kmem_cache_alloc_trace+0x31f/0x750 [ 233.016830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.022352] ? _copy_from_user+0xdf/0x150 [ 233.026487] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.032013] ? copy_mount_options+0x288/0x380 [ 233.036495] ksys_mount+0x12d/0x140 [ 233.040110] __x64_sys_mount+0xbe/0x150 [ 233.044072] do_syscall_64+0x1b9/0x820 [ 233.047946] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 233.053302] ? syscall_return_slowpath+0x5e0/0x5e0 [ 233.058219] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.063048] ? trace_hardirqs_on_caller+0x310/0x310 [ 233.068069] ? prepare_exit_to_usermode+0x291/0x3b0 [ 233.073076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.077910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.083103] RIP: 0033:0x457579 [ 233.086282] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.105186] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 233.112879] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 21:37:42 executing program 5 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:43 executing program 3 (fault-call:4 fault-nth:4): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 233.120132] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 233.127380] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 233.134765] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 233.142038] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 233.225891] FAULT_INJECTION: forcing a failure. [ 233.225891] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 233.237758] CPU: 1 PID: 8878 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #53 [ 233.244952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.254309] Call Trace: [ 233.256917] dump_stack+0x1c4/0x2b4 [ 233.260583] ? dump_stack_print_info.cold.2+0x52/0x52 [ 233.265805] should_fail.cold.4+0xa/0x17 [ 233.269884] ? fault_create_debugfs_attr+0x1f0/0x1f0 21:37:43 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}]}) [ 233.275007] ? is_bpf_text_address+0xac/0x170 [ 233.279518] ? lock_downgrade+0x900/0x900 [ 233.283713] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 233.289522] ? mark_held_locks+0x130/0x130 [ 233.293788] ? mark_held_locks+0x130/0x130 [ 233.298064] ? is_bpf_text_address+0xd3/0x170 [ 233.302596] ? kernel_text_address+0x79/0xf0 [ 233.307015] ? __kernel_text_address+0xd/0x40 [ 233.311528] ? unwind_get_return_address+0x61/0xa0 [ 233.316485] ? __save_stack_trace+0x8d/0xf0 [ 233.320826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 21:37:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x20800) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, '?:T', 0x14, 0x6, 0x0, @remote, @mcast2, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000004c0)={0x0, 0x4, [0x0, 0xfffffffffffffffc]}) [ 233.326377] ? should_fail+0x22d/0xd01 [ 233.330276] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 233.335395] __alloc_pages_nodemask+0x34b/0xde0 [ 233.335418] ? __kmalloc_track_caller+0x14a/0x750 [ 233.344921] ? memdup_user+0x2c/0xa0 [ 233.344934] ? strndup_user+0x77/0xd0 [ 233.344947] ? ksys_mount+0x73/0x140 [ 233.344965] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 233.344980] ? proc_cwd_link+0x1d0/0x1d0 [ 233.344998] ? ___might_sleep+0x1ed/0x300 [ 233.345019] ? fs_reclaim_acquire+0x20/0x20 21:37:43 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r1, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r2 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:43 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 233.373762] ? lock_downgrade+0x900/0x900 [ 233.377922] ? ___might_sleep+0x1ed/0x300 [ 233.382109] ? trace_hardirqs_off+0xb8/0x310 [ 233.386540] cache_grow_begin+0x91/0x8c0 [ 233.390645] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.396194] ? check_preemption_disabled+0x48/0x200 [ 233.401230] kmem_cache_alloc_trace+0x67e/0x750 [ 233.405912] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.411460] copy_mount_options+0x5f/0x380 [ 233.415717] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.421265] ksys_mount+0xd0/0x140 21:37:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) getsockname(r0, &(0x7f0000000100)=@hci, &(0x7f0000000200)=0x80) socket$alg(0x26, 0x5, 0x0) [ 233.425050] __x64_sys_mount+0xbe/0x150 [ 233.429044] do_syscall_64+0x1b9/0x820 [ 233.432942] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 233.438321] ? syscall_return_slowpath+0x5e0/0x5e0 [ 233.443294] ? trace_hardirqs_on_caller+0x310/0x310 [ 233.448325] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 233.449826] FAULT_INJECTION: forcing a failure. [ 233.449826] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 233.453358] ? recalc_sigpending_tsk+0x180/0x180 [ 233.470263] ? kasan_check_write+0x14/0x20 [ 233.474510] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.479363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.484570] RIP: 0033:0x457579 [ 233.487772] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.506958] RSP: 002b:00007f1d288ddc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 233.514667] RAX: ffffffffffffffda RBX: 00007f1d288ddc90 RCX: 0000000000457579 [ 233.521934] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 233.529204] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 233.536472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d288de6d4 [ 233.543741] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 233.551030] CPU: 0 PID: 8894 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 233.558228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.567604] Call Trace: [ 233.570219] dump_stack+0x1c4/0x2b4 [ 233.573860] ? dump_stack_print_info.cold.2+0x52/0x52 [ 233.579071] should_fail.cold.4+0xa/0x17 [ 233.583143] ? mark_held_locks+0x130/0x130 [ 233.587388] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 233.592503] ? dput.part.26+0x241/0x790 [ 233.596492] ? lock_downgrade+0x900/0x900 [ 233.600654] ? mark_held_locks+0x130/0x130 [ 233.604895] ? mnt_get_count+0x150/0x150 [ 233.608975] ? dput.part.26+0x26d/0x790 [ 233.612958] ? shrink_dcache_sb+0x350/0x350 [ 233.617293] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 233.622315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.627861] ? should_fail+0x22d/0xd01 [ 233.631761] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 233.636875] ? is_bpf_text_address+0xac/0x170 [ 233.641385] __alloc_pages_nodemask+0x34b/0xde0 [ 233.646064] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 233.651871] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 233.656895] ? rcu_bh_qs+0xc0/0xc0 [ 233.660437] ? unwind_dump+0x190/0x190 [ 233.664341] ? fs_reclaim_acquire+0x20/0x20 [ 233.668669] ? lock_downgrade+0x900/0x900 [ 233.672827] ? ___might_sleep+0x1ed/0x300 [ 233.676980] ? trace_hardirqs_off+0xb8/0x310 [ 233.681400] cache_grow_begin+0x91/0x8c0 [ 233.685465] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.691009] ? check_preemption_disabled+0x48/0x200 [ 233.696035] kmem_cache_alloc+0x665/0x730 [ 233.700185] ? proc_cwd_link+0x1d0/0x1d0 [ 233.704260] getname_flags+0xd0/0x5a0 [ 233.708071] user_path_at_empty+0x2d/0x50 [ 233.712225] do_mount+0x177/0x31f0 [ 233.715768] ? trace_hardirqs_off+0x310/0x310 [ 233.720268] ? ___might_sleep+0x1ed/0x300 [ 233.724423] ? copy_mount_string+0x40/0x40 [ 233.728676] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 233.733443] ? retint_kernel+0x2d/0x2d [ 233.737353] ? copy_mount_options+0x1d9/0x380 [ 233.741862] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.747402] ? copy_mount_options+0x288/0x380 [ 233.751908] ksys_mount+0x12d/0x140 [ 233.755563] __x64_sys_mount+0xbe/0x150 [ 233.759549] do_syscall_64+0x1b9/0x820 [ 233.763463] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 233.768851] ? syscall_return_slowpath+0x5e0/0x5e0 [ 233.773876] ? trace_hardirqs_on_caller+0x310/0x310 [ 233.778901] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 233.783921] ? recalc_sigpending_tsk+0x180/0x180 [ 233.788684] ? kasan_check_write+0x14/0x20 [ 233.792986] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.797850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.803039] RIP: 0033:0x457579 [ 233.806235] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:37:43 executing program 5 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:43 executing program 3 (fault-call:4 fault-nth:5): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 233.825136] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 233.832850] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 233.840118] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 233.847386] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 233.854680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 233.861949] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:37:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x18, 0x200000) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000080)) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae0a, &(0x7f0000000140)=ANY=[@ANYBLOB="a90f117edf1d3f26e0384783742c3b2a75c21251a92728e3bbe6c3e92657e149d3a780b3676dc5b5fcf36547fb0610abb9d300000000000000000000000000000000000000"]) [ 234.021338] FAULT_INJECTION: forcing a failure. [ 234.021338] name failslab, interval 1, probability 0, space 0, times 0 [ 234.032541] FAULT_INJECTION: forcing a failure. [ 234.032541] name failslab, interval 1, probability 0, space 0, times 0 [ 234.036135] overlayfs: missing 'workdir' [ 234.063435] CPU: 0 PID: 8916 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 234.070655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.080008] Call Trace: [ 234.082623] dump_stack+0x1c4/0x2b4 [ 234.086293] ? dump_stack_print_info.cold.2+0x52/0x52 [ 234.091486] ? modules_open+0xa0/0xa0 [ 234.095297] should_fail.cold.4+0xa/0x17 [ 234.099381] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.104487] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 234.110293] ? kasan_check_read+0x11/0x20 [ 234.114454] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 234.119738] ? rcu_bh_qs+0xc0/0xc0 [ 234.123286] ? unwind_dump+0x190/0x190 [ 234.127201] ? is_bpf_text_address+0xd3/0x170 [ 234.131703] ? kernel_text_address+0x79/0xf0 [ 234.136124] ? __kernel_text_address+0xd/0x40 [ 234.140716] ? unwind_get_return_address+0x61/0xa0 [ 234.145666] ? fs_reclaim_acquire+0x20/0x20 [ 234.149989] ? lock_downgrade+0x900/0x900 [ 234.154155] ? ___might_sleep+0x1ed/0x300 [ 234.158306] ? arch_local_save_flags+0x40/0x40 [ 234.162892] ? lock_downgrade+0x900/0x900 [ 234.167067] __should_failslab+0x124/0x180 [ 234.171337] should_failslab+0x9/0x14 [ 234.175179] kmem_cache_alloc+0x2be/0x730 [ 234.179351] alloc_vfsmnt+0xe9/0x990 [ 234.183069] ? m_stop+0x20/0x20 [ 234.186365] ? avc_has_extended_perms+0x15a0/0x15a0 [ 234.191399] ? avc_has_perm_noaudit+0x630/0x630 [ 234.196072] ? trace_hardirqs_on+0xbd/0x310 [ 234.200400] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 234.205853] ? __kasan_slab_free+0x119/0x150 [ 234.210285] ? ___might_sleep+0x1ed/0x300 [ 234.214440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.219989] ? __get_fs_type+0x97/0xc0 [ 234.223883] ? lock_downgrade+0x900/0x900 [ 234.228035] ? lock_release+0x970/0x970 [ 234.232031] ? selinux_mount+0x1dc/0x3c0 [ 234.236109] vfs_kern_mount.part.35+0x90/0x4f0 [ 234.240697] ? may_umount+0xb0/0xb0 [ 234.244327] ? _raw_read_unlock+0x2c/0x50 [ 234.248474] ? __get_fs_type+0x97/0xc0 [ 234.252383] do_mount+0x581/0x31f0 [ 234.255927] ? retint_kernel+0x1b/0x2d [ 234.259823] ? trace_hardirqs_on+0x310/0x310 [ 234.264241] ? copy_mount_string+0x40/0x40 [ 234.268496] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 234.273258] ? trace_hardirqs_off+0xaf/0x310 [ 234.277671] ? retint_kernel+0x2d/0x2d [ 234.281644] ? copy_mount_options+0x214/0x380 [ 234.286161] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 234.291018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.296555] ? copy_mount_options+0x288/0x380 [ 234.301074] ksys_mount+0x12d/0x140 [ 234.304704] __x64_sys_mount+0xbe/0x150 [ 234.308689] do_syscall_64+0x1b9/0x820 [ 234.312611] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 234.317991] ? syscall_return_slowpath+0x5e0/0x5e0 [ 234.322924] ? trace_hardirqs_on_caller+0x310/0x310 [ 234.327943] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 234.332969] ? recalc_sigpending_tsk+0x180/0x180 [ 234.337730] ? kasan_check_write+0x14/0x20 [ 234.341973] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.346827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.352016] RIP: 0033:0x457579 21:37:43 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}]}) 21:37:43 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'brilge_slave_0\x00', &(0x7f0000000100)=@ethtool_rxfh_indir={0x39, 0x5, [0x4, 0x2, 0x7, 0x32114d80, 0x7fff]}}) [ 234.355212] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.374130] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 234.381839] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 234.389112] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 234.396380] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 234.403666] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 234.410931] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 234.418218] CPU: 1 PID: 8913 Comm: syz-executor5 Not tainted 4.19.0-rc7+ #53 [ 234.425423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.434775] Call Trace: [ 234.437378] dump_stack+0x1c4/0x2b4 [ 234.441021] ? dump_stack_print_info.cold.2+0x52/0x52 [ 234.446219] ? modules_open+0xa0/0xa0 [ 234.450043] should_fail.cold.4+0xa/0x17 [ 234.454121] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.459238] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 234.465058] ? kasan_check_read+0x11/0x20 21:37:44 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:44 executing program 3 (fault-call:4 fault-nth:6): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 234.469249] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 234.474550] ? rcu_bh_qs+0xc0/0xc0 [ 234.478114] ? unwind_dump+0x190/0x190 [ 234.482049] ? is_bpf_text_address+0xd3/0x170 [ 234.486570] ? kernel_text_address+0x79/0xf0 [ 234.486590] ? __kernel_text_address+0xd/0x40 [ 234.495497] ? unwind_get_return_address+0x61/0xa0 [ 234.495517] ? fs_reclaim_acquire+0x20/0x20 [ 234.495535] ? lock_downgrade+0x900/0x900 [ 234.495557] ? ___might_sleep+0x1ed/0x300 [ 234.513075] ? arch_local_save_flags+0x40/0x40 [ 234.517674] ? lock_downgrade+0x900/0x900 [ 234.521834] __should_failslab+0x124/0x180 [ 234.526102] should_failslab+0x9/0x14 [ 234.529916] kmem_cache_alloc+0x2be/0x730 [ 234.534086] alloc_vfsmnt+0xe9/0x990 [ 234.537822] ? m_stop+0x20/0x20 [ 234.541117] ? avc_has_extended_perms+0x15a0/0x15a0 [ 234.546163] ? avc_has_perm_noaudit+0x630/0x630 [ 234.550847] ? trace_hardirqs_on+0xbd/0x310 [ 234.555190] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 234.558913] overlayfs: missing 'lowerdir' [ 234.560657] ? __kasan_slab_free+0x119/0x150 [ 234.560676] ? ___might_sleep+0x1ed/0x300 21:37:44 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 234.560697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.567068] FAULT_INJECTION: forcing a failure. [ 234.567068] name failslab, interval 1, probability 0, space 0, times 0 [ 234.569253] ? __get_fs_type+0x97/0xc0 [ 234.569277] ? lock_downgrade+0x900/0x900 [ 234.598360] ? lock_release+0x970/0x970 [ 234.602361] ? selinux_mount+0x1dc/0x3c0 [ 234.602385] vfs_kern_mount.part.35+0x90/0x4f0 [ 234.602401] ? may_umount+0xb0/0xb0 [ 234.602421] ? _raw_read_unlock+0x2c/0x50 [ 234.611505] ? __get_fs_type+0x97/0xc0 [ 234.623142] do_mount+0x581/0x31f0 [ 234.626690] ? copy_mount_string+0x40/0x40 [ 234.630933] ? kasan_unpoison_shadow+0x35/0x50 [ 234.635524] ? kasan_kmalloc+0xc7/0xe0 [ 234.639486] ? kmem_cache_alloc_trace+0x31f/0x750 [ 234.644344] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 234.649017] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore [ 234.649891] ? _copy_from_user+0xdf/0x150 [ 234.662258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.667807] ? copy_mount_options+0x288/0x380 [ 234.668027] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 234.672332] ksys_mount+0x12d/0x140 [ 234.672349] __x64_sys_mount+0xbe/0x150 [ 234.672368] do_syscall_64+0x1b9/0x820 [ 234.672385] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 234.672405] ? syscall_return_slowpath+0x5e0/0x5e0 [ 234.701688] ? trace_hardirqs_on_caller+0x310/0x310 [ 234.706717] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 234.711746] ? recalc_sigpending_tsk+0x180/0x180 [ 234.716525] ? kasan_check_write+0x14/0x20 [ 234.720779] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.725643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.730833] RIP: 0033:0x457579 [ 234.734030] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.752935] RSP: 002b:00007f1d288ddc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 234.760648] RAX: ffffffffffffffda RBX: 00007f1d288ddc90 RCX: 0000000000457579 [ 234.767918] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 234.775187] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 234.782459] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d288de6d4 [ 234.789728] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 234.797098] CPU: 0 PID: 8928 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 234.804301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.813683] Call Trace: [ 234.816291] dump_stack+0x1c4/0x2b4 [ 234.819933] ? dump_stack_print_info.cold.2+0x52/0x52 [ 234.825140] ? ida_pre_get+0x130/0x130 [ 234.829044] should_fail.cold.4+0xa/0x17 [ 234.833119] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 234.838232] ? lock_downgrade+0x900/0x900 [ 234.842384] ? trace_hardirqs_on+0xbd/0x310 [ 234.846691] ? kasan_check_read+0x11/0x20 [ 234.850850] ? ida_alloc_range+0x51e/0xad0 [ 234.855071] ? do_raw_spin_lock+0xc1/0x200 [ 234.859295] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 234.864386] ? fs_reclaim_acquire+0x20/0x20 [ 234.868692] ? lock_downgrade+0x900/0x900 [ 234.872826] ? ___might_sleep+0x1ed/0x300 [ 234.876957] ? arch_local_save_flags+0x40/0x40 [ 234.881522] ? ___might_sleep+0x1ed/0x300 [ 234.885657] __should_failslab+0x124/0x180 [ 234.891289] should_failslab+0x9/0x14 [ 234.895076] __kmalloc_track_caller+0x2d0/0x750 [ 234.899732] ? kasan_kmalloc+0xc7/0xe0 [ 234.903609] ? kstrdup_const+0x66/0x80 [ 234.907481] kstrdup+0x39/0x70 [ 234.910660] kstrdup_const+0x66/0x80 [ 234.914369] alloc_vfsmnt+0x186/0x990 [ 234.918151] ? m_stop+0x20/0x20 [ 234.921414] ? avc_has_extended_perms+0x15a0/0x15a0 [ 234.926413] ? avc_has_perm_noaudit+0x630/0x630 [ 234.931065] ? trace_hardirqs_on+0xbd/0x310 [ 234.935369] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 234.940805] ? __kasan_slab_free+0x119/0x150 [ 234.945200] ? ___might_sleep+0x1ed/0x300 [ 234.949350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.954872] ? __get_fs_type+0x97/0xc0 [ 234.958741] ? lock_downgrade+0x900/0x900 [ 234.962889] ? lock_release+0x970/0x970 [ 234.966885] ? selinux_mount+0x1dc/0x3c0 [ 234.970935] vfs_kern_mount.part.35+0x90/0x4f0 [ 234.975501] ? may_umount+0xb0/0xb0 [ 234.979114] ? _raw_read_unlock+0x2c/0x50 [ 234.983244] ? __get_fs_type+0x97/0xc0 [ 234.987117] do_mount+0x581/0x31f0 [ 234.990640] ? copy_mount_string+0x40/0x40 [ 234.994858] ? kasan_unpoison_shadow+0x35/0x50 [ 234.999423] ? kasan_kmalloc+0xc7/0xe0 [ 235.003296] ? kmem_cache_alloc_trace+0x31f/0x750 [ 235.008125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.013645] ? _copy_from_user+0xdf/0x150 [ 235.017780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.023308] ? copy_mount_options+0x288/0x380 [ 235.027813] ksys_mount+0x12d/0x140 [ 235.031451] __x64_sys_mount+0xbe/0x150 [ 235.035438] do_syscall_64+0x1b9/0x820 [ 235.039339] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 235.044717] ? syscall_return_slowpath+0x5e0/0x5e0 [ 235.049651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.053794] FAULT_INJECTION: forcing a failure. [ 235.053794] name failslab, interval 1, probability 0, space 0, times 0 [ 235.054507] ? trace_hardirqs_on_caller+0x310/0x310 [ 235.054526] ? prepare_exit_to_usermode+0x291/0x3b0 [ 235.054555] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.080624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.085823] RIP: 0033:0x457579 [ 235.089022] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.107928] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 235.115645] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 21:37:44 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:44 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r1, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r2 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:44 executing program 4 (fault-call:4 fault-nth:0): getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:44 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000040)=""/159, 0x9f}], 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x400, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000180)) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000200)={0x5, 0x0, [{}, {}, {}, {}, {}]}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) syz_open_dev$sndmidi(&(0x7f0000000300)='/dev/snd/midiC#D#\x00', 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) r5 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3f, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000b40)=@sack_info={0x0}, &(0x7f0000000b80)=0xc) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000bc0)={r6, @in6={{0xa, 0x0, 0x71f73245, @dev={0xfe, 0x80, [], 0xd}}}}, 0x84) gettid() recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0xffff, 0x0, 0x200, 0x0, 0x0, 0x6, 0x200, 0x2, 0x4, 0xde, 0x4, 0x0, 0x7ff, 0x1, 0x624, 0x927a, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xff, 0x6, 0x80, 0x8000, 0x0, 0x0, 0x7f, 0x0, 0x374, 0xfd2, 0x2, 0x0, 0x7, 0x100000000, 0x0, 0x5, 0x0, @perf_config_ext={0x7ff, 0x3}, 0x0, 0x1, 0x0, 0x3, 0x4, 0x0, 0x401}, 0xffffffffffffffff, 0x0, r5, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x447) write$binfmt_elf64(r3, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0xbba) ioctl$RTC_UIE_ON(r4, 0x7003) preadv(r2, &(0x7f0000000480), 0x1cc, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) [ 235.122919] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 235.130191] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 235.137486] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 235.144761] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 235.172710] CPU: 1 PID: 8935 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #53 [ 235.179931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.189290] Call Trace: [ 235.191898] dump_stack+0x1c4/0x2b4 [ 235.195554] ? dump_stack_print_info.cold.2+0x52/0x52 [ 235.200774] ? get_pid_task+0xd6/0x1a0 [ 235.204680] should_fail.cold.4+0xa/0x17 [ 235.208749] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 235.214556] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 235.219681] ? find_vpid+0xf0/0xf0 21:37:45 executing program 3 (fault-call:4 fault-nth:7): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 235.223238] ? __f_unlock_pos+0x19/0x20 [ 235.227226] ? lock_downgrade+0x900/0x900 [ 235.231388] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 235.236931] ? proc_fail_nth_write+0x9e/0x210 [ 235.241435] ? proc_cwd_link+0x1d0/0x1d0 [ 235.245505] ? ___might_sleep+0x1ed/0x300 [ 235.249671] ? do_raw_spin_unlock+0xa7/0x2f0 [ 235.254098] ? fs_reclaim_acquire+0x20/0x20 [ 235.258429] ? lock_downgrade+0x900/0x900 [ 235.262598] ? ___might_sleep+0x1ed/0x300 [ 235.266754] ? __inode_security_revalidate+0xd9/0x120 [ 235.271953] ? arch_local_save_flags+0x40/0x40 [ 235.276543] ? fsnotify_first_mark+0x350/0x350 [ 235.281143] ? __fsnotify_parent+0xcc/0x420 [ 235.285477] ? fsnotify+0x12f0/0x12f0 [ 235.289288] __should_failslab+0x124/0x180 [ 235.293533] should_failslab+0x9/0x14 [ 235.297353] __kmalloc_track_caller+0x2d0/0x750 [ 235.302038] ? strncpy_from_user+0x510/0x510 [ 235.306453] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 235.311998] ? strndup_user+0x77/0xd0 [ 235.315806] memdup_user+0x2c/0xa0 [ 235.319374] strndup_user+0x77/0xd0 [ 235.323006] ksys_mount+0x3c/0x140 [ 235.326555] __x64_sys_mount+0xbe/0x150 [ 235.330552] do_syscall_64+0x1b9/0x820 [ 235.334466] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 235.339844] ? syscall_return_slowpath+0x5e0/0x5e0 [ 235.344783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.349638] ? trace_hardirqs_on_caller+0x310/0x310 [ 235.354662] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 235.359688] ? prepare_exit_to_usermode+0x291/0x3b0 [ 235.364718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.369585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.374780] RIP: 0033:0x457579 [ 235.377980] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.396893] RSP: 002b:00007f5d8435bc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 235.404611] RAX: ffffffffffffffda RBX: 00007f5d8435bc90 RCX: 0000000000457579 [ 235.411890] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 235.419167] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 235.426441] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5d8435c6d4 [ 235.433718] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:37:45 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x404326, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 235.582879] FAULT_INJECTION: forcing a failure. [ 235.582879] name failslab, interval 1, probability 0, space 0, times 0 [ 235.613667] overlayfs: missing 'workdir' [ 235.648306] CPU: 1 PID: 8947 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 235.655533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.664902] Call Trace: [ 235.667514] dump_stack+0x1c4/0x2b4 [ 235.671162] ? dump_stack_print_info.cold.2+0x52/0x52 [ 235.676368] ? ida_pre_get+0x130/0x130 [ 235.680274] should_fail.cold.4+0xa/0x17 [ 235.684348] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 235.689460] ? lock_downgrade+0x900/0x900 [ 235.693622] ? trace_hardirqs_on+0xbd/0x310 [ 235.697950] ? kasan_check_read+0x11/0x20 [ 235.702108] ? ida_alloc_range+0x51e/0xad0 [ 235.706357] ? do_raw_spin_lock+0xc1/0x200 [ 235.710607] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 235.715741] ? fs_reclaim_acquire+0x20/0x20 [ 235.720069] ? lock_downgrade+0x900/0x900 [ 235.724233] ? ___might_sleep+0x1ed/0x300 [ 235.728387] ? arch_local_save_flags+0x40/0x40 [ 235.732977] ? ___might_sleep+0x1ed/0x300 [ 235.737133] __should_failslab+0x124/0x180 [ 235.741371] should_failslab+0x9/0x14 [ 235.745204] __kmalloc_track_caller+0x2d0/0x750 [ 235.749877] ? kasan_kmalloc+0xc7/0xe0 [ 235.753781] ? kstrdup_const+0x66/0x80 [ 235.757679] kstrdup+0x39/0x70 [ 235.760879] kstrdup_const+0x66/0x80 [ 235.764601] alloc_vfsmnt+0x186/0x990 [ 235.768413] ? m_stop+0x20/0x20 [ 235.771702] ? avc_has_extended_perms+0x15a0/0x15a0 [ 235.776752] ? avc_has_perm_noaudit+0x630/0x630 [ 235.781426] ? trace_hardirqs_on+0xbd/0x310 [ 235.785759] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 235.791220] ? __kasan_slab_free+0x119/0x150 [ 235.795638] ? ___might_sleep+0x1ed/0x300 [ 235.799796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.805342] ? __get_fs_type+0x97/0xc0 [ 235.809234] ? lock_downgrade+0x900/0x900 [ 235.813392] ? lock_release+0x970/0x970 [ 235.817377] ? selinux_mount+0x1dc/0x3c0 [ 235.821453] vfs_kern_mount.part.35+0x90/0x4f0 [ 235.826043] ? may_umount+0xb0/0xb0 [ 235.829709] ? _raw_read_unlock+0x2c/0x50 [ 235.833866] ? __get_fs_type+0x97/0xc0 [ 235.837766] do_mount+0x581/0x31f0 [ 235.841313] ? retint_kernel+0x1b/0x2d [ 235.845205] ? trace_hardirqs_on+0x310/0x310 [ 235.849621] ? copy_mount_string+0x40/0x40 [ 235.853868] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 235.858650] ? trace_hardirqs_off+0xaf/0x310 [ 235.863069] ? retint_kernel+0x2d/0x2d [ 235.866977] ? copy_mount_options+0x1f3/0x380 [ 235.871483] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 235.876332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.881874] ? copy_mount_options+0x288/0x380 [ 235.886377] ksys_mount+0x12d/0x140 [ 235.890014] __x64_sys_mount+0xbe/0x150 [ 235.894002] do_syscall_64+0x1b9/0x820 [ 235.897914] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 235.903309] ? syscall_return_slowpath+0x5e0/0x5e0 [ 235.908247] ? trace_hardirqs_on_caller+0x310/0x310 [ 235.913273] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 235.918295] ? recalc_sigpending_tsk+0x180/0x180 [ 235.923058] ? kasan_check_write+0x14/0x20 [ 235.927306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.932158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.937353] RIP: 0033:0x457579 [ 235.940570] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.959475] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 235.967187] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 235.974459] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 235.981733] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 235.989006] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 21:37:45 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 235.996278] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:37:45 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:45 executing program 3 (fault-call:4 fault-nth:8): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 236.039938] overlayfs: missing 'lowerdir' 21:37:45 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:45 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r1, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r2 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 236.091702] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore [ 236.104551] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 236.114882] ovl_get_fh: 11 callbacks suppressed [ 236.114890] overlayfs: invalid origin (7900) [ 236.149793] overlayfs: invalid origin (7900) 21:37:46 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40000c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 236.170578] FAULT_INJECTION: forcing a failure. [ 236.170578] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 236.210223] CPU: 0 PID: 8968 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 236.217467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.226826] Call Trace: [ 236.229433] dump_stack+0x1c4/0x2b4 [ 236.233107] ? dump_stack_print_info.cold.2+0x52/0x52 [ 236.238319] should_fail.cold.4+0xa/0x17 [ 236.242390] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 236.247506] ? mark_held_locks+0x130/0x130 [ 236.251754] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 236.251773] ? wait_for_completion+0x8a0/0x8a0 [ 236.251792] ? lock_downgrade+0x900/0x900 [ 236.261299] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 21:37:46 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400022, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:46 executing program 2 (fault-call:5 fault-nth:0): getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 236.261317] ? trace_hardirqs_on+0xbd/0x310 [ 236.261338] ? fs_reclaim_acquire+0x20/0x20 [ 236.271004] ? lock_downgrade+0x900/0x900 [ 236.271018] ? find_next_bit+0x104/0x130 [ 236.271039] ? ___might_sleep+0x1ed/0x300 [ 236.291987] ? lock_release+0x970/0x970 [ 236.295977] ? arch_local_save_flags+0x40/0x40 [ 236.298219] FAULT_INJECTION: forcing a failure. [ 236.298219] name failslab, interval 1, probability 0, space 0, times 0 [ 236.300583] ? __might_sleep+0x95/0x190 [ 236.300624] __alloc_pages_nodemask+0x34b/0xde0 [ 236.320415] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 236.325437] ? lock_downgrade+0x900/0x900 [ 236.329606] ? arch_local_save_flags+0x40/0x40 [ 236.334200] ? __might_sleep+0x95/0x190 [ 236.338179] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 236.343728] alloc_pages_current+0x10c/0x210 [ 236.348150] get_zeroed_page+0x14/0x50 [ 236.352051] selinux_sb_copy_data+0xd3/0x740 [ 236.356474] ? trace_hardirqs_on+0xbd/0x310 [ 236.360805] ? selinux_bprm_set_creds+0xd40/0xd40 [ 236.365658] ? __kasan_slab_free+0x119/0x150 [ 236.370078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.375634] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 236.381176] security_sb_copy_data+0x54/0xb0 [ 236.385609] mount_fs+0x234/0x31d [ 236.389072] vfs_kern_mount.part.35+0xdc/0x4f0 [ 236.393658] ? may_umount+0xb0/0xb0 [ 236.397289] ? _raw_read_unlock+0x2c/0x50 [ 236.401439] ? __get_fs_type+0x97/0xc0 [ 236.405337] do_mount+0x581/0x31f0 [ 236.408887] ? copy_mount_string+0x40/0x40 [ 236.413134] ? kasan_unpoison_shadow+0x35/0x50 [ 236.417718] ? kasan_kmalloc+0xc7/0xe0 [ 236.421624] ? kmem_cache_alloc_trace+0x31f/0x750 [ 236.426477] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.432016] ? _copy_from_user+0xdf/0x150 [ 236.436170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.441709] ? copy_mount_options+0x288/0x380 [ 236.446209] ksys_mount+0x12d/0x140 [ 236.449840] __x64_sys_mount+0xbe/0x150 [ 236.453822] do_syscall_64+0x1b9/0x820 [ 236.457720] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 236.463101] ? syscall_return_slowpath+0x5e0/0x5e0 [ 236.468078] ? trace_hardirqs_on_caller+0x310/0x310 [ 236.473140] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 236.478880] ? recalc_sigpending_tsk+0x180/0x180 [ 236.483640] ? kasan_check_write+0x14/0x20 [ 236.487879] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.492729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.497921] RIP: 0033:0x457579 [ 236.501596] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.520503] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 236.528213] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 236.535482] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 236.542756] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 236.550023] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 236.557291] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 236.564586] CPU: 1 PID: 8975 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #53 [ 236.571788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.581139] Call Trace: [ 236.583733] dump_stack+0x1c4/0x2b4 [ 236.587361] ? dump_stack_print_info.cold.2+0x52/0x52 [ 236.592559] ? get_pid_task+0xd6/0x1a0 [ 236.596464] should_fail.cold.4+0xa/0x17 [ 236.600526] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 236.606336] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 236.611806] ? find_vpid+0xf0/0xf0 [ 236.615352] ? __f_unlock_pos+0x19/0x20 [ 236.619326] ? lock_downgrade+0x900/0x900 [ 236.623474] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 236.629010] ? proc_fail_nth_write+0x9e/0x210 [ 236.633507] ? proc_cwd_link+0x1d0/0x1d0 [ 236.637578] ? ___might_sleep+0x1ed/0x300 [ 236.641727] ? do_raw_spin_unlock+0xa7/0x2f0 [ 236.646147] ? fs_reclaim_acquire+0x20/0x20 [ 236.650469] ? lock_downgrade+0x900/0x900 [ 236.654623] ? ___might_sleep+0x1ed/0x300 [ 236.658778] ? __inode_security_revalidate+0xd9/0x120 [ 236.664003] ? arch_local_save_flags+0x40/0x40 [ 236.668589] ? fsnotify_first_mark+0x350/0x350 [ 236.673175] ? __fsnotify_parent+0xcc/0x420 [ 236.677501] ? fsnotify+0x12f0/0x12f0 [ 236.681303] __should_failslab+0x124/0x180 [ 236.685539] should_failslab+0x9/0x14 [ 236.689350] __kmalloc_track_caller+0x2d0/0x750 [ 236.694023] ? strncpy_from_user+0x510/0x510 [ 236.698437] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 236.703970] ? strndup_user+0x77/0xd0 [ 236.707770] memdup_user+0x2c/0xa0 [ 236.711311] strndup_user+0x77/0xd0 [ 236.714941] ksys_mount+0x3c/0x140 [ 236.718479] __x64_sys_mount+0xbe/0x150 [ 236.722456] do_syscall_64+0x1b9/0x820 [ 236.726346] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 236.731709] ? syscall_return_slowpath+0x5e0/0x5e0 [ 236.736640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.741483] ? trace_hardirqs_on_caller+0x310/0x310 [ 236.746504] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 236.751537] ? prepare_exit_to_usermode+0x291/0x3b0 [ 236.756574] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.761423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.766612] RIP: 0033:0x457579 [ 236.769805] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.788704] RSP: 002b:00007f38a1fe1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 236.796411] RAX: ffffffffffffffda RBX: 00007f38a1fe1c90 RCX: 0000000000457579 [ 236.803690] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 236.810952] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 21:37:46 executing program 3 (fault-call:4 fault-nth:9): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 236.818219] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38a1fe26d4 [ 236.825486] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 236.933500] FAULT_INJECTION: forcing a failure. [ 236.933500] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 236.934538] overlayfs: invalid origin (7900) [ 236.956940] overlayfs: invalid origin (7900) [ 236.968719] overlayfs: filesystem on './file0' not supported as upperdir [ 236.971259] CPU: 1 PID: 8985 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 236.982780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.992132] Call Trace: [ 236.994726] dump_stack+0x1c4/0x2b4 [ 236.998361] ? dump_stack_print_info.cold.2+0x52/0x52 [ 237.003576] should_fail.cold.4+0xa/0x17 [ 237.007644] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 237.012741] ? mark_held_locks+0x130/0x130 [ 237.016964] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 237.021882] ? wait_for_completion+0x8a0/0x8a0 [ 237.026452] ? lock_downgrade+0x900/0x900 [ 237.030594] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.036134] ? find_next_zero_bit+0x111/0x140 [ 237.040625] ? trace_hardirqs_on+0xbd/0x310 [ 237.044942] ? fs_reclaim_acquire+0x20/0x20 [ 237.049262] ? lock_downgrade+0x900/0x900 [ 237.053392] ? find_next_bit+0x104/0x130 [ 237.057442] ? ___might_sleep+0x1ed/0x300 [ 237.061578] ? lock_release+0x970/0x970 [ 237.065541] ? arch_local_save_flags+0x40/0x40 [ 237.070191] ? __might_sleep+0x95/0x190 [ 237.074152] __alloc_pages_nodemask+0x34b/0xde0 [ 237.078808] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 237.083812] ? lock_downgrade+0x900/0x900 [ 237.087949] ? arch_local_save_flags+0x40/0x40 [ 237.092517] ? __might_sleep+0x95/0x190 [ 237.096480] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 237.102010] alloc_pages_current+0x10c/0x210 [ 237.106408] get_zeroed_page+0x14/0x50 [ 237.110294] selinux_sb_copy_data+0xd3/0x740 [ 237.114688] ? trace_hardirqs_on+0xbd/0x310 [ 237.118996] ? selinux_bprm_set_creds+0xd40/0xd40 [ 237.123843] ? __kasan_slab_free+0x119/0x150 [ 237.128265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.133820] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 237.139369] security_sb_copy_data+0x54/0xb0 [ 237.143789] mount_fs+0x234/0x31d [ 237.147249] vfs_kern_mount.part.35+0xdc/0x4f0 [ 237.151817] ? may_umount+0xb0/0xb0 [ 237.155430] ? _raw_read_unlock+0x2c/0x50 [ 237.159569] ? __get_fs_type+0x97/0xc0 [ 237.163499] do_mount+0x581/0x31f0 [ 237.167026] ? kasan_check_read+0x11/0x20 [ 237.171162] ? do_raw_spin_unlock+0xa7/0x2f0 [ 237.175555] ? copy_mount_string+0x40/0x40 [ 237.179781] ? kasan_check_write+0x14/0x20 [ 237.183998] ? kasan_unpoison_shadow+0x35/0x50 [ 237.188583] ? kasan_kmalloc+0xc7/0xe0 [ 237.192460] ? kmem_cache_alloc_trace+0x31f/0x750 [ 237.197288] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.202811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.208337] ? copy_mount_options+0x288/0x380 [ 237.212823] ksys_mount+0x12d/0x140 [ 237.216436] __x64_sys_mount+0xbe/0x150 [ 237.220410] do_syscall_64+0x1b9/0x820 [ 237.224312] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 237.229678] ? syscall_return_slowpath+0x5e0/0x5e0 [ 237.234597] ? trace_hardirqs_on_caller+0x310/0x310 [ 237.239603] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 237.244608] ? recalc_sigpending_tsk+0x180/0x180 [ 237.249352] ? kasan_check_write+0x14/0x20 [ 237.253587] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 237.258433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.263612] RIP: 0033:0x457579 [ 237.266804] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.285690] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 237.293405] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 237.300657] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 237.307916] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 237.315170] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 237.322422] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:37:56 executing program 2 (fault-call:5 fault-nth:1): getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:56 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:56 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000200)) r0 = getpid() pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) waitid(0x1, r0, 0x0, 0x20000000, &(0x7f0000000240)) write(r1, &(0x7f00000001c0), 0xfffffef3) time(&(0x7f0000000080)) ptrace(0x4206, r0) tkill(r0, 0x9) 21:37:56 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x403a00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:56 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40d403, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:56 executing program 3 (fault-call:4 fault-nth:10): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 246.471007] FAULT_INJECTION: forcing a failure. [ 246.471007] name failslab, interval 1, probability 0, space 0, times 0 [ 246.487907] overlayfs: invalid origin (7900) [ 246.493985] FAULT_INJECTION: forcing a failure. [ 246.493985] name failslab, interval 1, probability 0, space 0, times 0 [ 246.499025] overlayfs: invalid origin (7900) [ 246.509647] overlayfs: filesystem on './file0' not supported as upperdir [ 246.516868] CPU: 0 PID: 8999 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #53 [ 246.519462] overlayfs: invalid origin (7900) [ 246.524072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.524086] Call Trace: [ 246.524116] dump_stack+0x1c4/0x2b4 [ 246.524146] ? dump_stack_print_info.cold.2+0x52/0x52 [ 246.524169] ? __kernel_text_address+0xd/0x40 [ 246.524187] ? unwind_get_return_address+0x61/0xa0 [ 246.524206] should_fail.cold.4+0xa/0x17 [ 246.524232] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.568016] ? save_stack+0xa9/0xd0 [ 246.571661] ? save_stack+0x43/0xd0 [ 246.575294] ? kasan_kmalloc+0xc7/0xe0 [ 246.579193] ? __kmalloc_track_caller+0x14a/0x750 [ 246.584051] ? memdup_user+0x2c/0xa0 [ 246.587801] ? strndup_user+0x77/0xd0 [ 246.591612] ? ksys_mount+0x3c/0x140 [ 246.595331] ? do_syscall_64+0x1b9/0x820 [ 246.599397] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.604767] ? proc_fail_nth_write+0x9e/0x210 [ 246.609486] ? proc_cwd_link+0x1d0/0x1d0 [ 246.613559] ? ___might_sleep+0x1ed/0x300 [ 246.617905] ? do_raw_spin_unlock+0xa7/0x2f0 [ 246.622325] ? fs_reclaim_acquire+0x20/0x20 [ 246.626653] ? lock_downgrade+0x900/0x900 [ 246.630809] ? ___might_sleep+0x1ed/0x300 [ 246.634963] ? arch_local_save_flags+0x40/0x40 [ 246.639552] ? lock_release+0x970/0x970 [ 246.643550] ? arch_local_save_flags+0x40/0x40 [ 246.648156] __should_failslab+0x124/0x180 [ 246.652398] should_failslab+0x9/0x14 [ 246.656206] __kmalloc_track_caller+0x2d0/0x750 [ 246.660887] ? strncpy_from_user+0x510/0x510 [ 246.665315] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 246.670853] ? strndup_user+0x77/0xd0 [ 246.674659] memdup_user+0x2c/0xa0 [ 246.678202] strndup_user+0x77/0xd0 [ 246.681829] ksys_mount+0x73/0x140 [ 246.685377] __x64_sys_mount+0xbe/0x150 [ 246.689357] do_syscall_64+0x1b9/0x820 [ 246.693252] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 246.698648] ? syscall_return_slowpath+0x5e0/0x5e0 [ 246.703612] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.708464] ? trace_hardirqs_on_caller+0x310/0x310 [ 246.713500] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 246.718518] ? prepare_exit_to_usermode+0x291/0x3b0 [ 246.723542] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 246.728399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.733611] RIP: 0033:0x457579 [ 246.736810] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.755710] RSP: 002b:00007f38a1fe1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 246.763422] RAX: ffffffffffffffda RBX: 00007f38a1fe1c90 RCX: 0000000000457579 21:37:56 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400022, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:56 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 246.770693] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 246.777961] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 246.785241] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38a1fe26d4 [ 246.792505] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 246.799820] CPU: 1 PID: 9001 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 246.807028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.816383] Call Trace: [ 246.818987] dump_stack+0x1c4/0x2b4 21:37:56 executing program 2 (fault-call:5 fault-nth:2): getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 246.822627] ? dump_stack_print_info.cold.2+0x52/0x52 [ 246.827838] should_fail.cold.4+0xa/0x17 [ 246.831905] ? kasan_check_read+0x11/0x20 [ 246.836062] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 246.841201] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 246.846229] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 246.851255] ? find_next_bit+0x104/0x130 [ 246.855328] ? cpumask_next+0x41/0x50 [ 246.859140] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 246.864691] ? pcpu_alloc+0x190/0x15e0 [ 246.868621] ? pcpu_balance_workfn+0x1740/0x1740 [ 246.873392] ? fs_reclaim_acquire+0x20/0x20 [ 246.875471] FAULT_INJECTION: forcing a failure. [ 246.875471] name failslab, interval 1, probability 0, space 0, times 0 [ 246.878248] ? lock_downgrade+0x900/0x900 [ 246.878262] ? __ia32_sys_membarrier+0x150/0x150 [ 246.878290] ? ___might_sleep+0x1ed/0x300 [ 246.903537] ? __lockdep_init_map+0x105/0x590 [ 246.908058] ? arch_local_save_flags+0x40/0x40 [ 246.912662] ? lockdep_init_map+0x9/0x10 [ 246.916736] __should_failslab+0x124/0x180 [ 246.920978] should_failslab+0x9/0x14 [ 246.924795] __kmalloc+0x2d4/0x760 [ 246.928350] ? __init_waitqueue_head+0x9e/0x150 [ 246.933045] ? init_wait_entry+0x1c0/0x1c0 [ 246.937282] ? prealloc_shrinker+0xe5/0x330 [ 246.941615] prealloc_shrinker+0xe5/0x330 [ 246.945772] sget_userns+0x969/0xf10 [ 246.949491] ? get_anon_bdev+0xc0/0xc0 [ 246.953385] ? destroy_unused_super.part.10+0x110/0x110 [ 246.958757] ? selinux_ipv4_output+0x50/0x50 [ 246.963174] ? __free_pages+0x163/0x190 [ 246.967157] ? selinux_sb_copy_data+0x602/0x740 [ 246.971837] ? selinux_capable+0x36/0x40 [ 246.975914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.981457] ? security_capable+0x99/0xc0 [ 246.985611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.991175] ? ns_capable_common+0x13f/0x170 [ 246.995602] ? get_anon_bdev+0xc0/0xc0 [ 246.999494] sget+0x10b/0x150 [ 247.002612] ? ovl_show_options+0x550/0x550 [ 247.006945] mount_nodev+0x33/0x110 [ 247.010588] ovl_mount+0x2c/0x40 [ 247.013963] mount_fs+0xae/0x31d [ 247.017346] vfs_kern_mount.part.35+0xdc/0x4f0 [ 247.021933] ? may_umount+0xb0/0xb0 [ 247.025586] ? _raw_read_unlock+0x2c/0x50 [ 247.029754] ? __get_fs_type+0x97/0xc0 [ 247.033653] do_mount+0x581/0x31f0 [ 247.037201] ? trace_hardirqs_off+0x310/0x310 [ 247.041704] ? copy_mount_string+0x40/0x40 [ 247.045949] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 247.050714] ? retint_kernel+0x2d/0x2d [ 247.054614] ? copy_mount_options+0x1f3/0x380 [ 247.059129] ? copy_mount_options+0x205/0x380 [ 247.063890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 247.069425] ? copy_mount_options+0x288/0x380 [ 247.073923] ksys_mount+0x12d/0x140 [ 247.077901] __x64_sys_mount+0xbe/0x150 [ 247.081891] do_syscall_64+0x1b9/0x820 [ 247.085786] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 247.091157] ? syscall_return_slowpath+0x5e0/0x5e0 [ 247.096104] ? trace_hardirqs_on_caller+0x310/0x310 [ 247.101151] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 247.106175] ? recalc_sigpending_tsk+0x180/0x180 [ 247.110940] ? kasan_check_write+0x14/0x20 [ 247.115180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.120985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.126695] RIP: 0033:0x457579 [ 247.129891] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.148793] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 247.156509] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 247.163781] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 247.171065] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 247.178360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 247.185626] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 247.192914] CPU: 0 PID: 9011 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #53 [ 247.200129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.211230] Call Trace: [ 247.214351] dump_stack+0x1c4/0x2b4 [ 247.217988] ? dump_stack_print_info.cold.2+0x52/0x52 [ 247.223185] ? __kernel_text_address+0xd/0x40 [ 247.227687] ? unwind_get_return_address+0x61/0xa0 [ 247.233507] should_fail.cold.4+0xa/0x17 [ 247.238273] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 247.243378] ? save_stack+0xa9/0xd0 [ 247.243392] ? kasan_kmalloc+0xc7/0xe0 [ 247.243413] ? __kmalloc_track_caller+0x14a/0x750 [ 247.250910] ? memdup_user+0x2c/0xa0 [ 247.259442] ? strndup_user+0x77/0xd0 [ 247.263247] ? ksys_mount+0x73/0x140 [ 247.266975] ? __x64_sys_mount+0xbe/0x150 [ 247.271137] ? do_syscall_64+0x1b9/0x820 [ 247.275226] ? proc_fail_nth_write+0x9e/0x210 [ 247.279728] ? proc_cwd_link+0x1d0/0x1d0 [ 247.283802] ? ___might_sleep+0x1ed/0x300 [ 247.287962] ? do_raw_spin_unlock+0xa7/0x2f0 [ 247.292413] ? fs_reclaim_acquire+0x20/0x20 [ 247.296758] ? lock_downgrade+0x900/0x900 [ 247.300949] ? ___might_sleep+0x1ed/0x300 [ 247.305115] ? arch_local_save_flags+0x40/0x40 [ 247.309717] ? lock_release+0x970/0x970 [ 247.313715] ? arch_local_save_flags+0x40/0x40 [ 247.318314] ? usercopy_warn+0x110/0x110 [ 247.322389] __should_failslab+0x124/0x180 [ 247.326634] should_failslab+0x9/0x14 [ 247.330445] kmem_cache_alloc_trace+0x2d7/0x750 [ 247.335125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.340675] ? _copy_from_user+0xdf/0x150 [ 247.344836] copy_mount_options+0x5f/0x380 [ 247.349080] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.354634] ksys_mount+0xd0/0x140 [ 247.358182] __x64_sys_mount+0xbe/0x150 [ 247.362176] do_syscall_64+0x1b9/0x820 [ 247.366071] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 247.371447] ? syscall_return_slowpath+0x5e0/0x5e0 [ 247.376388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.381244] ? trace_hardirqs_on_caller+0x310/0x310 [ 247.386272] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 247.391293] ? prepare_exit_to_usermode+0x291/0x3b0 [ 247.396321] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.401183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.406379] RIP: 0033:0x457579 21:37:57 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00@\x00']}) 21:37:57 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f00000001c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="000775b005e381e5b3b60ced5c54dbb7", 0x10) fcntl$setstatus(r0, 0x4, 0x2800) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r3, 0x6}, &(0x7f00000002c0)=0x8) r4 = accept$alg(r2, 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 21:37:57 executing program 3 (fault-call:4 fault-nth:11): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 247.409586] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.428507] RSP: 002b:00007f38a1fe1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 247.436230] RAX: ffffffffffffffda RBX: 00007f38a1fe1c90 RCX: 0000000000457579 [ 247.443507] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 247.450785] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 247.458063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38a1fe26d4 [ 247.465345] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 247.490910] FAULT_INJECTION: forcing a failure. [ 247.490910] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 247.503218] CPU: 0 PID: 9030 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 247.510432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.520222] Call Trace: [ 247.523370] dump_stack+0x1c4/0x2b4 [ 247.527887] ? dump_stack_print_info.cold.2+0x52/0x52 [ 247.533549] should_fail.cold.4+0xa/0x17 [ 247.537651] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 247.542774] ? mark_held_locks+0x130/0x130 [ 247.547027] ? mark_held_locks+0x130/0x130 [ 247.551272] ? pcpu_alloc+0x11ab/0x15e0 [ 247.555255] ? avc_has_perm_noaudit+0x424/0x630 [ 247.559936] ? mark_held_locks+0x130/0x130 [ 247.564184] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 247.569992] ? should_fail+0x22d/0xd01 [ 247.573890] ? debug_check_no_obj_freed+0x305/0x58d [ 247.579358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 247.584910] ? should_fail+0x22d/0xd01 [ 247.588810] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 247.593933] __alloc_pages_nodemask+0x34b/0xde0 [ 247.598624] ? do_raw_spin_lock+0xc1/0x200 [ 247.602876] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 247.607910] ? lock_downgrade+0x900/0x900 [ 247.612065] ? trace_hardirqs_on+0xbd/0x310 [ 247.616398] ? fs_reclaim_acquire+0x20/0x20 [ 247.620728] ? lock_downgrade+0x900/0x900 [ 247.624891] ? ___might_sleep+0x1ed/0x300 [ 247.629064] ? trace_hardirqs_off+0xb8/0x310 [ 247.633495] cache_grow_begin+0x91/0x8c0 [ 247.637580] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.643143] ? check_preemption_disabled+0x48/0x200 [ 247.648173] kmem_cache_alloc_trace+0x67e/0x750 [ 247.652851] ? kasan_check_write+0x14/0x20 [ 247.657094] ? do_raw_spin_lock+0xc1/0x200 [ 247.661338] sget_userns+0x1cf/0xf10 [ 247.665066] ? get_anon_bdev+0xc0/0xc0 [ 247.668969] ? destroy_unused_super.part.10+0x110/0x110 [ 247.674368] ? selinux_ipv4_output+0x50/0x50 [ 247.678787] ? __free_pages+0x163/0x190 [ 247.682770] ? selinux_sb_copy_data+0x602/0x740 [ 247.687456] ? selinux_capable+0x36/0x40 [ 247.691531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 247.697090] ? security_capable+0x99/0xc0 [ 247.701249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 247.706809] ? ns_capable_common+0x13f/0x170 [ 247.711227] ? get_anon_bdev+0xc0/0xc0 [ 247.715125] sget+0x10b/0x150 [ 247.718266] ? ovl_show_options+0x550/0x550 [ 247.722611] mount_nodev+0x33/0x110 [ 247.726247] ovl_mount+0x2c/0x40 [ 247.729624] mount_fs+0xae/0x31d [ 247.733003] vfs_kern_mount.part.35+0xdc/0x4f0 [ 247.737615] ? may_umount+0xb0/0xb0 [ 247.741252] ? _raw_read_unlock+0x2c/0x50 [ 247.745421] ? __get_fs_type+0x97/0xc0 [ 247.749319] do_mount+0x581/0x31f0 [ 247.752863] ? kasan_check_read+0x11/0x20 [ 247.757036] ? do_raw_spin_unlock+0xa7/0x2f0 [ 247.761455] ? copy_mount_string+0x40/0x40 [ 247.765696] ? kasan_check_write+0x14/0x20 [ 247.769968] ? kasan_unpoison_shadow+0x35/0x50 [ 247.774555] ? kasan_kmalloc+0xc7/0xe0 [ 247.778485] ? kmem_cache_alloc_trace+0x31f/0x750 [ 247.783349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 247.788897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 247.794441] ? copy_mount_options+0x288/0x380 [ 247.798961] ksys_mount+0x12d/0x140 [ 247.802608] __x64_sys_mount+0xbe/0x150 [ 247.806605] do_syscall_64+0x1b9/0x820 [ 247.810501] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 247.815871] ? syscall_return_slowpath+0x5e0/0x5e0 [ 247.820994] ? trace_hardirqs_on_caller+0x310/0x310 [ 247.827081] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 247.832107] ? recalc_sigpending_tsk+0x180/0x180 [ 247.836868] ? kasan_check_write+0x14/0x20 [ 247.841112] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.845965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.851164] RIP: 0033:0x457579 [ 247.854389] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.873299] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 247.881032] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 21:37:57 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 247.888332] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 247.895619] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 247.902891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 247.910164] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 247.938485] overlayfs: invalid origin (7900) 21:37:57 executing program 3 (fault-call:4 fault-nth:12): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 248.103472] overlayfs: invalid origin (7900) [ 248.110757] overlayfs: invalid origin (7900) [ 248.127732] overlayfs: invalid origin (7900) 21:37:58 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400010, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 248.159014] FAULT_INJECTION: forcing a failure. [ 248.159014] name failslab, interval 1, probability 0, space 0, times 0 [ 248.162302] overlayfs: filesystem on './file0' not supported as upperdir 21:37:58 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x405c00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:58 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40f925, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 248.234370] CPU: 1 PID: 9052 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 248.241613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.250971] Call Trace: [ 248.253591] dump_stack+0x1c4/0x2b4 [ 248.257248] ? dump_stack_print_info.cold.2+0x52/0x52 [ 248.262444] ? mark_held_locks+0x130/0x130 [ 248.266686] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 248.271976] should_fail.cold.4+0xa/0x17 [ 248.276048] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 248.281160] ? kernel_text_address+0x79/0xf0 [ 248.285580] ? __kernel_text_address+0xd/0x40 [ 248.290089] ? __save_stack_trace+0x8d/0xf0 [ 248.294443] ? save_stack+0xa9/0xd0 [ 248.298116] ? kasan_kmalloc+0xc7/0xe0 [ 248.302070] ? fs_reclaim_acquire+0x20/0x20 [ 248.306402] ? lock_downgrade+0x900/0x900 [ 248.310561] ? ___might_sleep+0x1ed/0x300 [ 248.314728] ? arch_local_save_flags+0x40/0x40 [ 248.319319] __should_failslab+0x124/0x180 [ 248.323559] should_failslab+0x9/0x14 [ 248.327388] kmem_cache_alloc_trace+0x2d7/0x750 [ 248.332060] ? kasan_check_write+0x14/0x20 [ 248.336310] ? __init_rwsem+0x1cc/0x2a0 [ 248.340293] selinux_sb_alloc_security+0x9b/0x2f0 [ 248.345160] ? selinux_inode_alloc_security+0x3a0/0x3a0 [ 248.350549] ? down_write_nested+0x8e/0x130 [ 248.354903] ? sget_userns+0x2e5/0xf10 [ 248.358805] ? _down_write_nest_lock+0x130/0x130 [ 248.363580] security_sb_alloc+0x4c/0xa0 [ 248.367650] sget_userns+0x2ed/0xf10 [ 248.371361] ? get_anon_bdev+0xc0/0xc0 [ 248.375270] ? destroy_unused_super.part.10+0x110/0x110 [ 248.380639] ? selinux_ipv4_output+0x50/0x50 [ 248.385057] ? __free_pages+0x163/0x190 [ 248.389045] ? selinux_sb_copy_data+0x602/0x740 [ 248.393888] ? selinux_capable+0x36/0x40 [ 248.398904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.404888] ? security_capable+0x99/0xc0 [ 248.409033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.414576] ? ns_capable_common+0x13f/0x170 [ 248.418989] ? get_anon_bdev+0xc0/0xc0 [ 248.422873] sget+0x10b/0x150 [ 248.425981] ? ovl_show_options+0x550/0x550 [ 248.430298] mount_nodev+0x33/0x110 [ 248.433924] ovl_mount+0x2c/0x40 [ 248.437291] mount_fs+0xae/0x31d [ 248.440661] vfs_kern_mount.part.35+0xdc/0x4f0 [ 248.445244] ? may_umount+0xb0/0xb0 [ 248.448870] ? _raw_read_unlock+0x2c/0x50 [ 248.453040] ? __get_fs_type+0x97/0xc0 [ 248.456939] do_mount+0x581/0x31f0 [ 248.460495] ? kasan_check_read+0x11/0x20 [ 248.464660] ? do_raw_spin_unlock+0xa7/0x2f0 [ 248.469068] ? copy_mount_string+0x40/0x40 [ 248.473300] ? kasan_check_write+0x14/0x20 [ 248.477537] ? kasan_unpoison_shadow+0x35/0x50 [ 248.482130] ? kasan_kmalloc+0xc7/0xe0 [ 248.486021] ? kmem_cache_alloc_trace+0x31f/0x750 [ 248.490872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 248.496413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.501952] ? copy_mount_options+0x288/0x380 [ 248.506485] ksys_mount+0x12d/0x140 [ 248.510128] __x64_sys_mount+0xbe/0x150 [ 248.514279] do_syscall_64+0x1b9/0x820 [ 248.518168] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 248.523537] ? syscall_return_slowpath+0x5e0/0x5e0 [ 248.528475] ? trace_hardirqs_on_caller+0x310/0x310 [ 248.533490] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 248.538504] ? recalc_sigpending_tsk+0x180/0x180 [ 248.543259] ? kasan_check_write+0x14/0x20 [ 248.547496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.552345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.557530] RIP: 0033:0x457579 [ 248.560729] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:37:58 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:58 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(0x0, 0xb) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmctl$SHM_UNLOCK(0x0, 0xc) [ 248.579627] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 248.587335] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 248.594616] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 248.601896] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 248.609939] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 248.617206] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:37:58 executing program 3 (fault-call:4 fault-nth:13): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x88) recvfrom$inet6(r0, &(0x7f0000e89f47)=""/185, 0xffffffffffffff3f, 0x1000026, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f00008a8000)={0xa, 0x3}, 0x1c) r1 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r1, &(0x7f0000a29000)={&(0x7f00000001c0)=@in6={0xa, 0x3, 0x0, @mcast2}, 0x1c, &(0x7f0000000140)}, 0x8000) sendto$inet6(r1, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000), 0x1c) recvmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000001380), 0x263, 0x0, 0x32c}, 0x0) close(0xffffffffffffffff) 21:37:58 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:58 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40ff00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:58 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 248.793320] overlayfs: invalid origin (7900) [ 248.793689] overlayfs: invalid origin (7900) [ 248.798356] overlayfs: invalid origin (7900) [ 248.815337] overlayfs: filesystem on './file0' not supported as upperdir 21:37:58 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400012, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 248.903617] FAULT_INJECTION: forcing a failure. [ 248.903617] name failslab, interval 1, probability 0, space 0, times 0 [ 248.941670] CPU: 0 PID: 9080 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 248.948898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.958257] Call Trace: [ 248.960869] dump_stack+0x1c4/0x2b4 [ 248.964524] ? dump_stack_print_info.cold.2+0x52/0x52 [ 248.969735] should_fail.cold.4+0xa/0x17 [ 248.973811] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 248.978918] ? perf_trace_lock+0x14d/0x7a0 [ 248.983164] ? zap_class+0x640/0x640 [ 248.986899] ? zap_class+0x640/0x640 [ 248.990645] ? sget+0x10b/0x150 [ 248.993932] ? mount_nodev+0x33/0x110 [ 248.997738] ? ovl_mount+0x2c/0x40 [ 249.001277] ? mount_fs+0xae/0x31d [ 249.004824] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 249.009592] ? do_mount+0x581/0x31f0 [ 249.013322] ? zap_class+0x640/0x640 [ 249.017042] ? fs_reclaim_acquire+0x20/0x20 [ 249.021372] ? lock_downgrade+0x900/0x900 [ 249.025521] ? kasan_check_write+0x14/0x20 [ 249.029764] ? ___might_sleep+0x1ed/0x300 [ 249.033921] ? arch_local_save_flags+0x40/0x40 [ 249.038519] __should_failslab+0x124/0x180 [ 249.042770] should_failslab+0x9/0x14 [ 249.046587] __kmalloc+0x2d4/0x760 [ 249.050149] ? kvfree_rcu+0x20/0x20 [ 249.053779] ? __list_lru_init+0x151/0x840 [ 249.058021] __list_lru_init+0x151/0x840 [ 249.062101] ? list_lru_destroy+0x500/0x500 [ 249.066443] ? up_write+0x7b/0x220 [ 249.069995] ? down_read+0x1d0/0x1d0 [ 249.073736] ? init_wait_entry+0x1c0/0x1c0 [ 249.077984] ? prealloc_shrinker+0xe5/0x330 [ 249.082326] sget_userns+0x9c9/0xf10 [ 249.086040] ? get_anon_bdev+0xc0/0xc0 [ 249.089958] ? destroy_unused_super.part.10+0x110/0x110 [ 249.095327] ? selinux_ipv4_output+0x50/0x50 [ 249.099743] ? __free_pages+0x163/0x190 [ 249.103724] ? selinux_sb_copy_data+0x602/0x740 [ 249.108404] ? selinux_capable+0x36/0x40 [ 249.112475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.118032] ? security_capable+0x99/0xc0 [ 249.122186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.127727] ? ns_capable_common+0x13f/0x170 [ 249.132150] ? get_anon_bdev+0xc0/0xc0 [ 249.136056] sget+0x10b/0x150 [ 249.139177] ? ovl_show_options+0x550/0x550 [ 249.143516] mount_nodev+0x33/0x110 [ 249.147149] ovl_mount+0x2c/0x40 [ 249.150521] mount_fs+0xae/0x31d [ 249.153898] vfs_kern_mount.part.35+0xdc/0x4f0 [ 249.158489] ? may_umount+0xb0/0xb0 [ 249.162120] ? _raw_read_unlock+0x2c/0x50 [ 249.166282] ? __get_fs_type+0x97/0xc0 [ 249.170177] do_mount+0x581/0x31f0 [ 249.173729] ? copy_mount_string+0x40/0x40 [ 249.177973] ? kasan_unpoison_shadow+0x35/0x50 [ 249.182577] ? kasan_kmalloc+0xc7/0xe0 [ 249.186481] ? kmem_cache_alloc_trace+0x31f/0x750 [ 249.191364] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.196908] ? _copy_from_user+0xdf/0x150 [ 249.201079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.206624] ? copy_mount_options+0x288/0x380 [ 249.211131] ksys_mount+0x12d/0x140 [ 249.214780] __x64_sys_mount+0xbe/0x150 [ 249.218765] do_syscall_64+0x1b9/0x820 [ 249.222662] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 249.228030] ? syscall_return_slowpath+0x5e0/0x5e0 [ 249.232966] ? trace_hardirqs_on_caller+0x310/0x310 [ 249.238000] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 249.243021] ? recalc_sigpending_tsk+0x180/0x180 [ 249.247779] ? kasan_check_write+0x14/0x20 [ 249.252022] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.256892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.262091] RIP: 0033:0x457579 [ 249.265290] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.284201] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 249.291914] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 249.299185] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 249.306455] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 249.313728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 249.321017] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:37:59 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:59 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40ff01, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:59 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40f603, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:59 executing program 3 (fault-call:4 fault-nth:14): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:59 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 249.382508] overlayfs: filesystem on './file0' not supported as upperdir [ 249.405957] overlayfs: filesystem on './file0' not supported as upperdir 21:37:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @multicast2}, 0x10) sendto$inet(r0, &(0x7f00005c9000), 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) recvfrom$inet(r0, &(0x7f0000000040)=""/253, 0xfd, 0x40000002, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000300)=':', 0x1, 0x0, 0x0, 0x0) [ 249.551667] FAULT_INJECTION: forcing a failure. [ 249.551667] name failslab, interval 1, probability 0, space 0, times 0 [ 249.595552] overlayfs: filesystem on './file0' not supported as upperdir [ 249.596017] CPU: 0 PID: 9110 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 249.609657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.619014] Call Trace: [ 249.621660] dump_stack+0x1c4/0x2b4 [ 249.625312] ? dump_stack_print_info.cold.2+0x52/0x52 [ 249.630501] should_fail.cold.4+0xa/0x17 [ 249.634550] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 249.639646] ? save_stack+0xa9/0xd0 [ 249.643265] ? save_stack+0x43/0xd0 [ 249.646899] ? kasan_kmalloc+0xc7/0xe0 [ 249.650789] ? __kmalloc+0x14e/0x760 [ 249.654509] ? __list_lru_init+0x151/0x840 [ 249.658728] ? sget_userns+0x9c9/0xf10 [ 249.662615] ? sget+0x10b/0x150 [ 249.665876] ? mount_nodev+0x33/0x110 [ 249.669662] ? ovl_mount+0x2c/0x40 [ 249.673182] ? mount_fs+0xae/0x31d [ 249.676708] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 249.681522] ? do_mount+0x581/0x31f0 [ 249.685217] ? ksys_mount+0x12d/0x140 [ 249.688999] ? __x64_sys_mount+0xbe/0x150 [ 249.693132] ? do_syscall_64+0x1b9/0x820 [ 249.697176] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.702525] ? fs_reclaim_acquire+0x20/0x20 [ 249.706830] ? lock_downgrade+0x900/0x900 [ 249.710963] ? ___might_sleep+0x1ed/0x300 [ 249.715093] ? arch_local_save_flags+0x40/0x40 [ 249.719670] ? kasan_check_write+0x14/0x20 [ 249.723896] ? ___might_sleep+0x1ed/0x300 [ 249.728026] __should_failslab+0x124/0x180 [ 249.732247] should_failslab+0x9/0x14 [ 249.736032] kmem_cache_alloc_node_trace+0x270/0x740 [ 249.741115] ? kasan_kmalloc+0xc7/0xe0 [ 249.744998] __kmalloc_node+0x33/0x70 [ 249.748795] kvmalloc_node+0x65/0xf0 [ 249.752495] __list_lru_init+0x5d9/0x840 [ 249.756538] ? list_lru_destroy+0x500/0x500 [ 249.760841] ? up_write+0x7b/0x220 [ 249.764365] ? down_read+0x1d0/0x1d0 [ 249.768076] ? init_wait_entry+0x1c0/0x1c0 [ 249.772304] ? prealloc_shrinker+0xe5/0x330 [ 249.776614] sget_userns+0x9c9/0xf10 [ 249.780310] ? get_anon_bdev+0xc0/0xc0 [ 249.784180] ? destroy_unused_super.part.10+0x110/0x110 [ 249.789527] ? selinux_ipv4_output+0x50/0x50 [ 249.793922] ? __free_pages+0x163/0x190 [ 249.797881] ? selinux_sb_copy_data+0x602/0x740 [ 249.802535] ? selinux_capable+0x36/0x40 [ 249.806583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.812107] ? security_capable+0x99/0xc0 [ 249.816242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.821760] ? ns_capable_common+0x13f/0x170 [ 249.826153] ? get_anon_bdev+0xc0/0xc0 [ 249.830024] sget+0x10b/0x150 [ 249.833119] ? ovl_show_options+0x550/0x550 [ 249.837419] mount_nodev+0x33/0x110 [ 249.841027] ovl_mount+0x2c/0x40 [ 249.844376] mount_fs+0xae/0x31d [ 249.847731] vfs_kern_mount.part.35+0xdc/0x4f0 [ 249.852334] ? may_umount+0xb0/0xb0 [ 249.855975] ? _raw_read_unlock+0x2c/0x50 [ 249.860104] ? __get_fs_type+0x97/0xc0 [ 249.863976] do_mount+0x581/0x31f0 [ 249.867510] ? copy_mount_string+0x40/0x40 [ 249.871724] ? kasan_unpoison_shadow+0x35/0x50 [ 249.876289] ? kasan_kmalloc+0xc7/0xe0 [ 249.880163] ? kmem_cache_alloc_trace+0x31f/0x750 [ 249.885009] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.890542] ? _copy_from_user+0xdf/0x150 [ 249.894680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.900215] ? copy_mount_options+0x288/0x380 [ 249.904695] ksys_mount+0x12d/0x140 [ 249.908308] __x64_sys_mount+0xbe/0x150 [ 249.912271] do_syscall_64+0x1b9/0x820 [ 249.916140] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 249.921488] ? syscall_return_slowpath+0x5e0/0x5e0 [ 249.926404] ? trace_hardirqs_on_caller+0x310/0x310 [ 249.931404] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 249.936404] ? recalc_sigpending_tsk+0x180/0x180 [ 249.941143] ? kasan_check_write+0x14/0x20 [ 249.945380] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.950211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.955380] RIP: 0033:0x457579 [ 249.958556] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.977444] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 249.985134] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 21:37:59 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:37:59 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000fc0)=[&(0x7f0000000f80)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000d40), 0x0, 0x0, 0x0, 0x1, r1}]) r2 = accept4(r1, &(0x7f0000000a00)=@generic, &(0x7f0000000500)=0x80, 0x2) getpeername$inet6(r2, &(0x7f00000008c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000980)=0x1c) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000007c0)=""/255) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(r3, &(0x7f0000000480), 0x10) sysinfo(&(0x7f0000000d80)=""/201) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) shutdown(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000009c0)=ANY=[@ANYBLOB="53000000a52c53a8e8991f8cf3dd8d847ec339596db925f2dbafedc5d0d24dfc32c6c32c5cff5d0308fc39d645db5706c73719b3df928249de42"], &(0x7f0000000000)=0x1) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000440)=0xa) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x800, 0x0, 0x95a}, &(0x7f0000000340)=0x18) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r5 = getpgrp(0x0) migrate_pages(r5, 0x9, &(0x7f0000000040)=0x3, &(0x7f0000000080)=0xffffffff80000801) 21:37:59 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4000f0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:59 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400700, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:37:59 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0xc0ffff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 249.992386] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 249.999652] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 250.006917] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 250.014169] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:37:59 executing program 3 (fault-call:4 fault-nth:15): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 250.133753] FAULT_INJECTION: forcing a failure. [ 250.133753] name failslab, interval 1, probability 0, space 0, times 0 [ 250.205214] overlayfs: filesystem on './file0' not supported as upperdir [ 250.208936] CPU: 0 PID: 9128 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 250.219295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.228652] Call Trace: [ 250.231253] dump_stack+0x1c4/0x2b4 [ 250.234892] ? dump_stack_print_info.cold.2+0x52/0x52 [ 250.240110] should_fail.cold.4+0xa/0x17 [ 250.244209] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 250.250200] ? save_stack+0xa9/0xd0 [ 250.253839] ? save_stack+0x43/0xd0 [ 250.257469] ? kasan_kmalloc+0xc7/0xe0 [ 250.257485] ? __kmalloc+0x14e/0x760 [ 250.257500] ? __list_lru_init+0x151/0x840 [ 250.257522] ? sget_userns+0x999/0xf10 [ 250.265126] ? sget+0x10b/0x150 [ 250.265138] ? mount_nodev+0x33/0x110 [ 250.265152] ? ovl_mount+0x2c/0x40 [ 250.265164] ? mount_fs+0xae/0x31d [ 250.265193] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 250.265211] ? do_mount+0x581/0x31f0 [ 250.276616] ? ksys_mount+0x12d/0x140 [ 250.276629] ? __x64_sys_mount+0xbe/0x150 [ 250.276646] ? do_syscall_64+0x1b9/0x820 [ 250.276668] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.283993] ? fs_reclaim_acquire+0x20/0x20 [ 250.284010] ? lock_downgrade+0x900/0x900 [ 250.284029] ? ___might_sleep+0x1ed/0x300 [ 250.284049] ? arch_local_save_flags+0x40/0x40 [ 250.292346] ? ___might_sleep+0x1ed/0x300 [ 250.292365] __should_failslab+0x124/0x180 [ 250.292380] should_failslab+0x9/0x14 [ 250.292403] kmem_cache_alloc_node_trace+0x270/0x740 [ 250.347748] ? kasan_kmalloc+0xc7/0xe0 [ 250.351639] __kmalloc_node+0x33/0x70 [ 250.355438] kvmalloc_node+0x65/0xf0 [ 250.359142] __list_lru_init+0x5d9/0x840 [ 250.363189] ? list_lru_destroy+0x500/0x500 [ 250.367509] ? up_write+0x7b/0x220 [ 250.371046] ? up_read+0x110/0x110 [ 250.374592] ? down_read+0x1d0/0x1d0 [ 250.378301] ? init_wait_entry+0x1c0/0x1c0 [ 250.382519] ? prealloc_shrinker+0xe5/0x330 [ 250.386831] sget_userns+0x999/0xf10 [ 250.390528] ? get_anon_bdev+0xc0/0xc0 [ 250.394401] ? destroy_unused_super.part.10+0x110/0x110 [ 250.399769] ? selinux_ipv4_output+0x50/0x50 [ 250.404179] ? __free_pages+0x163/0x190 [ 250.408137] ? selinux_sb_copy_data+0x602/0x740 [ 250.412791] ? selinux_capable+0x36/0x40 [ 250.416839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.422359] ? security_capable+0x99/0xc0 [ 250.426493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.432021] ? ns_capable_common+0x13f/0x170 [ 250.436420] ? get_anon_bdev+0xc0/0xc0 [ 250.440289] sget+0x10b/0x150 [ 250.443381] ? ovl_show_options+0x550/0x550 [ 250.447708] mount_nodev+0x33/0x110 [ 250.451319] ovl_mount+0x2c/0x40 [ 250.454682] mount_fs+0xae/0x31d [ 250.458037] vfs_kern_mount.part.35+0xdc/0x4f0 [ 250.462633] ? may_umount+0xb0/0xb0 [ 250.466251] ? _raw_read_unlock+0x2c/0x50 [ 250.470388] ? __get_fs_type+0x97/0xc0 [ 250.474262] do_mount+0x581/0x31f0 [ 250.477804] ? kasan_check_read+0x11/0x20 [ 250.481966] ? do_raw_spin_unlock+0xa7/0x2f0 [ 250.486379] ? copy_mount_string+0x40/0x40 [ 250.490623] ? kasan_check_write+0x14/0x20 [ 250.494846] ? kasan_unpoison_shadow+0x35/0x50 [ 250.499409] ? kasan_kmalloc+0xc7/0xe0 [ 250.503287] ? kmem_cache_alloc_trace+0x31f/0x750 [ 250.508118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 250.513646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.519166] ? copy_mount_options+0x288/0x380 [ 250.523660] ksys_mount+0x12d/0x140 [ 250.527285] __x64_sys_mount+0xbe/0x150 [ 250.531247] do_syscall_64+0x1b9/0x820 [ 250.535129] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 250.540482] ? syscall_return_slowpath+0x5e0/0x5e0 [ 250.545396] ? trace_hardirqs_on_caller+0x310/0x310 [ 250.550401] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 250.555406] ? recalc_sigpending_tsk+0x180/0x180 [ 250.560146] ? kasan_check_write+0x14/0x20 [ 250.564368] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.569212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.574396] RIP: 0033:0x457579 [ 250.577592] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.596484] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:38:00 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x5000000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:00 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(r4, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16=r4, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r3, @ANYRES32=r0, @ANYRES64=r4, @ANYRESDEC=r3, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64=r3], 0x155) write$P9_RGETATTR(r4, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r5 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:00 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401100, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:00 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x600000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:00 executing program 3 (fault-call:4 fault-nth:16): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 250.604176] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 250.611435] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 250.618687] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 250.625937] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 250.633433] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:00 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400004, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bb000000000000bb252f45000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x9000}], 0x0, &(0x7f00000002c0)) [ 250.738297] FAULT_INJECTION: forcing a failure. [ 250.738297] name failslab, interval 1, probability 0, space 0, times 0 [ 250.800943] CPU: 1 PID: 9154 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 250.803983] overlayfs: filesystem on './file0' not supported as upperdir [ 250.808173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.808181] Call Trace: [ 250.808209] dump_stack+0x1c4/0x2b4 [ 250.808240] ? dump_stack_print_info.cold.2+0x52/0x52 [ 250.835791] ? kasan_check_read+0x11/0x20 [ 250.839972] should_fail.cold.4+0xa/0x17 [ 250.844047] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 250.844067] ? kernel_text_address+0x79/0xf0 [ 250.844086] ? __kernel_text_address+0xd/0x40 [ 250.853590] ? unwind_get_return_address+0x61/0xa0 [ 250.853622] ? __save_stack_trace+0x8d/0xf0 [ 250.853648] ? save_stack+0xa9/0xd0 [ 250.853662] ? save_stack+0x43/0xd0 [ 250.853682] ? fs_reclaim_acquire+0x20/0x20 [ 250.878972] ? lock_downgrade+0x900/0x900 [ 250.883124] ? ___might_sleep+0x1ed/0x300 [ 250.883142] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 250.883158] ? arch_local_save_flags+0x40/0x40 [ 250.883175] ? creds_are_invalid+0x140/0x140 [ 250.883199] __should_failslab+0x124/0x180 [ 250.892880] ? ovl_show_options+0x550/0x550 [ 250.892896] should_failslab+0x9/0x14 [ 250.892914] kmem_cache_alloc+0x2be/0x730 [ 250.892932] ? trace_hardirqs_on+0xbd/0x310 [ 250.892952] ? ovl_show_options+0x550/0x550 [ 250.910489] prepare_creds+0xab/0x4d0 [ 250.910505] ? abort_creds+0x2a0/0x2a0 [ 250.910529] ? kmem_cache_alloc_trace+0x31f/0x750 [ 250.939549] ? memcpy+0x45/0x50 [ 250.942842] ? ovl_show_options+0x550/0x550 [ 250.947166] ovl_fill_super+0x14b/0x3f7b [ 250.951249] ? destroy_unused_super.part.10+0x110/0x110 [ 250.956633] ? selinux_ipv4_output+0x50/0x50 [ 250.961044] ? ovl_show_options+0x550/0x550 [ 250.965365] ? __free_pages+0x163/0x190 [ 250.969339] ? selinux_sb_copy_data+0x602/0x740 [ 250.974014] ? selinux_capable+0x36/0x40 [ 250.978080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.983631] ? security_capable+0x99/0xc0 [ 250.987782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.993322] ? ns_capable_common+0x13f/0x170 [ 250.997726] ? get_anon_bdev+0xc0/0xc0 [ 251.001613] ? sget+0x113/0x150 [ 251.004892] ? ovl_show_options+0x550/0x550 [ 251.009209] mount_nodev+0x6b/0x110 [ 251.012838] ovl_mount+0x2c/0x40 [ 251.016233] mount_fs+0xae/0x31d [ 251.019611] vfs_kern_mount.part.35+0xdc/0x4f0 [ 251.024195] ? may_umount+0xb0/0xb0 [ 251.027839] ? _raw_read_unlock+0x2c/0x50 [ 251.031988] ? __get_fs_type+0x97/0xc0 [ 251.035898] do_mount+0x581/0x31f0 [ 251.039469] ? copy_mount_string+0x40/0x40 [ 251.043707] ? kasan_unpoison_shadow+0x35/0x50 [ 251.048287] ? kasan_kmalloc+0xc7/0xe0 [ 251.052192] ? kmem_cache_alloc_trace+0x31f/0x750 [ 251.057041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 251.062582] ? copy_mount_options+0x288/0x380 [ 251.067080] ksys_mount+0x12d/0x140 [ 251.070732] __x64_sys_mount+0xbe/0x150 [ 251.074722] do_syscall_64+0x1b9/0x820 [ 251.078609] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 251.083990] ? syscall_return_slowpath+0x5e0/0x5e0 [ 251.088935] ? trace_hardirqs_on_caller+0x310/0x310 [ 251.093964] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 251.098977] ? recalc_sigpending_tsk+0x180/0x180 [ 251.103743] ? kasan_check_write+0x14/0x20 [ 251.107986] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.112846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.118030] RIP: 0033:0x457579 [ 251.121225] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.140124] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:38:01 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x403a00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:01 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r3 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:01 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40000b, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 251.147831] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 251.155115] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 251.162415] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 251.169684] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 251.176950] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:01 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401200, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:01 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4003f8, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:01 executing program 3 (fault-call:4 fault-nth:17): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 251.216316] isofs_fill_super: root inode is not a directory. Corrupted media? [ 251.281289] isofs_fill_super: root inode is not a directory. Corrupted media? [ 251.346430] 9pnet: Insufficient options for proto=fd 21:38:01 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$apparmor_exec(r0, &(0x7f0000000080)={'exec ', ',cpusetvboxnet0\x00'}, 0x15) [ 251.372664] overlayfs: filesystem on './file0' not supported as upperdir [ 251.383966] FAULT_INJECTION: forcing a failure. [ 251.383966] name failslab, interval 1, probability 0, space 0, times 0 21:38:01 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x405c00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:01 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401100, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 251.434462] CPU: 0 PID: 9193 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 251.441693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.451061] Call Trace: [ 251.453671] dump_stack+0x1c4/0x2b4 [ 251.457312] ? dump_stack_print_info.cold.2+0x52/0x52 [ 251.462516] ? unwind_dump+0x190/0x190 [ 251.466419] should_fail.cold.4+0xa/0x17 [ 251.470491] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 251.475614] ? unwind_get_return_address+0x61/0xa0 [ 251.480550] ? __save_stack_trace+0x8d/0xf0 [ 251.484907] ? save_stack+0xa9/0xd0 [ 251.488534] ? save_stack+0x43/0xd0 [ 251.492167] ? kasan_kmalloc+0xc7/0xe0 [ 251.496052] ? kasan_slab_alloc+0x12/0x20 [ 251.500199] ? kmem_cache_alloc+0x12e/0x730 [ 251.505013] ? prepare_creds+0xab/0x4d0 [ 251.508990] ? ovl_fill_super+0x14b/0x3f7b [ 251.513226] ? mount_nodev+0x6b/0x110 [ 251.517029] ? ovl_mount+0x2c/0x40 [ 251.520584] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 251.525356] ? fs_reclaim_acquire+0x20/0x20 [ 251.529682] ? lock_downgrade+0x900/0x900 [ 251.533860] ? ___might_sleep+0x1ed/0x300 [ 251.538016] ? arch_local_save_flags+0x40/0x40 [ 251.542618] ? fs_reclaim_acquire+0x20/0x20 [ 251.546945] ? lock_downgrade+0x900/0x900 [ 251.551115] __should_failslab+0x124/0x180 [ 251.555373] should_failslab+0x9/0x14 [ 251.559180] __kmalloc_track_caller+0x2d0/0x750 [ 251.563858] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 251.569314] ? kasan_kmalloc+0xc7/0xe0 [ 251.573203] ? selinux_cred_prepare+0x49/0xb0 [ 251.577711] kmemdup+0x24/0x50 [ 251.580910] selinux_cred_prepare+0x49/0xb0 [ 251.585253] security_prepare_creds+0x60/0xc0 [ 251.589755] prepare_creds+0x3b9/0x4d0 [ 251.593648] ? abort_creds+0x2a0/0x2a0 [ 251.597547] ? kmem_cache_alloc_trace+0x31f/0x750 [ 251.602430] ? memcpy+0x45/0x50 [ 251.605720] ? ovl_show_options+0x550/0x550 [ 251.610046] ovl_fill_super+0x14b/0x3f7b [ 251.614131] ? destroy_unused_super.part.10+0x110/0x110 [ 251.619513] ? selinux_ipv4_output+0x50/0x50 [ 251.623938] ? ovl_show_options+0x550/0x550 [ 251.628264] ? __free_pages+0x163/0x190 [ 251.632268] ? selinux_sb_copy_data+0x602/0x740 [ 251.636951] ? selinux_capable+0x36/0x40 [ 251.641030] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 251.646584] ? security_capable+0x99/0xc0 [ 251.650754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 251.656295] ? ns_capable_common+0x13f/0x170 [ 251.660707] ? get_anon_bdev+0xc0/0xc0 [ 251.664611] ? sget+0x113/0x150 [ 251.667900] ? ovl_show_options+0x550/0x550 [ 251.672238] mount_nodev+0x6b/0x110 [ 251.675886] ovl_mount+0x2c/0x40 [ 251.679283] mount_fs+0xae/0x31d [ 251.682665] vfs_kern_mount.part.35+0xdc/0x4f0 [ 251.687267] ? may_umount+0xb0/0xb0 [ 251.690898] ? _raw_read_unlock+0x2c/0x50 [ 251.695054] ? __get_fs_type+0x97/0xc0 [ 251.698951] do_mount+0x581/0x31f0 [ 251.702507] ? copy_mount_string+0x40/0x40 [ 251.706754] ? kasan_unpoison_shadow+0x35/0x50 [ 251.711337] ? kasan_kmalloc+0xc7/0xe0 [ 251.715238] ? kmem_cache_alloc_trace+0x31f/0x750 [ 251.720109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 251.725738] ? copy_mount_options+0x288/0x380 [ 251.730244] ksys_mount+0x12d/0x140 [ 251.733891] __x64_sys_mount+0xbe/0x150 [ 251.737873] do_syscall_64+0x1b9/0x820 [ 251.741767] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 251.747138] ? syscall_return_slowpath+0x5e0/0x5e0 [ 251.752089] ? trace_hardirqs_on_caller+0x310/0x310 [ 251.757125] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 251.762145] ? recalc_sigpending_tsk+0x180/0x180 [ 251.766908] ? kasan_check_write+0x14/0x20 [ 251.771156] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.776012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.781223] RIP: 0033:0x457579 [ 251.784422] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.803322] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 251.811038] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 251.818303] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 251.825604] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 21:38:01 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:01 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64=r2, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r3 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:01 executing program 3 (fault-call:4 fault-nth:18): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 251.832876] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 251.840146] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 251.880156] FAULT_INJECTION: forcing a failure. [ 251.880156] name failslab, interval 1, probability 0, space 0, times 0 [ 251.892038] CPU: 0 PID: 9204 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 251.899241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.908592] Call Trace: [ 251.911224] dump_stack+0x1c4/0x2b4 [ 251.914863] ? dump_stack_print_info.cold.2+0x52/0x52 [ 251.920056] ? idr_destroy+0x1c0/0x1c0 [ 251.923940] ? plist_requeue+0x620/0x620 [ 251.928004] should_fail.cold.4+0xa/0x17 [ 251.932064] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 251.937179] ? radix_tree_descend+0x2e0/0x2e0 [ 251.941676] ? __radix_tree_lookup+0x358/0x4c0 [ 251.946264] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 251.951801] ? register_shrinker_prepared+0x1a9/0x260 [ 251.957005] ? lock_downgrade+0x900/0x900 [ 251.961155] ? radix_tree_delete+0x30/0x30 [ 251.965402] ? fs_reclaim_acquire+0x20/0x20 [ 251.969721] ? lock_downgrade+0x900/0x900 [ 251.973870] ? idr_replace+0x18a/0x290 [ 251.977763] ? ___might_sleep+0x1ed/0x300 [ 251.981914] ? arch_local_save_flags+0x40/0x40 [ 251.986504] ? up_read+0x110/0x110 [ 251.990043] ? down_read+0x1d0/0x1d0 [ 251.993760] __should_failslab+0x124/0x180 [ 251.997999] ? ovl_show_options+0x550/0x550 [ 252.002317] should_failslab+0x9/0x14 [ 252.006130] kmem_cache_alloc_trace+0x2d7/0x750 [ 252.010796] ? memcpy+0x45/0x50 [ 252.014082] ? ovl_show_options+0x550/0x550 [ 252.018403] ovl_fill_super+0x135/0x3f7b [ 252.022472] ? destroy_unused_super.part.10+0x110/0x110 [ 252.027849] ? selinux_ipv4_output+0x50/0x50 [ 252.032258] ? ovl_show_options+0x550/0x550 [ 252.036593] ? __free_pages+0x163/0x190 [ 252.040588] ? selinux_sb_copy_data+0x602/0x740 [ 252.045272] ? selinux_capable+0x36/0x40 [ 252.049345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.054877] ? security_capable+0x99/0xc0 [ 252.059025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.064558] ? ns_capable_common+0x13f/0x170 [ 252.068977] ? get_anon_bdev+0xc0/0xc0 [ 252.072864] ? sget+0x113/0x150 [ 252.076146] ? ovl_show_options+0x550/0x550 [ 252.080490] mount_nodev+0x6b/0x110 [ 252.084127] ovl_mount+0x2c/0x40 [ 252.087490] mount_fs+0xae/0x31d [ 252.090864] vfs_kern_mount.part.35+0xdc/0x4f0 [ 252.095452] ? may_umount+0xb0/0xb0 [ 252.099084] ? _raw_read_unlock+0x2c/0x50 [ 252.103230] ? __get_fs_type+0x97/0xc0 [ 252.107143] do_mount+0x581/0x31f0 [ 252.110680] ? kasan_check_read+0x11/0x20 [ 252.114832] ? do_raw_spin_unlock+0xa7/0x2f0 [ 252.119267] ? copy_mount_string+0x40/0x40 [ 252.123513] ? kasan_check_write+0x14/0x20 [ 252.127745] ? kasan_unpoison_shadow+0x35/0x50 [ 252.132327] ? kasan_kmalloc+0xc7/0xe0 [ 252.136218] ? kmem_cache_alloc_trace+0x31f/0x750 [ 252.141071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 252.146623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.152158] ? copy_mount_options+0x288/0x380 [ 252.156655] ksys_mount+0x12d/0x140 [ 252.160281] __x64_sys_mount+0xbe/0x150 [ 252.164257] do_syscall_64+0x1b9/0x820 [ 252.168148] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 252.173510] ? syscall_return_slowpath+0x5e0/0x5e0 [ 252.178441] ? trace_hardirqs_on_caller+0x310/0x310 [ 252.183456] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 252.188473] ? recalc_sigpending_tsk+0x180/0x180 [ 252.193228] ? kasan_check_write+0x14/0x20 [ 252.197465] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.202311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.207506] RIP: 0033:0x457579 [ 252.210699] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:38:02 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x10001) sendfile(r1, r2, &(0x7f0000002000), 0x12000) 21:38:02 executing program 3 (fault-call:4 fault-nth:19): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 252.229630] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 252.237359] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 252.244643] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 252.251917] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 252.259187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 252.266454] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 252.353967] FAULT_INJECTION: forcing a failure. [ 252.353967] name failslab, interval 1, probability 0, space 0, times 0 [ 252.369027] ovl_get_fh: 18 callbacks suppressed [ 252.369037] overlayfs: invalid origin (7900) [ 252.386667] 9pnet: Insufficient options for proto=fd [ 252.396450] audit: type=1800 audit(1539034682.230:59): pid=9220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor1" name="file0" dev="sda1" ino=16554 res=0 [ 252.404700] overlayfs: invalid origin (7900) [ 252.430822] overlayfs: invalid origin (7900) [ 252.434774] CPU: 1 PID: 9209 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 252.442480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.451009] overlayfs: filesystem on './file0' not supported as upperdir [ 252.451838] Call Trace: [ 252.451868] dump_stack+0x1c4/0x2b4 [ 252.451891] ? dump_stack_print_info.cold.2+0x52/0x52 [ 252.451912] ? kasan_check_read+0x11/0x20 [ 252.474275] should_fail.cold.4+0xa/0x17 [ 252.475476] overlayfs: invalid origin (7900) [ 252.478351] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 252.478369] ? kernel_text_address+0x79/0xf0 [ 252.478387] ? __kernel_text_address+0xd/0x40 [ 252.496783] ? unwind_get_return_address+0x61/0xa0 [ 252.501732] ? __save_stack_trace+0x8d/0xf0 [ 252.506071] ? save_stack+0xa9/0xd0 [ 252.509540] audit: type=1804 audit(1539034682.260:60): pid=9220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir521036980/syzkaller.zUuQoO/74/file0" dev="sda1" ino=16554 res=1 [ 252.509725] ? save_stack+0x43/0xd0 [ 252.539901] ? fs_reclaim_acquire+0x20/0x20 [ 252.544233] ? lock_downgrade+0x900/0x900 21:38:02 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:02 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400408, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:02 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40f000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:02 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4000e0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 252.547359] audit: type=1804 audit(1539034682.260:61): pid=9220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir521036980/syzkaller.zUuQoO/74/file0" dev="sda1" ino=16554 res=1 [ 252.548390] ? ___might_sleep+0x1ed/0x300 [ 252.548412] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 252.583396] audit: type=1804 audit(1539034682.420:62): pid=9220 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir521036980/syzkaller.zUuQoO/74/file0" dev="sda1" ino=16554 res=1 [ 252.584118] ? arch_local_save_flags+0x40/0x40 [ 252.584137] ? creds_are_invalid+0x140/0x140 [ 252.613523] audit: type=1804 audit(1539034682.450:63): pid=9226 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir521036980/syzkaller.zUuQoO/74/file0" dev="sda1" ino=16554 res=1 [ 252.615475] __should_failslab+0x124/0x180 [ 252.615495] ? ovl_show_options+0x550/0x550 21:38:02 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000200)) sendmmsg(r0, &(0x7f0000002080)=[{{&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000980)='\tW', 0x2}], 0x1, &(0x7f00000020c0)}}], 0x1, 0x0) 21:38:02 executing program 1: write(0xffffffffffffffff, &(0x7f00000003c0)="16e358652988c6", 0x7) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f0000000340)=0x20) [ 252.637674] syz-executor1 (9226) used greatest stack depth: 15552 bytes left [ 252.645902] should_failslab+0x9/0x14 [ 252.645920] kmem_cache_alloc+0x2be/0x730 [ 252.645938] ? trace_hardirqs_on+0xbd/0x310 [ 252.645956] ? up_read+0x110/0x110 [ 252.665462] ? down_read+0x1d0/0x1d0 [ 252.665500] ? ovl_show_options+0x550/0x550 [ 252.673948] prepare_creds+0xab/0x4d0 [ 252.673963] ? abort_creds+0x2a0/0x2a0 [ 252.673983] ? kmem_cache_alloc_trace+0x31f/0x750 [ 252.674000] ? memcpy+0x45/0x50 [ 252.701368] ? ovl_show_options+0x550/0x550 [ 252.705712] ovl_fill_super+0x14b/0x3f7b [ 252.709799] ? destroy_unused_super.part.10+0x110/0x110 [ 252.715173] ? selinux_ipv4_output+0x50/0x50 [ 252.719608] ? ovl_show_options+0x550/0x550 [ 252.723946] ? __free_pages+0x163/0x190 [ 252.727958] ? selinux_sb_copy_data+0x602/0x740 [ 252.732664] ? selinux_capable+0x36/0x40 [ 252.736736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.742281] ? security_capable+0x99/0xc0 [ 252.746436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 21:38:02 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000fc0)=[&(0x7f0000000f80)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000d40), 0x0, 0x0, 0x0, 0x1, r1}]) r2 = accept4(r1, &(0x7f0000000a00)=@generic, &(0x7f0000000500)=0x80, 0x2) getpeername$inet6(r2, &(0x7f00000008c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000980)=0x1c) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f00000007c0)=""/255) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(r3, &(0x7f0000000480), 0x10) sysinfo(&(0x7f0000000d80)=""/201) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) shutdown(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000009c0)=ANY=[@ANYBLOB="53000000a52c53a8e8991f8cf3dd8d847ec339596db925f2dbafedc5d0d24dfc32c6c32c5cff5d0308fc39d645db5706c73719b3df928249de"], &(0x7f0000000000)=0x1) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000440)=0xa) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x800, 0x0, 0x95a}, &(0x7f0000000340)=0x18) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r5 = getpgrp(0x0) migrate_pages(r5, 0x9, &(0x7f0000000040)=0x3, &(0x7f0000000080)=0xffffffff80000801) [ 252.751975] ? ns_capable_common+0x13f/0x170 [ 252.756398] ? get_anon_bdev+0xc0/0xc0 [ 252.760299] ? sget+0x113/0x150 [ 252.763593] ? ovl_show_options+0x550/0x550 [ 252.763607] mount_nodev+0x6b/0x110 [ 252.763622] ovl_mount+0x2c/0x40 [ 252.763635] mount_fs+0xae/0x31d [ 252.763656] vfs_kern_mount.part.35+0xdc/0x4f0 [ 252.771618] ? may_umount+0xb0/0xb0 [ 252.786542] ? _raw_read_unlock+0x2c/0x50 [ 252.790723] ? __get_fs_type+0x97/0xc0 [ 252.794613] do_mount+0x581/0x31f0 [ 252.794627] ? kasan_check_read+0x11/0x20 [ 252.794643] ? do_raw_spin_unlock+0xa7/0x2f0 [ 252.794663] ? copy_mount_string+0x40/0x40 [ 252.810963] ? kasan_check_write+0x14/0x20 [ 252.810980] ? kasan_unpoison_shadow+0x35/0x50 [ 252.811000] ? kasan_kmalloc+0xc7/0xe0 [ 252.819820] ? kmem_cache_alloc_trace+0x31f/0x750 [ 252.819839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 252.819863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.828578] ? copy_mount_options+0x288/0x380 [ 252.828596] ksys_mount+0x12d/0x140 [ 252.828618] __x64_sys_mount+0xbe/0x150 [ 252.839682] do_syscall_64+0x1b9/0x820 [ 252.839698] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 252.839718] ? syscall_return_slowpath+0x5e0/0x5e0 [ 252.847874] ? trace_hardirqs_on_caller+0x310/0x310 [ 252.847890] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 252.847907] ? recalc_sigpending_tsk+0x180/0x180 [ 252.847923] ? kasan_check_write+0x14/0x20 [ 252.855771] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.855791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.855812] RIP: 0033:0x457579 21:38:02 executing program 3 (fault-call:4 fault-nth:20): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 252.866102] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.866111] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 252.866142] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 252.866151] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 252.866160] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 252.866169] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 252.866177] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 252.912617] FAULT_INJECTION: forcing a failure. [ 252.912617] name failslab, interval 1, probability 0, space 0, times 0 [ 252.928872] CPU: 1 PID: 9239 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 252.980703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.990049] Call Trace: [ 252.992656] dump_stack+0x1c4/0x2b4 [ 252.996285] ? dump_stack_print_info.cold.2+0x52/0x52 [ 253.001473] ? __kernel_text_address+0xd/0x40 [ 253.005973] ? unwind_get_return_address+0x61/0xa0 [ 253.010905] should_fail.cold.4+0xa/0x17 [ 253.014972] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 253.020074] ? save_stack+0xa9/0xd0 [ 253.023702] ? save_stack+0x43/0xd0 [ 253.027325] ? kasan_kmalloc+0xc7/0xe0 [ 253.031211] ? __kmalloc+0x14e/0x760 [ 253.034937] ? match_strdup+0x5e/0xa0 [ 253.038736] ? ovl_fill_super+0x45d/0x3f7b [ 253.042970] ? mount_nodev+0x6b/0x110 [ 253.046765] ? mount_fs+0xae/0x31d [ 253.050304] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 253.055056] ? do_mount+0x581/0x31f0 [ 253.058767] ? ksys_mount+0x12d/0x140 [ 253.062575] ? __x64_sys_mount+0xbe/0x150 [ 253.066727] ? do_syscall_64+0x1b9/0x820 [ 253.070792] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.076164] ? kmemdup+0x24/0x50 [ 253.079536] ? kasan_unpoison_shadow+0x35/0x50 [ 253.084130] ? kasan_kmalloc+0xc7/0xe0 [ 253.088023] ? fs_reclaim_acquire+0x20/0x20 [ 253.092348] ? lock_downgrade+0x900/0x900 [ 253.096522] ? ___might_sleep+0x1ed/0x300 [ 253.100686] ? arch_local_save_flags+0x40/0x40 [ 253.105270] ? trace_hardirqs_on+0xbd/0x310 [ 253.109609] __should_failslab+0x124/0x180 [ 253.113849] should_failslab+0x9/0x14 [ 253.117657] __kmalloc+0x2d4/0x760 [ 253.121198] ? match_wildcard+0x3c0/0x3c0 [ 253.125348] ? match_strdup+0x5e/0xa0 [ 253.129158] match_strdup+0x5e/0xa0 [ 253.132790] ovl_fill_super+0x16b7/0x3f7b [ 253.136947] ? ovl_show_options+0x550/0x550 [ 253.141291] ? __free_pages+0x163/0x190 [ 253.145272] ? selinux_sb_copy_data+0x602/0x740 [ 253.149948] ? selinux_capable+0x36/0x40 [ 253.154014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.159554] ? security_capable+0x99/0xc0 [ 253.163716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.169485] ? get_anon_bdev+0xc0/0xc0 [ 253.173401] ? sget+0x113/0x150 [ 253.177287] ? ovl_show_options+0x550/0x550 [ 253.181610] mount_nodev+0x6b/0x110 [ 253.185239] ovl_mount+0x2c/0x40 [ 253.188622] mount_fs+0xae/0x31d [ 253.191998] vfs_kern_mount.part.35+0xdc/0x4f0 [ 253.196592] ? may_umount+0xb0/0xb0 [ 253.200219] ? _raw_read_unlock+0x2c/0x50 [ 253.204365] ? __get_fs_type+0x97/0xc0 [ 253.208253] do_mount+0x581/0x31f0 [ 253.211802] ? copy_mount_string+0x40/0x40 [ 253.216044] ? kasan_unpoison_shadow+0x35/0x50 [ 253.220627] ? kasan_kmalloc+0xc7/0xe0 [ 253.224523] ? kmem_cache_alloc_trace+0x31f/0x750 [ 253.229370] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 253.234918] ? _copy_from_user+0xdf/0x150 [ 253.239067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.244611] ? copy_mount_options+0x288/0x380 [ 253.249111] ksys_mount+0x12d/0x140 [ 253.252766] __x64_sys_mount+0xbe/0x150 [ 253.256744] do_syscall_64+0x1b9/0x820 [ 253.260629] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 253.266230] ? syscall_return_slowpath+0x5e0/0x5e0 [ 253.271692] ? trace_hardirqs_on_caller+0x310/0x310 [ 253.276712] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 253.281731] ? recalc_sigpending_tsk+0x180/0x180 [ 253.286483] ? kasan_check_write+0x14/0x20 [ 253.290718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.295565] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.300774] RIP: 0033:0x457579 [ 253.303972] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.323058] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 253.330794] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 253.338067] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 253.345888] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 21:38:03 executing program 3 (fault-call:4 fault-nth:21): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 253.353163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 253.360452] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 253.470415] overlayfs: invalid origin (7900) [ 253.493471] overlayfs: invalid origin (7900) [ 253.496209] 9pnet: Insufficient options for proto=fd [ 253.506000] overlayfs: filesystem on './file0' not supported as upperdir [ 253.516075] overlayfs: invalid origin (7900) [ 253.517178] FAULT_INJECTION: forcing a failure. [ 253.517178] name failslab, interval 1, probability 0, space 0, times 0 21:38:03 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES64, @ANYRESDEC, @ANYRESOCT, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32]], @ANYRES16, @ANYRES64=0x0, @ANYRESOCT, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:03 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400011, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:03 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x5000000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:03 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40003a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 253.539653] overlayfs: invalid origin (7900) [ 253.559733] CPU: 1 PID: 9252 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 253.566938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.576484] Call Trace: [ 253.579651] dump_stack+0x1c4/0x2b4 [ 253.583285] ? dump_stack_print_info.cold.2+0x52/0x52 [ 253.588477] ? __kernel_text_address+0xd/0x40 [ 253.592970] ? unwind_get_return_address+0x61/0xa0 [ 253.597904] should_fail.cold.4+0xa/0x17 [ 253.601954] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 253.607070] ? save_stack+0xa9/0xd0 [ 253.610677] ? save_stack+0x43/0xd0 [ 253.614291] ? kasan_kmalloc+0xc7/0xe0 [ 253.618163] ? __kmalloc_track_caller+0x14a/0x750 [ 253.622988] ? kstrdup+0x39/0x70 [ 253.626337] ? ovl_fill_super+0x29b/0x3f7b [ 253.630552] ? mount_nodev+0x6b/0x110 [ 253.634345] ? mount_fs+0xae/0x31d [ 253.637872] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 253.642610] ? do_mount+0x581/0x31f0 [ 253.646307] ? ksys_mount+0x12d/0x140 [ 253.650087] ? __x64_sys_mount+0xbe/0x150 [ 253.654249] ? do_syscall_64+0x1b9/0x820 [ 253.658313] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.663662] ? kmemdup+0x24/0x50 [ 253.667009] ? kasan_unpoison_shadow+0x35/0x50 [ 253.671593] ? kasan_kmalloc+0xc7/0xe0 [ 253.675845] ? fs_reclaim_acquire+0x20/0x20 [ 253.680155] ? lock_downgrade+0x900/0x900 [ 253.684289] ? ___might_sleep+0x1ed/0x300 [ 253.688424] ? arch_local_save_flags+0x40/0x40 [ 253.693003] ? trace_hardirqs_on+0xbd/0x310 [ 253.697311] __should_failslab+0x124/0x180 [ 253.701539] should_failslab+0x9/0x14 [ 253.705339] __kmalloc+0x2d4/0x760 [ 253.708868] ? match_wildcard+0x3c0/0x3c0 [ 253.712998] ? match_strdup+0x5e/0xa0 [ 253.716784] match_strdup+0x5e/0xa0 [ 253.720400] ovl_fill_super+0x45d/0x3f7b [ 253.724450] ? ovl_show_options+0x550/0x550 [ 253.728756] ? __free_pages+0x163/0x190 [ 253.732765] ? selinux_sb_copy_data+0x602/0x740 [ 253.737425] ? selinux_capable+0x36/0x40 [ 253.741475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.747007] ? security_capable+0x99/0xc0 [ 253.751141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.756685] ? get_anon_bdev+0xc0/0xc0 [ 253.760557] ? sget+0x113/0x150 [ 253.763846] ? ovl_show_options+0x550/0x550 [ 253.768379] mount_nodev+0x6b/0x110 [ 253.772506] ovl_mount+0x2c/0x40 [ 253.775873] mount_fs+0xae/0x31d [ 253.779227] vfs_kern_mount.part.35+0xdc/0x4f0 [ 253.783809] ? may_umount+0xb0/0xb0 [ 253.787421] ? _raw_read_unlock+0x2c/0x50 [ 253.791552] ? __get_fs_type+0x97/0xc0 [ 253.795430] do_mount+0x581/0x31f0 [ 253.798952] ? trace_hardirqs_off+0x310/0x310 [ 253.803429] ? copy_mount_string+0x40/0x40 [ 253.807704] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 253.812444] ? retint_kernel+0x2d/0x2d [ 253.816320] ? copy_mount_options+0x1f3/0x380 [ 253.820795] ? copy_mount_options+0x205/0x380 [ 253.825273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.830792] ? copy_mount_options+0x288/0x380 [ 253.835271] ksys_mount+0x12d/0x140 [ 253.838897] __x64_sys_mount+0xbe/0x150 [ 253.842858] do_syscall_64+0x1b9/0x820 [ 253.846729] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 253.852085] ? syscall_return_slowpath+0x5e0/0x5e0 [ 253.857015] ? trace_hardirqs_on_caller+0x310/0x310 [ 253.862017] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 253.867017] ? recalc_sigpending_tsk+0x180/0x180 [ 253.871794] ? kasan_check_write+0x14/0x20 [ 253.876018] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.880845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.886023] RIP: 0033:0x457579 [ 253.889200] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.908099] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 253.915794] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 253.923048] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 253.930307] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 253.937557] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 21:38:03 executing program 3 (fault-call:4 fault-nth:22): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 253.944815] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 253.980196] FAULT_INJECTION: forcing a failure. [ 253.980196] name failslab, interval 1, probability 0, space 0, times 0 [ 253.993639] CPU: 1 PID: 9263 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 254.000838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.010196] Call Trace: [ 254.012801] dump_stack+0x1c4/0x2b4 [ 254.016447] ? dump_stack_print_info.cold.2+0x52/0x52 [ 254.021653] ? __kernel_text_address+0xd/0x40 [ 254.026160] ? unwind_get_return_address+0x61/0xa0 [ 254.031118] should_fail.cold.4+0xa/0x17 [ 254.035201] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 254.040329] ? save_stack+0xa9/0xd0 [ 254.043980] ? save_stack+0x43/0xd0 [ 254.047622] ? kasan_kmalloc+0xc7/0xe0 [ 254.051518] ? __kmalloc+0x14e/0x760 [ 254.051532] ? match_strdup+0x5e/0xa0 [ 254.051552] ? ovl_fill_super+0x16b7/0x3f7b [ 254.063454] ? mount_nodev+0x6b/0x110 [ 254.067262] ? mount_fs+0xae/0x31d [ 254.070809] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 254.075566] ? do_mount+0x581/0x31f0 [ 254.079304] ? ksys_mount+0x12d/0x140 [ 254.083113] ? __x64_sys_mount+0xbe/0x150 [ 254.083130] ? do_syscall_64+0x1b9/0x820 [ 254.083147] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.083164] ? kmemdup+0x24/0x50 [ 254.083182] ? kasan_unpoison_shadow+0x35/0x50 [ 254.104644] ? kasan_kmalloc+0xc7/0xe0 [ 254.104665] ? fs_reclaim_acquire+0x20/0x20 [ 254.104683] ? lock_downgrade+0x900/0x900 [ 254.104702] ? ___might_sleep+0x1ed/0x300 [ 254.104722] ? arch_local_save_flags+0x40/0x40 [ 254.121191] ? trace_hardirqs_on+0xbd/0x310 [ 254.121213] __should_failslab+0x124/0x180 [ 254.121234] should_failslab+0x9/0x14 [ 254.131178] overlayfs: invalid origin (7900) [ 254.134358] __kmalloc+0x2d4/0x760 21:38:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 254.134378] ? match_wildcard+0x3c0/0x3c0 [ 254.134392] ? match_strdup+0x5e/0xa0 [ 254.134409] match_strdup+0x5e/0xa0 [ 254.134430] ovl_fill_super+0x1662/0x3f7b [ 254.154087] ? ovl_show_options+0x550/0x550 [ 254.154111] ? __free_pages+0x163/0x190 [ 254.154131] ? selinux_sb_copy_data+0x602/0x740 [ 254.154151] ? selinux_capable+0x36/0x40 [ 254.178875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.184419] ? security_capable+0x99/0xc0 [ 254.184438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 21:38:04 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 254.184458] ? get_anon_bdev+0xc0/0xc0 [ 254.198011] ? sget+0x113/0x150 [ 254.201300] ? ovl_show_options+0x550/0x550 [ 254.205644] mount_nodev+0x6b/0x110 [ 254.209276] ovl_mount+0x2c/0x40 [ 254.212666] mount_fs+0xae/0x31d [ 254.216050] vfs_kern_mount.part.35+0xdc/0x4f0 [ 254.220642] ? may_umount+0xb0/0xb0 [ 254.224277] ? _raw_read_unlock+0x2c/0x50 [ 254.224294] ? __get_fs_type+0x97/0xc0 [ 254.224324] do_mount+0x581/0x31f0 [ 254.224342] ? copy_mount_string+0x40/0x40 [ 254.224360] ? kasan_unpoison_shadow+0x35/0x50 [ 254.244721] ? kasan_kmalloc+0xc7/0xe0 [ 254.248622] ? kmem_cache_alloc_trace+0x31f/0x750 [ 254.253501] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 254.257467] 9pnet: Insufficient options for proto=fd [ 254.259042] ? _copy_from_user+0xdf/0x150 [ 254.259062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.259076] ? copy_mount_options+0x288/0x380 [ 254.259094] ksys_mount+0x12d/0x140 [ 254.279620] overlayfs: invalid origin (7900) [ 254.281968] __x64_sys_mount+0xbe/0x150 [ 254.282001] do_syscall_64+0x1b9/0x820 21:38:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 254.282017] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 254.282032] ? syscall_return_slowpath+0x5e0/0x5e0 [ 254.282049] ? trace_hardirqs_on_caller+0x310/0x310 [ 254.282068] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 254.294312] ? recalc_sigpending_tsk+0x180/0x180 [ 254.294326] ? kasan_check_write+0x14/0x20 [ 254.294346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 254.304617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.304628] RIP: 0033:0x457579 21:38:04 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400003, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 254.304643] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 254.304649] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 254.304669] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 254.370750] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 254.378020] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 254.385293] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 21:38:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 254.392561] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:04 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400900, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:04 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES64, @ANYRESDEC, @ANYRESOCT, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32]], @ANYRES16, @ANYRES64=0x0, @ANYRESOCT, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:04 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400600, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:04 executing program 3 (fault-call:4 fault-nth:23): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 254.573625] FAULT_INJECTION: forcing a failure. [ 254.573625] name failslab, interval 1, probability 0, space 0, times 0 [ 254.581465] 9pnet: Insufficient options for proto=fd [ 254.588910] CPU: 0 PID: 9305 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 254.597208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.606589] Call Trace: [ 254.609420] dump_stack+0x1c4/0x2b4 [ 254.610840] overlayfs: filesystem on './file0' not supported as upperdir [ 254.613069] ? dump_stack_print_info.cold.2+0x52/0x52 [ 254.613090] ? __kernel_text_address+0xd/0x40 [ 254.613123] ? unwind_get_return_address+0x61/0xa0 [ 254.634543] should_fail.cold.4+0xa/0x17 [ 254.638631] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 254.643744] ? save_stack+0xa9/0xd0 [ 254.647393] ? save_stack+0x43/0xd0 [ 254.651022] ? kasan_kmalloc+0xc7/0xe0 [ 254.654917] ? __kmalloc+0x14e/0x760 [ 254.658649] ? match_strdup+0x5e/0xa0 [ 254.662456] ? ovl_fill_super+0x16b7/0x3f7b [ 254.666794] ? mount_nodev+0x6b/0x110 [ 254.670612] ? mount_fs+0xae/0x31d [ 254.674186] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 254.678949] ? do_mount+0x581/0x31f0 [ 254.682668] ? ksys_mount+0x12d/0x140 [ 254.686481] ? __x64_sys_mount+0xbe/0x150 [ 254.690631] ? do_syscall_64+0x1b9/0x820 [ 254.694698] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.700075] ? kmemdup+0x24/0x50 [ 254.703426] ? kasan_unpoison_shadow+0x35/0x50 [ 254.708000] ? kasan_kmalloc+0xc7/0xe0 [ 254.711887] ? fs_reclaim_acquire+0x20/0x20 [ 254.716192] ? lock_downgrade+0x900/0x900 [ 254.720324] ? ___might_sleep+0x1ed/0x300 [ 254.724461] ? arch_local_save_flags+0x40/0x40 [ 254.729040] ? trace_hardirqs_on+0xbd/0x310 [ 254.733370] __should_failslab+0x124/0x180 [ 254.737606] should_failslab+0x9/0x14 [ 254.741396] __kmalloc+0x2d4/0x760 [ 254.744923] ? match_wildcard+0x3c0/0x3c0 [ 254.749053] ? match_strdup+0x5e/0xa0 [ 254.752837] match_strdup+0x5e/0xa0 [ 254.756453] ovl_fill_super+0x1662/0x3f7b [ 254.760604] ? ovl_show_options+0x550/0x550 [ 254.764908] ? __free_pages+0x163/0x190 [ 254.768882] ? selinux_sb_copy_data+0x602/0x740 [ 254.773540] ? selinux_capable+0x36/0x40 [ 254.777592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.783124] ? security_capable+0x99/0xc0 [ 254.787274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.792795] ? get_anon_bdev+0xc0/0xc0 [ 254.796664] ? sget+0x113/0x150 [ 254.799931] ? ovl_show_options+0x550/0x550 [ 254.804249] mount_nodev+0x6b/0x110 [ 254.807863] ovl_mount+0x2c/0x40 [ 254.811213] mount_fs+0xae/0x31d [ 254.814575] vfs_kern_mount.part.35+0xdc/0x4f0 [ 254.819156] ? may_umount+0xb0/0xb0 [ 254.822782] ? _raw_read_unlock+0x2c/0x50 [ 254.826929] ? __get_fs_type+0x97/0xc0 [ 254.830808] do_mount+0x581/0x31f0 [ 254.834336] ? copy_mount_string+0x40/0x40 [ 254.838555] ? kasan_unpoison_shadow+0x35/0x50 [ 254.843143] ? kasan_kmalloc+0xc7/0xe0 [ 254.847033] ? kmem_cache_alloc_trace+0x31f/0x750 [ 254.851875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 254.857397] ? copy_mount_options+0x288/0x380 [ 254.861875] ksys_mount+0x12d/0x140 [ 254.865486] __x64_sys_mount+0xbe/0x150 [ 254.869457] do_syscall_64+0x1b9/0x820 [ 254.873327] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 254.878677] ? syscall_return_slowpath+0x5e0/0x5e0 [ 254.883606] ? trace_hardirqs_on_caller+0x310/0x310 [ 254.888613] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 254.893624] ? recalc_sigpending_tsk+0x180/0x180 [ 254.898359] ? kasan_check_write+0x14/0x20 [ 254.902585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 254.907417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.912593] RIP: 0033:0x457579 [ 254.915775] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 254.934656] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 254.942346] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 254.949600] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 254.956857] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 254.964122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 21:38:04 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400500, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:04 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400804, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:04 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400b00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:04 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) gettid() write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32, @ANYRES64, @ANYRESDEC, @ANYRESOCT, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32]], @ANYRES16, @ANYRES64=0x0, @ANYRESOCT, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:04 executing program 3 (fault-call:4 fault-nth:24): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 254.971371] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 255.036895] FAULT_INJECTION: forcing a failure. [ 255.036895] name failslab, interval 1, probability 0, space 0, times 0 [ 255.048413] CPU: 1 PID: 9325 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 255.055629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.064990] Call Trace: [ 255.067619] dump_stack+0x1c4/0x2b4 [ 255.071273] ? dump_stack_print_info.cold.2+0x52/0x52 [ 255.076464] ? kasan_check_read+0x11/0x20 [ 255.080615] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 255.086168] should_fail.cold.4+0xa/0x17 [ 255.090242] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 255.095360] ? mark_held_locks+0x130/0x130 [ 255.099609] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 255.104366] ? modules_open+0xa0/0xa0 [ 255.108165] ? is_bpf_text_address+0xac/0x170 [ 255.112667] ? fs_reclaim_acquire+0x20/0x20 [ 255.116987] ? lock_downgrade+0x900/0x900 [ 255.121135] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 255.126410] ? ___might_sleep+0x1ed/0x300 [ 255.130555] ? arch_local_save_flags+0x40/0x40 [ 255.135152] __should_failslab+0x124/0x180 [ 255.139390] should_failslab+0x9/0x14 [ 255.143191] kmem_cache_alloc+0x2be/0x730 [ 255.147339] ? avc_has_perm+0x469/0x7e0 [ 255.151356] alloc_vfsmnt+0xe9/0x990 [ 255.155083] ? m_stop+0x20/0x20 [ 255.158365] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 255.164169] ? kasan_check_read+0x11/0x20 [ 255.168313] ? rcu_bh_qs+0xc0/0xc0 [ 255.171878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.177418] ? __percpu_counter_sum+0x135/0x1a0 [ 255.182088] ? lock_downgrade+0x900/0x900 [ 255.186248] ? trace_hardirqs_on+0xbd/0x310 [ 255.190563] ? kasan_check_read+0x11/0x20 [ 255.194725] ? __percpu_counter_sum+0x135/0x1a0 [ 255.199390] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 255.204839] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 255.209884] clone_mnt+0x124/0x13b0 [ 255.213529] ? kern_mount_data+0xc0/0xc0 [ 255.217614] ? bdev_try_to_free_page+0x1b0/0x1b0 [ 255.222378] ? kasan_check_write+0x14/0x20 [ 255.226626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.232164] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 255.237701] ? statfs_by_dentry+0x1a9/0x210 [ 255.242020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.247587] ? vfs_statfs+0x287/0x2e0 [ 255.251388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.256926] ? ovl_check_namelen.isra.9+0xe8/0x140 [ 255.261854] ? ovl_inode_init_once+0x20/0x20 [ 255.266274] clone_private_mount+0xba/0x100 [ 255.270606] ovl_fill_super+0xa88/0x3f7b [ 255.274690] ? ovl_show_options+0x550/0x550 [ 255.279014] ? __free_pages+0x163/0x190 [ 255.282992] ? selinux_sb_copy_data+0x602/0x740 [ 255.287669] ? selinux_capable+0x36/0x40 [ 255.291732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.297272] ? security_capable+0x99/0xc0 [ 255.301419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.306969] ? get_anon_bdev+0xc0/0xc0 [ 255.310850] ? sget+0x113/0x150 [ 255.314142] ? ovl_show_options+0x550/0x550 [ 255.318467] mount_nodev+0x6b/0x110 [ 255.322101] ovl_mount+0x2c/0x40 [ 255.325469] mount_fs+0xae/0x31d [ 255.328840] vfs_kern_mount.part.35+0xdc/0x4f0 [ 255.333422] ? may_umount+0xb0/0xb0 [ 255.337046] ? _raw_read_unlock+0x2c/0x50 [ 255.341193] ? __get_fs_type+0x97/0xc0 [ 255.345083] do_mount+0x581/0x31f0 [ 255.348633] ? copy_mount_string+0x40/0x40 [ 255.352875] ? kasan_unpoison_shadow+0x35/0x50 [ 255.357456] ? kasan_kmalloc+0xc7/0xe0 [ 255.361349] ? kmem_cache_alloc_trace+0x31f/0x750 [ 255.366218] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 255.371772] ? _copy_from_user+0xdf/0x150 [ 255.375920] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.381459] ? copy_mount_options+0x288/0x380 [ 255.385972] ksys_mount+0x12d/0x140 [ 255.389608] __x64_sys_mount+0xbe/0x150 [ 255.393593] do_syscall_64+0x1b9/0x820 [ 255.397527] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 255.402896] ? syscall_return_slowpath+0x5e0/0x5e0 [ 255.407829] ? trace_hardirqs_on_caller+0x310/0x310 [ 255.412845] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 255.417876] ? recalc_sigpending_tsk+0x180/0x180 [ 255.422627] ? kasan_check_write+0x14/0x20 [ 255.426873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.431719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.436901] RIP: 0033:0x457579 [ 255.440092] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.459006] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 255.466727] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 255.474002] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 255.481276] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 21:38:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 255.488549] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 255.495825] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 255.505895] overlayfs: failed to clone upperpath 21:38:05 executing program 3 (fault-call:4 fault-nth:25): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 255.614774] 9pnet: Insufficient options for proto=fd [ 255.622879] FAULT_INJECTION: forcing a failure. [ 255.622879] name failslab, interval 1, probability 0, space 0, times 0 [ 255.664881] overlayfs: filesystem on './file0' not supported as upperdir [ 255.676933] CPU: 0 PID: 9341 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 255.684141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.693508] Call Trace: [ 255.696133] dump_stack+0x1c4/0x2b4 [ 255.699790] ? dump_stack_print_info.cold.2+0x52/0x52 [ 255.704994] ? is_bpf_text_address+0xd3/0x170 [ 255.709503] should_fail.cold.4+0xa/0x17 21:38:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 255.713591] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 255.718713] ? save_stack+0xa9/0xd0 [ 255.722343] ? save_stack+0x43/0xd0 [ 255.725985] ? kasan_kmalloc+0xc7/0xe0 [ 255.729874] ? __kmalloc+0x14e/0x760 [ 255.733609] ? match_strdup+0x5e/0xa0 [ 255.737433] ? ovl_fill_super+0x1662/0x3f7b [ 255.741784] ? mount_nodev+0x6b/0x110 [ 255.745608] ? ovl_mount+0x2c/0x40 [ 255.749153] ? mount_fs+0xae/0x31d [ 255.752706] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 255.757471] ? do_mount+0x581/0x31f0 [ 255.761191] ? ksys_mount+0x12d/0x140 [ 255.765015] ? __x64_sys_mount+0xbe/0x150 [ 255.769159] ? do_syscall_64+0x1b9/0x820 [ 255.773205] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.778553] ? kmemdup+0x24/0x50 [ 255.781920] ? fs_reclaim_acquire+0x20/0x20 [ 255.786226] ? lock_downgrade+0x900/0x900 [ 255.790360] ? ___might_sleep+0x1ed/0x300 [ 255.794490] ? lock_downgrade+0x900/0x900 [ 255.798635] ? arch_local_save_flags+0x40/0x40 [ 255.803223] __should_failslab+0x124/0x180 [ 255.807461] should_failslab+0x9/0x14 [ 255.811266] __kmalloc_track_caller+0x2d0/0x750 [ 255.815922] ? __kmalloc+0x31c/0x760 [ 255.819626] ? ovl_mount_dir+0x2a/0x1c0 [ 255.823606] kstrdup+0x39/0x70 [ 255.826795] ovl_mount_dir+0x2a/0x1c0 [ 255.830608] ovl_fill_super+0x994/0x3f7b [ 255.834679] ? ovl_show_options+0x550/0x550 [ 255.838987] ? __free_pages+0x163/0x190 [ 255.842958] ? selinux_sb_copy_data+0x602/0x740 [ 255.847631] ? selinux_capable+0x36/0x40 [ 255.851682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.857203] ? security_capable+0x99/0xc0 [ 255.861333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.866877] ? get_anon_bdev+0xc0/0xc0 [ 255.870761] ? sget+0x113/0x150 [ 255.874029] ? ovl_show_options+0x550/0x550 [ 255.878333] mount_nodev+0x6b/0x110 [ 255.881949] ovl_mount+0x2c/0x40 [ 255.885310] mount_fs+0xae/0x31d [ 255.888663] vfs_kern_mount.part.35+0xdc/0x4f0 [ 255.893229] ? may_umount+0xb0/0xb0 [ 255.896840] ? _raw_read_unlock+0x2c/0x50 [ 255.900976] ? __get_fs_type+0x97/0xc0 [ 255.904856] do_mount+0x581/0x31f0 [ 255.908379] ? kasan_check_read+0x11/0x20 [ 255.912511] ? do_raw_spin_unlock+0xa7/0x2f0 [ 255.916918] ? copy_mount_string+0x40/0x40 [ 255.921137] ? kasan_check_write+0x14/0x20 [ 255.925353] ? kasan_unpoison_shadow+0x35/0x50 [ 255.929915] ? kasan_kmalloc+0xc7/0xe0 [ 255.933789] ? kmem_cache_alloc_trace+0x31f/0x750 [ 255.938645] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 255.944184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 255.949715] ? copy_mount_options+0x288/0x380 [ 255.954198] ksys_mount+0x12d/0x140 [ 255.957809] __x64_sys_mount+0xbe/0x150 [ 255.961785] do_syscall_64+0x1b9/0x820 [ 255.965674] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 255.971026] ? syscall_return_slowpath+0x5e0/0x5e0 [ 255.975942] ? trace_hardirqs_on_caller+0x310/0x310 [ 255.980946] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 255.985953] ? recalc_sigpending_tsk+0x180/0x180 [ 255.990699] ? kasan_check_write+0x14/0x20 [ 255.994936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.999776] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.004952] RIP: 0033:0x457579 [ 256.008138] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.027028] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 256.034731] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 256.041997] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 256.049269] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 256.056559] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 21:38:05 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400700, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:05 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x80ffff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:05 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:05 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400a00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:05 executing program 3 (fault-call:4 fault-nth:26): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 256.063825] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 256.102661] FAULT_INJECTION: forcing a failure. [ 256.102661] name failslab, interval 1, probability 0, space 0, times 0 [ 256.115819] CPU: 0 PID: 9355 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 256.123022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.132381] Call Trace: [ 256.134975] dump_stack+0x1c4/0x2b4 [ 256.138631] ? dump_stack_print_info.cold.2+0x52/0x52 [ 256.143837] ? kasan_check_read+0x11/0x20 [ 256.147986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.153527] should_fail.cold.4+0xa/0x17 [ 256.157602] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.162722] ? mark_held_locks+0x130/0x130 [ 256.166978] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 256.171739] ? modules_open+0xa0/0xa0 [ 256.175539] ? is_bpf_text_address+0xac/0x170 [ 256.180050] ? fs_reclaim_acquire+0x20/0x20 [ 256.184368] ? lock_downgrade+0x900/0x900 [ 256.188528] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 256.193827] ? ___might_sleep+0x1ed/0x300 [ 256.197975] ? arch_local_save_flags+0x40/0x40 [ 256.202565] __should_failslab+0x124/0x180 [ 256.206824] should_failslab+0x9/0x14 [ 256.210630] kmem_cache_alloc+0x2be/0x730 [ 256.214795] ? avc_has_perm+0x469/0x7e0 [ 256.218773] alloc_vfsmnt+0xe9/0x990 [ 256.222489] ? m_stop+0x20/0x20 [ 256.225768] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 256.231563] ? kasan_check_read+0x11/0x20 [ 256.235753] ? rcu_bh_qs+0xc0/0xc0 [ 256.239310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.244856] ? __percpu_counter_sum+0x135/0x1a0 [ 256.249524] ? lock_downgrade+0x900/0x900 [ 256.253678] ? trace_hardirqs_on+0xbd/0x310 [ 256.257996] ? kasan_check_read+0x11/0x20 [ 256.262145] ? __percpu_counter_sum+0x135/0x1a0 [ 256.266815] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 256.272265] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 256.277298] clone_mnt+0x124/0x13b0 [ 256.280932] ? kern_mount_data+0xc0/0xc0 [ 256.285002] ? bdev_try_to_free_page+0x1b0/0x1b0 [ 256.289757] ? kasan_check_write+0x14/0x20 [ 256.293997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.299532] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.305071] ? statfs_by_dentry+0x1a9/0x210 [ 256.309393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.314929] ? vfs_statfs+0x287/0x2e0 [ 256.318728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.324275] ? ovl_check_namelen.isra.9+0xe8/0x140 [ 256.329217] ? ovl_inode_init_once+0x20/0x20 [ 256.333642] clone_private_mount+0xba/0x100 [ 256.337963] ovl_fill_super+0xa88/0x3f7b [ 256.342124] ? ovl_show_options+0x550/0x550 [ 256.346445] ? __free_pages+0x163/0x190 [ 256.350420] ? selinux_sb_copy_data+0x602/0x740 [ 256.355089] ? selinux_capable+0x36/0x40 [ 256.359150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.364690] ? security_capable+0x99/0xc0 [ 256.368836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.374373] ? get_anon_bdev+0xc0/0xc0 [ 256.378257] ? sget+0x113/0x150 [ 256.381537] ? ovl_show_options+0x550/0x550 [ 256.385867] mount_nodev+0x6b/0x110 [ 256.389496] ovl_mount+0x2c/0x40 [ 256.392877] mount_fs+0xae/0x31d [ 256.396245] vfs_kern_mount.part.35+0xdc/0x4f0 [ 256.400826] ? may_umount+0xb0/0xb0 [ 256.404459] ? _raw_read_unlock+0x2c/0x50 [ 256.408609] ? __get_fs_type+0x97/0xc0 [ 256.412496] do_mount+0x581/0x31f0 [ 256.416038] ? copy_mount_string+0x40/0x40 [ 256.420287] ? kasan_unpoison_shadow+0x35/0x50 [ 256.424872] ? kasan_kmalloc+0xc7/0xe0 [ 256.428759] ? kmem_cache_alloc_trace+0x31f/0x750 [ 256.433653] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.439194] ? _copy_from_user+0xdf/0x150 [ 256.443348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.448880] ? copy_mount_options+0x288/0x380 [ 256.453382] ksys_mount+0x12d/0x140 [ 256.457007] __x64_sys_mount+0xbe/0x150 [ 256.461001] do_syscall_64+0x1b9/0x820 [ 256.464903] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 256.470264] ? syscall_return_slowpath+0x5e0/0x5e0 [ 256.475194] ? trace_hardirqs_on_caller+0x310/0x310 [ 256.480209] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 256.485238] ? recalc_sigpending_tsk+0x180/0x180 [ 256.490008] ? kasan_check_write+0x14/0x20 [ 256.494248] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.499091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.504281] RIP: 0033:0x457579 [ 256.507505] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.526412] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 256.534131] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 256.541412] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 256.548704] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 256.555985] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 256.563300] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 256.597689] overlayfs: failed to clone upperpath 21:38:06 executing program 3 (fault-call:4 fault-nth:27): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 256.710938] 9pnet: Insufficient options for proto=fd [ 256.723125] FAULT_INJECTION: forcing a failure. [ 256.723125] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 256.734981] CPU: 1 PID: 9375 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 256.742180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.751551] Call Trace: [ 256.754181] dump_stack+0x1c4/0x2b4 [ 256.757827] ? dump_stack_print_info.cold.2+0x52/0x52 [ 256.763058] should_fail.cold.4+0xa/0x17 [ 256.767148] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.772297] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 256.777386] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 256.782160] ? mark_held_locks+0x130/0x130 [ 256.784494] overlayfs: filesystem on './file0' not supported as upperdir [ 256.786419] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 256.786436] ? kasan_check_read+0x11/0x20 [ 256.786458] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 21:38:06 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400d00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:06 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x200000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:06 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:06 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400009, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 256.808554] ? rcu_bh_qs+0xc0/0xc0 [ 256.812115] ? unwind_dump+0x190/0x190 [ 256.816020] ? is_bpf_text_address+0xd3/0x170 [ 256.820523] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.826065] ? should_fail+0x22d/0xd01 [ 256.829966] ? unwind_get_return_address+0x61/0xa0 [ 256.834883] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.839988] __alloc_pages_nodemask+0x34b/0xde0 [ 256.844666] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 256.849667] ? save_stack+0x43/0xd0 [ 256.853276] ? kasan_kmalloc+0xc7/0xe0 [ 256.857150] ? __kmalloc_track_caller+0x14a/0x750 [ 256.861999] ? kstrdup+0x39/0x70 [ 256.865379] ? ovl_mount_dir+0x2a/0x1c0 [ 256.869334] ? ovl_fill_super+0x994/0x3f7b [ 256.873563] ? mount_nodev+0x6b/0x110 [ 256.877374] ? mount_fs+0xae/0x31d [ 256.880909] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 256.885659] ? do_mount+0x581/0x31f0 [ 256.889383] ? ksys_mount+0x12d/0x140 [ 256.893166] ? __x64_sys_mount+0xbe/0x150 [ 256.897295] ? do_syscall_64+0x1b9/0x820 [ 256.901369] ? fs_reclaim_acquire+0x20/0x20 [ 256.905681] ? lock_downgrade+0x900/0x900 [ 256.909826] ? ___might_sleep+0x1ed/0x300 [ 256.913972] ? trace_hardirqs_off+0xb8/0x310 [ 256.918367] cache_grow_begin+0x91/0x8c0 [ 256.922413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.927939] ? check_preemption_disabled+0x48/0x200 [ 256.932943] kmem_cache_alloc+0x665/0x730 [ 256.937074] ? kasan_kmalloc+0xc7/0xe0 [ 256.940962] getname_kernel+0x54/0x370 [ 256.944837] kern_path+0x1e/0x40 [ 256.948191] ovl_mount_dir_noesc+0x6b/0x190 [ 256.952498] ovl_mount_dir+0x10a/0x1c0 [ 256.956386] ovl_fill_super+0x994/0x3f7b [ 256.960437] ? ovl_show_options+0x550/0x550 [ 256.964743] ? __free_pages+0x163/0x190 [ 256.968707] ? selinux_sb_copy_data+0x602/0x740 [ 256.973374] ? selinux_capable+0x36/0x40 [ 256.977435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.982957] ? security_capable+0x99/0xc0 [ 256.987118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 256.992643] ? get_anon_bdev+0xc0/0xc0 [ 256.996513] ? sget+0x113/0x150 [ 256.999778] ? ovl_show_options+0x550/0x550 [ 257.004082] mount_nodev+0x6b/0x110 [ 257.007708] ovl_mount+0x2c/0x40 [ 257.011073] mount_fs+0xae/0x31d [ 257.014431] vfs_kern_mount.part.35+0xdc/0x4f0 [ 257.019055] ? may_umount+0xb0/0xb0 [ 257.022688] ? _raw_read_unlock+0x2c/0x50 [ 257.026822] ? __get_fs_type+0x97/0xc0 [ 257.030695] do_mount+0x581/0x31f0 [ 257.034218] ? kasan_check_read+0x11/0x20 [ 257.038354] ? do_raw_spin_unlock+0xa7/0x2f0 [ 257.042747] ? copy_mount_string+0x40/0x40 [ 257.046969] ? kasan_check_write+0x14/0x20 [ 257.051188] ? kasan_unpoison_shadow+0x35/0x50 [ 257.055751] ? kasan_kmalloc+0xc7/0xe0 [ 257.059630] ? kmem_cache_alloc_trace+0x31f/0x750 [ 257.064457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.069987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.075509] ? copy_mount_options+0x288/0x380 [ 257.080008] ksys_mount+0x12d/0x140 [ 257.083623] __x64_sys_mount+0xbe/0x150 [ 257.087593] do_syscall_64+0x1b9/0x820 [ 257.091471] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 257.096819] ? syscall_return_slowpath+0x5e0/0x5e0 [ 257.101733] ? trace_hardirqs_on_caller+0x310/0x310 [ 257.106734] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 257.111735] ? recalc_sigpending_tsk+0x180/0x180 [ 257.116474] ? kasan_check_write+0x14/0x20 [ 257.120697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.125528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.130752] RIP: 0033:0x457579 [ 257.133929] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.152832] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:38:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:07 executing program 3 (fault-call:4 fault-nth:28): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 257.160526] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 257.167795] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 257.175056] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 257.182318] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 257.189609] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 257.337880] overlayfs: filesystem on './file0' not supported as upperdir [ 257.339223] FAULT_INJECTION: forcing a failure. [ 257.339223] name failslab, interval 1, probability 0, space 0, times 0 [ 257.363567] 9pnet: Insufficient options for proto=fd [ 257.400622] ovl_get_fh: 15 callbacks suppressed [ 257.400631] overlayfs: invalid origin (7900) [ 257.407365] CPU: 0 PID: 9399 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 257.417155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.417161] Call Trace: [ 257.417187] dump_stack+0x1c4/0x2b4 [ 257.417209] ? dump_stack_print_info.cold.2+0x52/0x52 [ 257.437991] ? kasan_check_read+0x11/0x20 [ 257.442163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.442184] should_fail.cold.4+0xa/0x17 [ 257.442202] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 257.442223] ? mark_held_locks+0x130/0x130 [ 257.461175] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 257.465941] ? modules_open+0xa0/0xa0 [ 257.469757] ? is_bpf_text_address+0xac/0x170 [ 257.474274] ? fs_reclaim_acquire+0x20/0x20 [ 257.478632] ? lock_downgrade+0x900/0x900 [ 257.482797] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 257.488083] ? ___might_sleep+0x1ed/0x300 [ 257.492246] ? arch_local_save_flags+0x40/0x40 [ 257.496846] __should_failslab+0x124/0x180 21:38:07 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e24, @multicast1}}) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:07 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40e201, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:07 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400600, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:07 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4003f9, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 257.501100] should_failslab+0x9/0x14 [ 257.505414] kmem_cache_alloc+0x2be/0x730 [ 257.509587] ? avc_has_perm+0x469/0x7e0 [ 257.513763] alloc_vfsmnt+0xe9/0x990 [ 257.517483] ? m_stop+0x20/0x20 [ 257.520789] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 257.526617] ? kasan_check_read+0x11/0x20 [ 257.526944] overlayfs: invalid origin (7900) [ 257.530790] ? rcu_bh_qs+0xc0/0xc0 [ 257.530816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.544305] ? __percpu_counter_sum+0x135/0x1a0 21:38:07 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401400, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 257.548994] ? lock_downgrade+0x900/0x900 [ 257.553149] ? trace_hardirqs_on+0xbd/0x310 [ 257.557465] ? kasan_check_read+0x11/0x20 [ 257.561603] ? __percpu_counter_sum+0x135/0x1a0 [ 257.566256] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 257.571694] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 257.576716] clone_mnt+0x124/0x13b0 [ 257.580326] ? kern_mount_data+0xc0/0xc0 [ 257.584373] ? bdev_try_to_free_page+0x1b0/0x1b0 [ 257.589136] ? kasan_check_write+0x14/0x20 [ 257.593368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.598888] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.604410] ? statfs_by_dentry+0x1a9/0x210 [ 257.608727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.614247] ? vfs_statfs+0x287/0x2e0 [ 257.618054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.623611] ? ovl_check_namelen.isra.9+0xe8/0x140 [ 257.628524] ? ovl_inode_init_once+0x20/0x20 [ 257.632928] clone_private_mount+0xba/0x100 [ 257.637236] ovl_fill_super+0xa88/0x3f7b [ 257.641286] ? ovl_show_options+0x550/0x550 [ 257.645603] ? __free_pages+0x163/0x190 [ 257.649567] ? selinux_sb_copy_data+0x602/0x740 [ 257.654232] ? selinux_capable+0x36/0x40 [ 257.658276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.663816] ? security_capable+0x99/0xc0 [ 257.667948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.673466] ? get_anon_bdev+0xc0/0xc0 [ 257.677376] ? sget+0x113/0x150 [ 257.680656] ? ovl_show_options+0x550/0x550 [ 257.684987] mount_nodev+0x6b/0x110 [ 257.688626] ovl_mount+0x2c/0x40 [ 257.691983] mount_fs+0xae/0x31d [ 257.695347] vfs_kern_mount.part.35+0xdc/0x4f0 [ 257.699916] ? may_umount+0xb0/0xb0 [ 257.703531] ? _raw_read_unlock+0x2c/0x50 [ 257.707659] ? __get_fs_type+0x97/0xc0 [ 257.711531] do_mount+0x581/0x31f0 [ 257.715068] ? kasan_check_read+0x11/0x20 [ 257.719199] ? do_raw_spin_unlock+0xa7/0x2f0 [ 257.723592] ? copy_mount_string+0x40/0x40 [ 257.727810] ? kasan_check_write+0x14/0x20 [ 257.732028] ? kasan_unpoison_shadow+0x35/0x50 [ 257.736595] ? kasan_kmalloc+0xc7/0xe0 [ 257.740489] ? kmem_cache_alloc_trace+0x31f/0x750 [ 257.745316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 257.750834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.756372] ? copy_mount_options+0x288/0x380 [ 257.760850] ksys_mount+0x12d/0x140 [ 257.764475] __x64_sys_mount+0xbe/0x150 [ 257.768433] do_syscall_64+0x1b9/0x820 [ 257.772318] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 257.777691] ? syscall_return_slowpath+0x5e0/0x5e0 [ 257.782611] ? trace_hardirqs_on_caller+0x310/0x310 [ 257.787611] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 257.792615] ? recalc_sigpending_tsk+0x180/0x180 [ 257.797355] ? kasan_check_write+0x14/0x20 [ 257.801576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.806410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.811585] RIP: 0033:0x457579 [ 257.814766] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.833648] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 257.841338] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 21:38:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 257.848588] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 257.855845] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 257.863123] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 257.870372] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 257.878975] overlayfs: failed to clone upperpath 21:38:07 executing program 3 (fault-call:4 fault-nth:29): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 257.995178] overlayfs: invalid origin (7900) [ 258.004118] 9pnet: Insufficient options for proto=fd [ 258.005244] overlayfs: invalid origin (7900) [ 258.013648] overlayfs: invalid origin (7900) [ 258.019065] FAULT_INJECTION: forcing a failure. [ 258.019065] name failslab, interval 1, probability 0, space 0, times 0 [ 258.041807] overlayfs: invalid origin (7900) [ 258.051010] overlayfs: filesystem on './file0' not supported as upperdir [ 258.061366] CPU: 1 PID: 9429 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 258.068585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.077953] Call Trace: [ 258.080586] dump_stack+0x1c4/0x2b4 [ 258.084239] ? dump_stack_print_info.cold.2+0x52/0x52 [ 258.089456] should_fail.cold.4+0xa/0x17 [ 258.093531] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.098650] ? save_stack+0xa9/0xd0 [ 258.102311] ? save_stack+0x43/0xd0 [ 258.105948] ? kasan_kmalloc+0xc7/0xe0 [ 258.109850] ? __kmalloc_track_caller+0x14a/0x750 [ 258.114702] ? kstrdup+0x39/0x70 [ 258.118114] ? ovl_mount_dir+0x2a/0x1c0 [ 258.122091] ? ovl_fill_super+0xbbf/0x3f7b [ 258.126336] ? mount_nodev+0x6b/0x110 [ 258.130135] ? ovl_mount+0x2c/0x40 [ 258.133676] ? mount_fs+0xae/0x31d [ 258.137228] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 258.141988] ? do_mount+0x581/0x31f0 21:38:07 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x404226, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:07 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 258.145705] ? ksys_mount+0x12d/0x140 [ 258.149525] ? __x64_sys_mount+0xbe/0x150 [ 258.153691] ? do_syscall_64+0x1b9/0x820 [ 258.157766] ? fs_reclaim_acquire+0x20/0x20 [ 258.162118] ? lock_downgrade+0x900/0x900 [ 258.166297] ? ___might_sleep+0x1ed/0x300 [ 258.170468] ? arch_local_save_flags+0x40/0x40 [ 258.175073] ? ___might_sleep+0x1ed/0x300 [ 258.179236] __should_failslab+0x124/0x180 [ 258.183497] should_failslab+0x9/0x14 [ 258.187307] kmem_cache_alloc+0x2be/0x730 [ 258.191457] ? kasan_kmalloc+0xc7/0xe0 21:38:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0x0) 21:38:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 258.195369] getname_kernel+0x54/0x370 [ 258.199317] kern_path+0x1e/0x40 [ 258.202695] ovl_mount_dir_noesc+0x6b/0x190 [ 258.207025] ovl_mount_dir+0x10a/0x1c0 [ 258.210920] ovl_fill_super+0xbbf/0x3f7b [ 258.215004] ? ovl_show_options+0x550/0x550 [ 258.219342] ? __free_pages+0x163/0x190 [ 258.223329] ? selinux_sb_copy_data+0x602/0x740 [ 258.228013] ? selinux_capable+0x36/0x40 [ 258.232083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.237639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.243186] ? get_anon_bdev+0xc0/0xc0 [ 258.247081] ? sget+0x113/0x150 [ 258.250399] ? ovl_show_options+0x550/0x550 [ 258.254741] mount_nodev+0x6b/0x110 [ 258.258392] ovl_mount+0x2c/0x40 [ 258.261780] mount_fs+0xae/0x31d [ 258.265163] vfs_kern_mount.part.35+0xdc/0x4f0 [ 258.269757] ? may_umount+0xb0/0xb0 [ 258.273419] ? _raw_read_unlock+0x2c/0x50 [ 258.277585] ? __get_fs_type+0x97/0xc0 [ 258.281487] do_mount+0x581/0x31f0 [ 258.285051] ? copy_mount_string+0x40/0x40 [ 258.289302] ? kasan_unpoison_shadow+0x35/0x50 [ 258.293896] ? kasan_kmalloc+0xc7/0xe0 [ 258.297798] ? kmem_cache_alloc_trace+0x31f/0x750 [ 258.302656] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 258.308203] ? _copy_from_user+0xdf/0x150 [ 258.312356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.317879] ? copy_mount_options+0x288/0x380 [ 258.322379] ksys_mount+0x12d/0x140 [ 258.325989] __x64_sys_mount+0xbe/0x150 [ 258.329950] do_syscall_64+0x1b9/0x820 [ 258.333853] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 258.339200] ? syscall_return_slowpath+0x5e0/0x5e0 [ 258.344119] ? trace_hardirqs_on_caller+0x310/0x310 [ 258.349137] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 258.354139] ? recalc_sigpending_tsk+0x180/0x180 [ 258.358876] ? kasan_check_write+0x14/0x20 [ 258.363095] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.367951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.373132] RIP: 0033:0x457579 [ 258.376333] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:38:08 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40000d, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:08 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400b00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:08 executing program 3 (fault-call:4 fault-nth:30): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 258.395224] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 258.402928] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 258.410185] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 258.417438] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 258.424687] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 258.431936] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 258.440601] overlayfs: failed to resolve './file1': -12 21:38:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 258.561316] overlayfs: invalid origin (7900) [ 258.566736] 9pnet: Insufficient options for proto=fd [ 258.575686] overlayfs: invalid origin (7900) [ 258.583372] FAULT_INJECTION: forcing a failure. [ 258.583372] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 258.596117] CPU: 0 PID: 9460 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 258.603309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.612851] Call Trace: [ 258.615459] dump_stack+0x1c4/0x2b4 [ 258.619105] ? dump_stack_print_info.cold.2+0x52/0x52 [ 258.624316] should_fail.cold.4+0xa/0x17 [ 258.628390] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.631403] overlayfs: invalid origin (7900) [ 258.633515] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 258.633534] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 258.633557] ? mark_held_locks+0x130/0x130 [ 258.633594] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 21:38:08 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 258.652002] overlayfs: filesystem on './file0' not supported as upperdir [ 258.657789] ? kasan_check_read+0x11/0x20 [ 258.657815] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 258.657852] ? rcu_bh_qs+0xc0/0xc0 [ 258.674133] overlayfs: invalid origin (7900) [ 258.677650] ? unwind_dump+0x190/0x190 [ 258.677687] ? is_bpf_text_address+0xd3/0x170 [ 258.677709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.696000] ? should_fail+0x22d/0xd01 [ 258.699894] ? unwind_get_return_address+0x61/0xa0 [ 258.700116] overlayfs: filesystem on './file0' not supported as upperdir 21:38:08 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400009, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 258.704832] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.704854] __alloc_pages_nodemask+0x34b/0xde0 [ 258.704874] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 258.726462] ? save_stack+0x43/0xd0 [ 258.730079] ? kasan_kmalloc+0xc7/0xe0 [ 258.733954] ? __kmalloc_track_caller+0x14a/0x750 [ 258.738784] ? kstrdup+0x39/0x70 [ 258.742136] ? ovl_mount_dir+0x2a/0x1c0 [ 258.746094] ? ovl_fill_super+0xbbf/0x3f7b [ 258.750316] ? mount_nodev+0x6b/0x110 [ 258.754100] ? mount_fs+0xae/0x31d [ 258.757632] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 258.762371] ? do_mount+0x581/0x31f0 [ 258.766068] ? ksys_mount+0x12d/0x140 [ 258.769877] ? __x64_sys_mount+0xbe/0x150 [ 258.774021] ? do_syscall_64+0x1b9/0x820 [ 258.778067] ? fs_reclaim_acquire+0x20/0x20 [ 258.782372] ? lock_downgrade+0x900/0x900 [ 258.786504] ? ___might_sleep+0x1ed/0x300 [ 258.790642] ? trace_hardirqs_off+0xb8/0x310 [ 258.795035] cache_grow_begin+0x91/0x8c0 [ 258.799083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 258.804612] ? check_preemption_disabled+0x48/0x200 [ 258.809620] kmem_cache_alloc+0x665/0x730 [ 258.813766] ? kasan_kmalloc+0xc7/0xe0 [ 258.817646] getname_kernel+0x54/0x370 [ 258.821516] kern_path+0x1e/0x40 [ 258.824870] ovl_mount_dir_noesc+0x6b/0x190 [ 258.829178] ovl_mount_dir+0x10a/0x1c0 [ 258.833065] ovl_fill_super+0xbbf/0x3f7b [ 258.837116] ? ovl_show_options+0x550/0x550 [ 258.841426] ? __free_pages+0x163/0x190 [ 258.845389] ? selinux_sb_copy_data+0x602/0x740 [ 258.850042] ? selinux_capable+0x36/0x40 [ 258.854088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.859622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.865144] ? get_anon_bdev+0xc0/0xc0 [ 258.869016] ? sget+0x113/0x150 [ 258.872281] ? ovl_show_options+0x550/0x550 [ 258.876609] mount_nodev+0x6b/0x110 [ 258.880236] ovl_mount+0x2c/0x40 [ 258.883594] mount_fs+0xae/0x31d [ 258.886953] vfs_kern_mount.part.35+0xdc/0x4f0 [ 258.891518] ? may_umount+0xb0/0xb0 [ 258.895131] ? _raw_read_unlock+0x2c/0x50 [ 258.899265] ? __get_fs_type+0x97/0xc0 [ 258.903137] do_mount+0x581/0x31f0 [ 258.906678] ? copy_mount_string+0x40/0x40 [ 258.910899] ? kasan_unpoison_shadow+0x35/0x50 [ 258.915466] ? kasan_kmalloc+0xc7/0xe0 [ 258.919345] ? kmem_cache_alloc_trace+0x31f/0x750 [ 258.924174] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 258.929699] ? _copy_from_user+0xdf/0x150 [ 258.933887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.939437] ? copy_mount_options+0x288/0x380 [ 258.943932] ksys_mount+0x12d/0x140 [ 258.947546] __x64_sys_mount+0xbe/0x150 [ 258.951522] do_syscall_64+0x1b9/0x820 [ 258.955411] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 258.960759] ? syscall_return_slowpath+0x5e0/0x5e0 [ 258.965676] ? trace_hardirqs_on_caller+0x310/0x310 [ 258.970676] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 258.975679] ? recalc_sigpending_tsk+0x180/0x180 [ 258.980436] ? kasan_check_write+0x14/0x20 [ 258.984664] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.989504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.994680] RIP: 0033:0x457579 21:38:08 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4000000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:08 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x406000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:08 executing program 3 (fault-call:4 fault-nth:31): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 258.997873] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.016760] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 259.024470] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 259.031728] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 259.038980] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 259.046232] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 259.053497] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:09 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40005c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 259.212839] 9pnet: Insufficient options for proto=fd [ 259.215700] FAULT_INJECTION: forcing a failure. [ 259.215700] name failslab, interval 1, probability 0, space 0, times 0 21:38:09 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:09 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400008, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 259.260043] overlayfs: filesystem on './file0' not supported as upperdir 21:38:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:09 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40ff00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 259.330647] CPU: 1 PID: 9487 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 259.337884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.347240] Call Trace: [ 259.349842] dump_stack+0x1c4/0x2b4 [ 259.353489] ? dump_stack_print_info.cold.2+0x52/0x52 [ 259.358704] should_fail.cold.4+0xa/0x17 [ 259.362779] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.367903] ? save_stack+0xa9/0xd0 [ 259.371539] ? save_stack+0x43/0xd0 [ 259.375185] ? kasan_kmalloc+0xc7/0xe0 21:38:09 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:09 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 259.379091] ? __kmalloc_track_caller+0x14a/0x750 [ 259.383967] ? kstrdup+0x39/0x70 [ 259.387339] ? ovl_mount_dir+0x2a/0x1c0 [ 259.391318] ? ovl_fill_super+0xbbf/0x3f7b [ 259.395564] ? mount_nodev+0x6b/0x110 [ 259.399400] ? ovl_mount+0x2c/0x40 [ 259.402947] ? mount_fs+0xae/0x31d [ 259.406492] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 259.411275] ? do_mount+0x581/0x31f0 [ 259.415008] ? ksys_mount+0x12d/0x140 [ 259.418824] ? __x64_sys_mount+0xbe/0x150 [ 259.422979] ? do_syscall_64+0x1b9/0x820 21:38:09 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x404126, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 259.427051] ? fs_reclaim_acquire+0x20/0x20 [ 259.431395] ? lock_downgrade+0x900/0x900 [ 259.435581] ? ___might_sleep+0x1ed/0x300 [ 259.439744] ? arch_local_save_flags+0x40/0x40 [ 259.444345] ? ___might_sleep+0x1ed/0x300 [ 259.448507] __should_failslab+0x124/0x180 [ 259.452768] should_failslab+0x9/0x14 [ 259.456597] kmem_cache_alloc+0x2be/0x730 [ 259.460756] ? kasan_kmalloc+0xc7/0xe0 [ 259.464668] getname_kernel+0x54/0x370 [ 259.468582] kern_path+0x1e/0x40 [ 259.471968] ovl_mount_dir_noesc+0x6b/0x190 [ 259.476303] ovl_mount_dir+0x10a/0x1c0 21:38:09 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 259.480196] ovl_fill_super+0xbbf/0x3f7b [ 259.484279] ? ovl_show_options+0x550/0x550 [ 259.488612] ? __free_pages+0x163/0x190 [ 259.492605] ? selinux_sb_copy_data+0x602/0x740 [ 259.492627] ? selinux_capable+0x36/0x40 [ 259.492651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.507113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.512701] ? get_anon_bdev+0xc0/0xc0 [ 259.516609] ? sget+0x113/0x150 [ 259.519914] ? ovl_show_options+0x550/0x550 [ 259.524243] mount_nodev+0x6b/0x110 [ 259.527883] ovl_mount+0x2c/0x40 [ 259.531265] mount_fs+0xae/0x31d [ 259.534652] vfs_kern_mount.part.35+0xdc/0x4f0 [ 259.539250] ? may_umount+0xb0/0xb0 [ 259.542885] ? _raw_read_unlock+0x2c/0x50 [ 259.547040] ? __get_fs_type+0x97/0xc0 [ 259.550939] do_mount+0x581/0x31f0 [ 259.554486] ? kasan_check_read+0x11/0x20 [ 259.558644] ? do_raw_spin_unlock+0xa7/0x2f0 [ 259.563062] ? copy_mount_string+0x40/0x40 [ 259.567304] ? kasan_check_write+0x14/0x20 [ 259.571553] ? kasan_unpoison_shadow+0x35/0x50 [ 259.576151] ? kasan_kmalloc+0xc7/0xe0 [ 259.580064] ? kmem_cache_alloc_trace+0x31f/0x750 [ 259.584937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 259.590490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.596044] ? copy_mount_options+0x288/0x380 [ 259.600549] ksys_mount+0x12d/0x140 [ 259.604199] __x64_sys_mount+0xbe/0x150 [ 259.608185] do_syscall_64+0x1b9/0x820 [ 259.612595] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.617970] ? syscall_return_slowpath+0x5e0/0x5e0 [ 259.622911] ? trace_hardirqs_on_caller+0x310/0x310 [ 259.625880] 9pnet: Insufficient options for proto=fd [ 259.627940] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 259.627958] ? recalc_sigpending_tsk+0x180/0x180 [ 259.627978] ? kasan_check_write+0x14/0x20 [ 259.647090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.651948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.657145] RIP: 0033:0x457579 [ 259.660331] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:38:09 executing program 3 (fault-call:4 fault-nth:32): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:09 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:09 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40002c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:09 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 259.679212] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 259.686901] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 259.694166] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 259.701418] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 259.708669] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 259.715922] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 259.724392] overlayfs: failed to resolve './file1': -12 21:38:09 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 259.770869] FAULT_INJECTION: forcing a failure. [ 259.770869] name failslab, interval 1, probability 0, space 0, times 0 [ 259.783108] CPU: 0 PID: 9521 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 259.790328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.799673] Call Trace: [ 259.799698] dump_stack+0x1c4/0x2b4 [ 259.799720] ? dump_stack_print_info.cold.2+0x52/0x52 [ 259.799738] ? mark_held_locks+0x130/0x130 [ 259.799771] should_fail.cold.4+0xa/0x17 21:38:09 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 259.799801] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.799820] ? lock_downgrade+0x900/0x900 [ 259.828681] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 259.834472] ? kasan_check_read+0x11/0x20 [ 259.838625] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 259.843906] ? mark_held_locks+0x130/0x130 [ 259.848152] ? trace_hardirqs_on+0xbd/0x310 [ 259.852495] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 259.857528] ? ___might_sleep+0x1ed/0x300 [ 259.861684] ? arch_local_save_flags+0x40/0x40 [ 259.866285] ? mark_held_locks+0x130/0x130 21:38:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 259.870543] __should_failslab+0x124/0x180 [ 259.874800] should_failslab+0x9/0x14 [ 259.878625] kmem_cache_alloc+0x2be/0x730 [ 259.882780] ? __brelse+0x104/0x180 [ 259.886414] ? block_commit_write+0x30/0x30 [ 259.890745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.896301] ? xattr_find_entry+0x1e4/0x280 [ 259.900655] ? ratelimit_state_init+0xb0/0xb0 [ 259.905173] ext4_alloc_inode+0xc7/0x870 [ 259.909246] ? ratelimit_state_init+0xb0/0xb0 [ 259.913740] ? ext4_xattr_ibody_get+0x107/0x630 [ 259.918420] ? ext4_xattr_inode_set_class+0x60/0x60 [ 259.923435] ? get_cached_acl+0x35c/0x460 [ 259.927582] ? up_read+0x1a/0x110 [ 259.931018] ? ext4_xattr_get+0x1ad/0xb30 [ 259.935154] ? ext4_xattr_ibody_get+0x630/0x630 [ 259.939805] ? ratelimit_state_init+0xb0/0xb0 [ 259.944315] alloc_inode+0x63/0x190 [ 259.947942] new_inode_pseudo+0x71/0x1a0 [ 259.951997] ? prune_icache_sb+0x1c0/0x1c0 [ 259.956233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.961749] ? __ext4_xattr_set_credits+0x3ae/0x520 [ 259.966747] new_inode+0x1c/0x40 [ 259.970095] __ext4_new_inode+0x4cd/0x65b0 [ 259.974316] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 259.979399] ? mark_held_locks+0x130/0x130 [ 259.983628] ? ext4_free_inode+0x1a10/0x1a10 [ 259.988017] ? __brelse+0x104/0x180 [ 259.991622] ? block_commit_write+0x30/0x30 [ 259.995925] ? d_splice_alias+0x7a5/0x11d0 [ 260.000138] ? lock_downgrade+0x900/0x900 [ 260.004283] ? __d_lookup_done+0x338/0x610 [ 260.008498] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 260.013499] ? hashtab_stat+0x1f0/0x1f0 [ 260.017453] ? security_compute_sid+0xe71/0x1f40 [ 260.022193] ? lock_downgrade+0x900/0x900 [ 260.026321] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 260.031321] ? ebitmap_contains+0x233/0x520 [ 260.035624] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 260.040660] ? ebitmap_cmp+0x227/0x2c0 [ 260.044533] ? lock_downgrade+0x900/0x900 [ 260.048679] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 260.054463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.059981] ? avc_has_perm+0x55f/0x7e0 [ 260.063939] ? avc_has_perm_noaudit+0x630/0x630 [ 260.068601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.074123] ? __dquot_initialize+0x629/0xdd0 [ 260.078608] ? dquot_get_next_dqblk+0x180/0x180 [ 260.083278] ext4_mkdir+0x2e1/0xe60 [ 260.086889] ? __sanitizer_cov_trace_cmp2+0xa/0x20 [ 260.091802] ? ext4_init_dot_dotdot+0x510/0x510 [ 260.096453] ? selinux_inode_mkdir+0x22/0x30 [ 260.100842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.106361] ? security_inode_mkdir+0xe8/0x120 [ 260.110924] vfs_mkdir+0x42e/0x6b0 [ 260.114449] ovl_create_real+0x225/0x410 [ 260.118490] ovl_workdir_create+0x564/0x820 [ 260.122799] ? ovl_mount_dir+0x1c0/0x1c0 [ 260.126852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.132376] ovl_fill_super+0xdd4/0x3f7b [ 260.136420] ? ovl_show_options+0x550/0x550 [ 260.140721] ? __free_pages+0x163/0x190 [ 260.144680] ? selinux_sb_copy_data+0x602/0x740 [ 260.149331] ? selinux_capable+0x36/0x40 [ 260.153375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.158900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.164417] ? get_anon_bdev+0xc0/0xc0 [ 260.168281] ? sget+0x113/0x150 [ 260.171541] ? ovl_show_options+0x550/0x550 [ 260.175844] mount_nodev+0x6b/0x110 [ 260.179454] ovl_mount+0x2c/0x40 [ 260.182830] mount_fs+0xae/0x31d [ 260.186192] vfs_kern_mount.part.35+0xdc/0x4f0 [ 260.190752] ? may_umount+0xb0/0xb0 [ 260.194365] ? _raw_read_unlock+0x2c/0x50 [ 260.198492] ? __get_fs_type+0x97/0xc0 [ 260.202361] do_mount+0x581/0x31f0 [ 260.205884] ? retint_kernel+0x1b/0x2d [ 260.209756] ? trace_hardirqs_on+0x310/0x310 [ 260.214156] ? copy_mount_string+0x40/0x40 [ 260.218374] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 260.223113] ? trace_hardirqs_off+0xaf/0x310 [ 260.227525] ? retint_kernel+0x2d/0x2d [ 260.231391] ? copy_mount_options+0x1f3/0x380 [ 260.235868] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 260.240705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.246223] ? copy_mount_options+0x288/0x380 [ 260.250711] ksys_mount+0x12d/0x140 [ 260.254320] __x64_sys_mount+0xbe/0x150 [ 260.258278] do_syscall_64+0x1b9/0x820 [ 260.262170] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 260.267515] ? syscall_return_slowpath+0x5e0/0x5e0 [ 260.272428] ? trace_hardirqs_on_caller+0x310/0x310 [ 260.277425] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 260.282425] ? recalc_sigpending_tsk+0x180/0x180 [ 260.287163] ? kasan_check_write+0x14/0x20 [ 260.291379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.296207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.301378] RIP: 0033:0x457579 [ 260.304576] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.323500] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 260.331188] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 260.338437] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 260.345687] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 260.352936] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 260.360182] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 260.371018] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only [ 260.460562] 9pnet: Insufficient options for proto=fd 21:38:10 executing program 3 (fault-call:4 fault-nth:33): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:10 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400d00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:10 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4000f0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:10 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:10 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40ff00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 260.500943] overlayfs: filesystem on './file0' not supported as upperdir 21:38:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 260.552148] FAULT_INJECTION: forcing a failure. [ 260.552148] name failslab, interval 1, probability 0, space 0, times 0 [ 260.563876] CPU: 1 PID: 9549 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 260.571085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.580451] Call Trace: [ 260.583048] dump_stack+0x1c4/0x2b4 [ 260.586665] ? dump_stack_print_info.cold.2+0x52/0x52 [ 260.591847] should_fail.cold.4+0xa/0x17 [ 260.595895] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 260.600986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.606510] ? kasan_check_write+0x14/0x20 [ 260.610743] ? __brelse+0x104/0x180 [ 260.614353] ? block_commit_write+0x30/0x30 [ 260.618674] ? __ext4_handle_dirty_metadata+0x1e0/0x5a0 [ 260.624033] ? kasan_check_write+0x14/0x20 [ 260.628266] ? ext4_mark_iloc_dirty+0x19bb/0x2f00 [ 260.633115] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 260.638903] ? ext4_chunk_trans_blocks+0x30/0x30 [ 260.643659] ? ___might_sleep+0x1ed/0x300 [ 260.647793] ? arch_local_save_flags+0x40/0x40 [ 260.652382] ? ext4_block_write_begin+0x1870/0x1870 [ 260.657394] __should_failslab+0x124/0x180 [ 260.661614] should_failslab+0x9/0x14 [ 260.665413] __kmalloc+0x2d4/0x760 [ 260.668952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.674476] ? ext4_reserve_inode_write+0x148/0x260 [ 260.679481] ? ext4_find_extent+0x757/0x9b0 [ 260.683793] ext4_find_extent+0x757/0x9b0 [ 260.687928] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 260.692842] ? cap_ptrace_access_check+0x2f0/0x6b0 [ 260.697760] ext4_ext_map_blocks+0x2ad/0x6330 [ 260.702251] ? unregister_lsm_notifier+0x20/0x20 [ 260.706996] ? ext4_init_acl+0x1d6/0x300 [ 260.711047] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 260.716062] ? block_commit_write+0x30/0x30 [ 260.720389] ? check_preemption_disabled+0x48/0x200 [ 260.725397] ? __ext4_new_inode+0xb2b/0x65b0 [ 260.729794] ? ext4_es_lookup_extent+0x446/0xde0 [ 260.734534] ? lock_downgrade+0x900/0x900 [ 260.738667] ? lock_release+0x970/0x970 [ 260.742641] ? lock_acquire+0x1ed/0x520 [ 260.746621] ? ext4_map_blocks+0x487/0x1b50 [ 260.750928] ? lock_release+0x970/0x970 [ 260.754901] ? arch_local_save_flags+0x40/0x40 [ 260.759473] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 260.764994] ? ext4_es_lookup_extent+0x499/0xde0 [ 260.769741] ? down_read+0xb0/0x1d0 [ 260.773348] ? ext4_map_blocks+0x487/0x1b50 [ 260.777738] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 260.782762] ? __down_interruptible+0x700/0x700 [ 260.787423] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 260.792434] ? ebitmap_cmp+0x227/0x2c0 [ 260.796312] ext4_map_blocks+0xe35/0x1b50 [ 260.800449] ? ext4_issue_zeroout+0x190/0x190 [ 260.804937] ext4_getblk+0x10e/0x630 [ 260.808635] ? ext4_iomap_begin+0x1390/0x1390 [ 260.813117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.818641] ? __dquot_initialize+0x629/0xdd0 [ 260.823125] ext4_bread+0x95/0x2b0 [ 260.826656] ? ext4_getblk+0x630/0x630 [ 260.830528] ? dquot_get_next_dqblk+0x180/0x180 [ 260.835185] ext4_append+0x14e/0x370 [ 260.838886] ext4_mkdir+0x532/0xe60 [ 260.842502] ? ext4_init_dot_dotdot+0x510/0x510 [ 260.847173] ? selinux_inode_mkdir+0x22/0x30 [ 260.851567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.857103] ? security_inode_mkdir+0xe8/0x120 [ 260.861670] vfs_mkdir+0x42e/0x6b0 [ 260.865211] ovl_create_real+0x225/0x410 [ 260.869273] ovl_workdir_create+0x564/0x820 [ 260.873590] ? ovl_mount_dir+0x1c0/0x1c0 [ 260.877639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.883169] ovl_fill_super+0xdd4/0x3f7b [ 260.887222] ? ovl_show_options+0x550/0x550 [ 260.891529] ? __free_pages+0x163/0x190 [ 260.895490] ? selinux_sb_copy_data+0x602/0x740 [ 260.900145] ? selinux_capable+0x36/0x40 [ 260.904191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.909717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.915237] ? get_anon_bdev+0xc0/0xc0 [ 260.919111] ? sget+0x113/0x150 [ 260.922374] ? ovl_show_options+0x550/0x550 [ 260.926680] mount_nodev+0x6b/0x110 [ 260.930289] ovl_mount+0x2c/0x40 [ 260.933638] mount_fs+0xae/0x31d [ 260.937005] vfs_kern_mount.part.35+0xdc/0x4f0 [ 260.941621] ? may_umount+0xb0/0xb0 [ 260.945233] ? _raw_read_unlock+0x2c/0x50 [ 260.949368] ? __get_fs_type+0x97/0xc0 [ 260.953239] do_mount+0x581/0x31f0 [ 260.956769] ? copy_mount_string+0x40/0x40 [ 260.960993] ? kasan_unpoison_shadow+0x35/0x50 [ 260.965559] ? kasan_kmalloc+0xc7/0xe0 [ 260.970137] ? kmem_cache_alloc_trace+0x31f/0x750 [ 260.974968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.980490] ? copy_mount_options+0x288/0x380 [ 260.984995] ksys_mount+0x12d/0x140 [ 260.988605] __x64_sys_mount+0xbe/0x150 [ 260.992566] do_syscall_64+0x1b9/0x820 [ 260.996445] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 261.001811] ? syscall_return_slowpath+0x5e0/0x5e0 [ 261.006733] ? trace_hardirqs_on_caller+0x310/0x310 [ 261.011735] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 261.016741] ? recalc_sigpending_tsk+0x180/0x180 [ 261.021480] ? kasan_check_write+0x14/0x20 [ 261.025707] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.030541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.035713] RIP: 0033:0x457579 [ 261.038890] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.057775] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 261.065468] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 261.072721] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 261.079974] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 261.087241] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 261.094496] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 261.127735] 9pnet: Insufficient options for proto=fd 21:38:11 executing program 3 (fault-call:4 fault-nth:34): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:11 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:11 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40ff0f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:11 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40f403, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 261.222521] overlayfs: filesystem on './file0' not supported as upperdir 21:38:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 261.298222] FAULT_INJECTION: forcing a failure. [ 261.298222] name failslab, interval 1, probability 0, space 0, times 0 [ 261.309640] CPU: 0 PID: 9574 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 261.316840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.316847] Call Trace: [ 261.316876] dump_stack+0x1c4/0x2b4 [ 261.316899] ? dump_stack_print_info.cold.2+0x52/0x52 [ 261.316916] ? __getblk_gfp+0x11b/0xd50 [ 261.316935] ? new_inode_pseudo+0x71/0x1a0 [ 261.316955] ? __ext4_new_inode+0x4cd/0x65b0 [ 261.316977] should_fail.cold.4+0xa/0x17 [ 261.316997] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 261.317027] ? mark_held_locks+0x130/0x130 [ 261.341750] ? trace_hardirqs_on+0xbd/0x310 [ 261.341768] ? ___might_sleep+0x1ed/0x300 [ 261.341788] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 261.377276] ? trace_hardirqs_on+0xbd/0x310 [ 261.381628] ? selinux_inode_alloc_security+0x107/0x3a0 [ 261.387023] ? kasan_unpoison_shadow+0x35/0x50 [ 261.391620] ? kasan_kmalloc+0xc7/0xe0 [ 261.395524] ? __lockdep_init_map+0x105/0x590 [ 261.400024] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 261.405046] ? ext4_get_group_desc+0x1c6/0x2c0 [ 261.409649] ? ___might_sleep+0x1ed/0x300 [ 261.413814] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.413830] ? arch_local_save_flags+0x40/0x40 [ 261.413848] ? selinux_inode_alloc_security+0x29b/0x3a0 [ 261.413867] __should_failslab+0x124/0x180 [ 261.433555] should_failslab+0x9/0x14 [ 261.437380] kmem_cache_alloc+0x2be/0x730 [ 261.441559] jbd2__journal_start+0x1e7/0xa90 [ 261.446000] ? arch_local_save_flags+0x40/0x40 [ 261.450621] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 261.456347] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.461897] ? __might_sleep+0x95/0x190 [ 261.465884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.471428] __ext4_journal_start_sb+0x1a5/0x5f0 [ 261.476193] ? __ext4_new_inode+0x3898/0x65b0 [ 261.480703] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 261.486425] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.491970] ? find_next_zero_bit+0x111/0x140 [ 261.496483] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 261.501755] __ext4_new_inode+0x3898/0x65b0 [ 261.506098] ? mark_held_locks+0x130/0x130 [ 261.510350] ? ext4_free_inode+0x1a10/0x1a10 [ 261.514767] ? __brelse+0x104/0x180 [ 261.518401] ? block_commit_write+0x30/0x30 [ 261.522732] ? d_splice_alias+0x7a5/0x11d0 [ 261.526983] ? lock_downgrade+0x900/0x900 [ 261.531141] ? __d_lookup_done+0x338/0x610 [ 261.535386] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 261.540416] ? hashtab_stat+0x1f0/0x1f0 [ 261.544403] ? security_compute_sid+0xe71/0x1f40 [ 261.549176] ? lock_downgrade+0x900/0x900 [ 261.553333] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 261.558361] ? ebitmap_contains+0x233/0x520 [ 261.562695] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 261.567716] ? ebitmap_cmp+0x227/0x2c0 [ 261.571624] ? lock_downgrade+0x900/0x900 [ 261.575789] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 261.581637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.587187] ? avc_has_perm+0x55f/0x7e0 [ 261.591180] ? avc_has_perm_noaudit+0x630/0x630 [ 261.595871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.601422] ? __dquot_initialize+0x629/0xdd0 [ 261.605940] ? dquot_get_next_dqblk+0x180/0x180 [ 261.610643] ext4_mkdir+0x2e1/0xe60 [ 261.614289] ? __sanitizer_cov_trace_cmp2+0xa/0x20 [ 261.619232] ? ext4_init_dot_dotdot+0x510/0x510 [ 261.623915] ? selinux_inode_mkdir+0x22/0x30 [ 261.623932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.623952] ? security_inode_mkdir+0xe8/0x120 [ 261.635206] vfs_mkdir+0x42e/0x6b0 [ 261.635226] ovl_create_real+0x225/0x410 21:38:11 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400028, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 261.635247] ovl_workdir_create+0x564/0x820 [ 261.652441] ? ovl_mount_dir+0x1c0/0x1c0 [ 261.656513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.662071] ovl_fill_super+0xdd4/0x3f7b [ 261.666139] ? ovl_show_options+0x550/0x550 [ 261.670453] ? __free_pages+0x163/0x190 [ 261.674418] ? selinux_sb_copy_data+0x602/0x740 [ 261.679079] ? selinux_capable+0x36/0x40 [ 261.683131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.688654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.694177] ? get_anon_bdev+0xc0/0xc0 [ 261.698060] ? sget+0x113/0x150 [ 261.701353] ? ovl_show_options+0x550/0x550 [ 261.705678] mount_nodev+0x6b/0x110 [ 261.709292] ovl_mount+0x2c/0x40 [ 261.712645] mount_fs+0xae/0x31d [ 261.716004] vfs_kern_mount.part.35+0xdc/0x4f0 [ 261.720583] ? may_umount+0xb0/0xb0 [ 261.724200] ? _raw_read_unlock+0x2c/0x50 [ 261.728333] ? __get_fs_type+0x97/0xc0 [ 261.732207] do_mount+0x581/0x31f0 [ 261.735750] ? copy_mount_string+0x40/0x40 [ 261.740004] ? kasan_unpoison_shadow+0x35/0x50 [ 261.744592] ? kasan_kmalloc+0xc7/0xe0 [ 261.748491] ? kmem_cache_alloc_trace+0x31f/0x750 [ 261.753320] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.758847] ? _copy_from_user+0xdf/0x150 [ 261.762980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.768507] ? copy_mount_options+0x288/0x380 [ 261.772988] ksys_mount+0x12d/0x140 [ 261.776606] __x64_sys_mount+0xbe/0x150 [ 261.780582] do_syscall_64+0x1b9/0x820 [ 261.784467] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 261.789834] ? syscall_return_slowpath+0x5e0/0x5e0 [ 261.794752] ? trace_hardirqs_on_caller+0x310/0x310 [ 261.799754] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 261.804757] ? recalc_sigpending_tsk+0x180/0x180 [ 261.809497] ? kasan_check_write+0x14/0x20 [ 261.813717] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.818547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.823726] RIP: 0033:0x457579 [ 261.826904] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.845789] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 261.853482] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 261.860738] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 261.867991] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 261.875244] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 261.882500] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 261.892152] EXT4-fs error (device sda1) in __ext4_new_inode:933: Out of memory [ 261.898777] 9pnet: Insufficient options for proto=fd [ 261.902337] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only 21:38:11 executing program 3 (fault-call:4 fault-nth:35): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:11 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:11 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4000f0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:11 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401126, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 262.042117] 9pnet: Insufficient options for proto=fd [ 262.061707] overlayfs: filesystem on './file0' not supported as upperdir [ 262.097724] FAULT_INJECTION: forcing a failure. [ 262.097724] name failslab, interval 1, probability 0, space 0, times 0 [ 262.109032] CPU: 1 PID: 9615 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 262.116240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.125605] Call Trace: [ 262.128236] dump_stack+0x1c4/0x2b4 [ 262.131881] ? dump_stack_print_info.cold.2+0x52/0x52 [ 262.137090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.142656] ? add_transaction_credits+0x3f9/0xe50 [ 262.147612] should_fail.cold.4+0xa/0x17 [ 262.151684] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.151708] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 262.151727] ? kasan_check_read+0x11/0x20 [ 262.162624] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 262.162644] ? hashtab_stat+0x1f0/0x1f0 [ 262.162660] ? security_compute_sid+0xe71/0x1f40 [ 262.162677] ? lock_downgrade+0x900/0x900 [ 262.162691] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 262.162706] ? ebitmap_contains+0x233/0x520 [ 262.162721] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 262.162735] ? ebitmap_cmp+0x227/0x2c0 [ 262.162753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.162768] ? sidtab_context_to_sid+0xf01/0x1290 [ 262.162789] ? mls_context_isvalid+0x55/0x340 [ 262.218019] ? memset+0x31/0x40 [ 262.221300] ? security_compute_sid+0x19a/0x1f40 [ 262.226062] __should_failslab+0x124/0x180 [ 262.230302] should_failslab+0x9/0x14 [ 262.234115] __kmalloc+0x63/0x760 [ 262.237583] ? flex_array_get+0x1da/0x260 [ 262.241738] ? context_struct_to_string+0x401/0x900 [ 262.246760] context_struct_to_string+0x401/0x900 [ 262.251617] ? get_permissions_callback+0xb0/0xb0 [ 262.256463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.262004] ? sidtab_search_core+0x21f/0x3b0 [ 262.266521] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 262.272412] security_sid_to_context_force+0x38/0x50 [ 262.277520] selinux_inode_init_security+0x416/0x890 [ 262.282627] ? current_time+0x72/0x1b0 [ 262.286518] ? selinux_inode_create+0x30/0x30 [ 262.291190] ? get_cached_acl+0x383/0x460 [ 262.295351] security_inode_init_security+0x15d/0x3d0 [ 262.300543] ? ext4_init_acl+0x300/0x300 [ 262.304621] ? unregister_lsm_notifier+0x20/0x20 [ 262.309376] ? ext4_init_acl+0x1d6/0x300 [ 262.313445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.318987] ? check_preemption_disabled+0x48/0x200 [ 262.324010] ext4_init_security+0x34/0x40 [ 262.328164] __ext4_new_inode+0x4a6a/0x65b0 [ 262.332497] ? ext4_free_inode+0x1a10/0x1a10 [ 262.336904] ? __brelse+0x104/0x180 [ 262.340531] ? block_commit_write+0x30/0x30 [ 262.344856] ? d_splice_alias+0x7a5/0x11d0 [ 262.349096] ? lock_downgrade+0x900/0x900 [ 262.353256] ? __d_lookup_done+0x338/0x610 [ 262.357496] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 262.362512] ? hashtab_stat+0x1f0/0x1f0 [ 262.366485] ? security_compute_sid+0xe71/0x1f40 [ 262.371240] ? lock_downgrade+0x900/0x900 [ 262.375387] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 262.380406] ? ebitmap_contains+0x233/0x520 [ 262.384729] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 262.389747] ? ebitmap_cmp+0x227/0x2c0 [ 262.393645] ? lock_downgrade+0x900/0x900 [ 262.397802] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 262.403622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.409162] ? avc_has_perm+0x55f/0x7e0 [ 262.413139] ? avc_has_perm_noaudit+0x630/0x630 [ 262.417812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.423353] ? __dquot_initialize+0x629/0xdd0 [ 262.427854] ? dquot_get_next_dqblk+0x180/0x180 [ 262.432536] ext4_mkdir+0x2e1/0xe60 [ 262.436172] ? __sanitizer_cov_trace_cmp2+0xa/0x20 [ 262.441111] ? ext4_init_dot_dotdot+0x510/0x510 [ 262.445789] ? selinux_inode_mkdir+0x22/0x30 [ 262.450199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.455747] ? security_inode_mkdir+0xe8/0x120 [ 262.460332] vfs_mkdir+0x42e/0x6b0 [ 262.463880] ovl_create_real+0x225/0x410 [ 262.467945] ovl_workdir_create+0x564/0x820 [ 262.472274] ? ovl_mount_dir+0x1c0/0x1c0 [ 262.476336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.481886] ovl_fill_super+0xdd4/0x3f7b [ 262.485962] ? ovl_show_options+0x550/0x550 [ 262.490283] ? __free_pages+0x163/0x190 [ 262.494262] ? selinux_sb_copy_data+0x602/0x740 [ 262.498935] ? selinux_capable+0x36/0x40 [ 262.502997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.508539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.514086] ? get_anon_bdev+0xc0/0xc0 [ 262.517994] ? sget+0x113/0x150 [ 262.521658] ? ovl_show_options+0x550/0x550 [ 262.525978] mount_nodev+0x6b/0x110 [ 262.529607] ovl_mount+0x2c/0x40 [ 262.532976] mount_fs+0xae/0x31d [ 262.536351] vfs_kern_mount.part.35+0xdc/0x4f0 [ 262.540935] ? may_umount+0xb0/0xb0 [ 262.544584] ? _raw_read_unlock+0x2c/0x50 [ 262.548735] ? __get_fs_type+0x97/0xc0 [ 262.552625] do_mount+0x581/0x31f0 [ 262.556167] ? retint_kernel+0x1b/0x2d [ 262.560054] ? trace_hardirqs_on+0x310/0x310 [ 262.564467] ? copy_mount_string+0x40/0x40 [ 262.568716] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 262.573482] ? trace_hardirqs_off+0xaf/0x310 [ 262.577892] ? retint_kernel+0x2d/0x2d [ 262.581787] ? copy_mount_options+0x1f3/0x380 [ 262.586286] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 262.591137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.596678] ? copy_mount_options+0x288/0x380 [ 262.601177] ksys_mount+0x12d/0x140 [ 262.604806] __x64_sys_mount+0xbe/0x150 [ 262.608900] do_syscall_64+0x1b9/0x820 [ 262.612790] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 262.618162] ? syscall_return_slowpath+0x5e0/0x5e0 [ 262.623095] ? trace_hardirqs_on_caller+0x310/0x310 [ 262.628121] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 262.633145] ? recalc_sigpending_tsk+0x180/0x180 [ 262.637900] ? kasan_check_write+0x14/0x20 [ 262.642141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.646992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.652175] RIP: 0033:0x457579 [ 262.655383] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.674295] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 262.682027] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 262.689292] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 21:38:12 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400010, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:12 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40ffe0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:12 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 262.696561] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 262.703836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 262.711111] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 262.730948] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only 21:38:12 executing program 3 (fault-call:4 fault-nth:36): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 262.839100] ovl_get_fh: 22 callbacks suppressed [ 262.839112] overlayfs: invalid origin (7900) [ 262.858751] FAULT_INJECTION: forcing a failure. [ 262.858751] name failslab, interval 1, probability 0, space 0, times 0 [ 262.868601] 9pnet: Insufficient options for proto=fd [ 262.870237] overlayfs: invalid origin (7900) 21:38:12 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0x0) [ 262.885463] overlayfs: invalid origin (7900) [ 262.899019] CPU: 0 PID: 9637 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 262.906224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.908009] overlayfs: invalid origin (7900) [ 262.915603] Call Trace: [ 262.915645] dump_stack+0x1c4/0x2b4 [ 262.915672] ? dump_stack_print_info.cold.2+0x52/0x52 [ 262.931469] ? __getblk_gfp+0x11b/0xd50 [ 262.935467] ? new_inode_pseudo+0x71/0x1a0 [ 262.939719] ? __ext4_new_inode+0x4cd/0x65b0 [ 262.944143] should_fail.cold.4+0xa/0x17 [ 262.948217] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.953336] ? mark_held_locks+0x130/0x130 [ 262.957604] ? ___might_sleep+0x1ed/0x300 [ 262.961766] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 262.966797] ? trace_hardirqs_on+0xbd/0x310 [ 262.971128] ? selinux_inode_alloc_security+0x107/0x3a0 [ 262.976506] ? kasan_unpoison_shadow+0x35/0x50 [ 262.981098] ? kasan_kmalloc+0xc7/0xe0 [ 262.984998] ? __lockdep_init_map+0x105/0x590 21:38:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) creat(&(0x7f0000000140)='./file0\x00', 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f00000002c0)=0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0xaaaaaaaaaaaaa93, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000240)={0x0, 0x2000000000010000}) [ 262.989506] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 262.994534] ? ext4_get_group_desc+0x1c6/0x2c0 [ 262.995944] overlayfs: filesystem on './file0' not supported as upperdir [ 262.999139] ? ___might_sleep+0x1ed/0x300 [ 263.010123] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.015669] ? arch_local_save_flags+0x40/0x40 [ 263.015687] ? selinux_inode_alloc_security+0x29b/0x3a0 [ 263.015709] __should_failslab+0x124/0x180 [ 263.029876] should_failslab+0x9/0x14 [ 263.033703] kmem_cache_alloc+0x2be/0x730 [ 263.037883] jbd2__journal_start+0x1e7/0xa90 [ 263.042301] ? arch_local_save_flags+0x40/0x40 [ 263.046903] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 263.052628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.058173] ? __might_sleep+0x95/0x190 [ 263.062150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.067705] __ext4_journal_start_sb+0x1a5/0x5f0 [ 263.072465] ? __ext4_new_inode+0x3898/0x65b0 [ 263.076964] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 263.082689] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.088227] ? find_next_zero_bit+0x111/0x140 [ 263.092726] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 263.097751] __ext4_new_inode+0x3898/0x65b0 [ 263.102082] ? mark_held_locks+0x130/0x130 [ 263.106325] ? ext4_free_inode+0x1a10/0x1a10 [ 263.110729] ? __brelse+0x104/0x180 [ 263.114357] ? block_commit_write+0x30/0x30 [ 263.118682] ? d_splice_alias+0x7a5/0x11d0 [ 263.122922] ? lock_downgrade+0x900/0x900 [ 263.127076] ? __d_lookup_done+0x338/0x610 [ 263.131318] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 263.136341] ? hashtab_stat+0x1f0/0x1f0 [ 263.140324] ? security_compute_sid+0xe71/0x1f40 [ 263.145087] ? lock_downgrade+0x900/0x900 [ 263.149244] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.154278] ? ebitmap_contains+0x233/0x520 [ 263.158623] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.163667] ? ebitmap_cmp+0x227/0x2c0 [ 263.167564] ? lock_downgrade+0x900/0x900 [ 263.171735] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 263.177545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.183093] ? avc_has_perm+0x55f/0x7e0 [ 263.187071] ? avc_has_perm_noaudit+0x630/0x630 [ 263.191746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.197287] ? __dquot_initialize+0x629/0xdd0 [ 263.201788] ? dquot_get_next_dqblk+0x180/0x180 [ 263.206471] ext4_mkdir+0x2e1/0xe60 [ 263.210121] ? __sanitizer_cov_trace_cmp2+0xa/0x20 [ 263.215054] ? ext4_init_dot_dotdot+0x510/0x510 [ 263.219732] ? selinux_inode_mkdir+0x22/0x30 [ 263.224146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.229686] ? security_inode_mkdir+0xe8/0x120 [ 263.234272] vfs_mkdir+0x42e/0x6b0 [ 263.237817] ovl_create_real+0x225/0x410 [ 263.241881] ovl_workdir_create+0x564/0x820 [ 263.246210] ? ovl_mount_dir+0x1c0/0x1c0 [ 263.250270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.255822] ovl_fill_super+0xdd4/0x3f7b [ 263.259893] ? ovl_show_options+0x550/0x550 [ 263.264219] ? __free_pages+0x163/0x190 [ 263.268200] ? selinux_sb_copy_data+0x602/0x740 [ 263.272874] ? selinux_capable+0x36/0x40 [ 263.276941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.282508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.288045] ? get_anon_bdev+0xc0/0xc0 [ 263.291956] ? sget+0x113/0x150 [ 263.295250] ? ovl_show_options+0x550/0x550 [ 263.299584] mount_nodev+0x6b/0x110 [ 263.303222] ovl_mount+0x2c/0x40 [ 263.306596] mount_fs+0xae/0x31d [ 263.309981] vfs_kern_mount.part.35+0xdc/0x4f0 [ 263.314580] ? may_umount+0xb0/0xb0 [ 263.318228] ? _raw_read_unlock+0x2c/0x50 [ 263.322375] ? __get_fs_type+0x97/0xc0 [ 263.326265] do_mount+0x581/0x31f0 [ 263.329813] ? kasan_check_read+0x11/0x20 [ 263.333965] ? do_raw_spin_unlock+0xa7/0x2f0 [ 263.338377] ? copy_mount_string+0x40/0x40 [ 263.342898] ? kasan_check_write+0x14/0x20 [ 263.347143] ? kasan_unpoison_shadow+0x35/0x50 [ 263.351722] ? kasan_kmalloc+0xc7/0xe0 [ 263.355620] ? kmem_cache_alloc_trace+0x31f/0x750 [ 263.360464] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.366027] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.371562] ? copy_mount_options+0x288/0x380 [ 263.376073] ksys_mount+0x12d/0x140 [ 263.379700] __x64_sys_mount+0xbe/0x150 [ 263.383682] do_syscall_64+0x1b9/0x820 [ 263.387578] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 263.392964] ? syscall_return_slowpath+0x5e0/0x5e0 [ 263.397900] ? trace_hardirqs_on_caller+0x310/0x310 [ 263.402932] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 263.407948] ? recalc_sigpending_tsk+0x180/0x180 [ 263.412700] ? kasan_check_write+0x14/0x20 [ 263.416940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.421788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.426985] RIP: 0033:0x457579 [ 263.430195] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.449094] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 263.456802] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 263.464085] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 263.471355] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 263.478623] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 21:38:13 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x800000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:13 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:13 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400022, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:13 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400008, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:13 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000fc0)=[&(0x7f0000000f80)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000d40), 0x0, 0x0, 0x0, 0x1, r1}]) getpeername$inet6(0xffffffffffffffff, &(0x7f00000008c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000980)=0x1c) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(r2, &(0x7f0000000480), 0x10) sysinfo(&(0x7f0000000d80)=""/201) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) shutdown(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000009c0)=ANY=[@ANYBLOB="53000000a52c53a8e8991f8cf3dd8d847ec339596db925f2dbafedc5d0d24dfc32c6c32c5cff5d0308fc39d645db5706c73719b3df928249de"], &(0x7f0000000000)=0x1) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r4 = getpgrp(0x0) migrate_pages(r4, 0x9, &(0x7f0000000040)=0x3, &(0x7f0000000080)=0xffffffff80000801) [ 263.485903] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 263.501793] EXT4-fs error (device sda1) in __ext4_new_inode:933: Out of memory [ 263.523808] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only 21:38:13 executing program 3 (fault-call:4 fault-nth:37): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 263.652549] 9pnet: Insufficient options for proto=fd [ 263.657952] overlayfs: invalid origin (7900) [ 263.658822] overlayfs: invalid origin (7900) [ 263.680637] overlayfs: invalid origin (7900) [ 263.691634] overlayfs: invalid origin (7900) [ 263.703478] FAULT_INJECTION: forcing a failure. [ 263.703478] name failslab, interval 1, probability 0, space 0, times 0 [ 263.714753] CPU: 0 PID: 9670 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 263.721955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.731311] Call Trace: [ 263.731344] dump_stack+0x1c4/0x2b4 [ 263.731368] ? dump_stack_print_info.cold.2+0x52/0x52 [ 263.731391] ? ext4_getblk+0x10e/0x630 [ 263.737605] ? ext4_bread+0x95/0x2b0 [ 263.737626] ? ext4_append+0x14e/0x370 [ 263.746689] ? ext4_mkdir+0x532/0xe60 [ 263.746706] ? ovl_create_real+0x225/0x410 [ 263.746727] should_fail.cold.4+0xa/0x17 [ 263.746754] ? do_syscall_64+0x1b9/0x820 [ 263.754335] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.754350] ? kasan_check_write+0x14/0x20 [ 263.754380] ? mark_held_locks+0x130/0x130 [ 263.754395] ? debug_check_no_obj_freed+0x305/0x58d [ 263.754423] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.759400] overlayfs: filesystem on './file0' not supported as upperdir [ 263.762445] ? check_preemption_disabled+0x48/0x200 [ 263.762464] ? trace_hardirqs_on+0xbd/0x310 [ 263.762481] ? ext4_ext_map_blocks+0xe26/0x6330 [ 263.762503] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 263.770648] ? __kasan_slab_free+0x119/0x150 [ 263.770666] ? ext4_ext_map_blocks+0xe26/0x6330 [ 263.770685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.770710] ? ext4_ext_map_blocks+0xf14/0x6330 [ 263.780052] __should_failslab+0x124/0x180 [ 263.780068] should_failslab+0x9/0x14 [ 263.780085] kmem_cache_alloc+0x47/0x730 21:38:13 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402200, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:13 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400804, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 263.780110] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.789346] ? ext4_es_can_be_merged+0x23d/0x2a0 [ 263.789364] ? __es_tree_search.isra.12+0x1ba/0x220 [ 263.789382] __es_insert_extent+0x30c/0x1120 [ 263.789408] ? ext4_es_free_extent+0x790/0x790 [ 263.801772] ? lock_release+0x970/0x970 [ 263.801791] ? lock_acquire+0x1ed/0x520 [ 263.801804] ? ext4_map_blocks+0x487/0x1b50 [ 263.801820] ? kasan_check_write+0x14/0x20 [ 263.801842] ? do_raw_write_lock+0xbd/0x1b0 [ 263.811166] ext4_es_insert_extent+0x316/0x810 [ 263.811188] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 263.811202] ? lock_downgrade+0x900/0x900 [ 263.811230] ? down_write+0x8a/0x130 [ 263.821324] ? ext4_map_blocks+0x88f/0x1b50 [ 263.821343] ? down_read+0x1d0/0x1d0 [ 263.821363] ext4_map_blocks+0xb0c/0x1b50 [ 263.821388] ? ext4_issue_zeroout+0x190/0x190 [ 263.830453] ext4_getblk+0x10e/0x630 [ 263.830471] ? ext4_iomap_begin+0x1390/0x1390 [ 263.830497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.852745] ? __dquot_initialize+0x629/0xdd0 [ 263.852763] ext4_bread+0x95/0x2b0 21:38:13 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400030, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:13 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 263.852779] ? ext4_getblk+0x630/0x630 [ 263.852798] ? dquot_get_next_dqblk+0x180/0x180 [ 263.897352] ext4_append+0x14e/0x370 [ 263.897380] ext4_mkdir+0x532/0xe60 [ 263.907759] ? ext4_init_dot_dotdot+0x510/0x510 [ 263.907783] ? selinux_inode_mkdir+0x22/0x30 [ 263.907802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.907823] ? security_inode_mkdir+0xe8/0x120 [ 263.915674] vfs_mkdir+0x42e/0x6b0 [ 263.915694] ovl_create_real+0x225/0x410 [ 263.915713] ovl_workdir_create+0x564/0x820 [ 263.915740] ? ovl_mount_dir+0x1c0/0x1c0 [ 263.923762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.923794] ovl_fill_super+0xdd4/0x3f7b [ 263.923821] ? ovl_show_options+0x550/0x550 [ 263.923842] ? __free_pages+0x163/0x190 [ 263.932469] ? selinux_sb_copy_data+0x602/0x740 [ 263.932492] ? selinux_capable+0x36/0x40 [ 263.932509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.932529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.932552] ? get_anon_bdev+0xc0/0xc0 [ 263.943211] overlayfs: filesystem on './file0' not supported as upperdir [ 263.946278] ? sget+0x113/0x150 [ 263.946297] ? ovl_show_options+0x550/0x550 [ 263.946311] mount_nodev+0x6b/0x110 [ 263.946331] ovl_mount+0x2c/0x40 [ 264.068042] mount_fs+0xae/0x31d [ 264.071400] vfs_kern_mount.part.35+0xdc/0x4f0 [ 264.075969] ? may_umount+0xb0/0xb0 [ 264.079613] ? _raw_read_unlock+0x2c/0x50 [ 264.083757] ? __get_fs_type+0x97/0xc0 [ 264.087635] do_mount+0x581/0x31f0 [ 264.091164] ? trace_hardirqs_off+0x310/0x310 [ 264.095643] ? retint_kernel+0x1b/0x2d [ 264.099525] ? copy_mount_string+0x40/0x40 [ 264.103759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 264.108504] ? trace_hardirqs_off+0xaf/0x310 [ 264.112898] ? retint_kernel+0x2d/0x2d [ 264.116774] ? copy_mount_options+0x1dd/0x380 [ 264.121255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.126777] ? copy_mount_options+0x288/0x380 [ 264.131271] ksys_mount+0x12d/0x140 [ 264.134884] __x64_sys_mount+0xbe/0x150 [ 264.138843] do_syscall_64+0x1b9/0x820 [ 264.142715] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.148064] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.152980] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.157980] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.162984] ? recalc_sigpending_tsk+0x180/0x180 [ 264.167728] ? kasan_check_write+0x14/0x20 [ 264.171950] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.176796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.181978] RIP: 0033:0x457579 [ 264.185165] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:38:14 executing program 3 (fault-call:4 fault-nth:38): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 264.204051] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 264.211742] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 264.218995] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 264.226247] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 264.233498] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 264.240750] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 264.251441] overlayfs: invalid origin (7900) 21:38:14 executing program 1: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:38:14 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x406000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:14 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 264.350922] 9pnet: Insufficient options for proto=fd [ 264.358973] overlayfs: invalid origin (7900) [ 264.389837] overlayfs: filesystem on './file0' not supported as upperdir 21:38:14 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4003d2, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 264.436053] FAULT_INJECTION: forcing a failure. [ 264.436053] name failslab, interval 1, probability 0, space 0, times 0 [ 264.460610] CPU: 1 PID: 9695 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 264.467845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.477190] Call Trace: [ 264.479792] dump_stack+0x1c4/0x2b4 [ 264.483429] ? dump_stack_print_info.cold.2+0x52/0x52 [ 264.488644] should_fail.cold.4+0xa/0x17 [ 264.492712] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.497821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.503360] ? kasan_check_write+0x14/0x20 [ 264.507598] ? __brelse+0x104/0x180 [ 264.511225] ? block_commit_write+0x30/0x30 [ 264.515560] ? __ext4_handle_dirty_metadata+0x1e0/0x5a0 [ 264.520943] ? kasan_check_write+0x14/0x20 [ 264.525180] ? ext4_mark_iloc_dirty+0x19bb/0x2f00 [ 264.530041] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 264.535863] ? ext4_chunk_trans_blocks+0x30/0x30 [ 264.540631] ? ___might_sleep+0x1ed/0x300 [ 264.544810] ? arch_local_save_flags+0x40/0x40 [ 264.549401] ? ext4_block_write_begin+0x1870/0x1870 [ 264.554428] __should_failslab+0x124/0x180 [ 264.558669] should_failslab+0x9/0x14 [ 264.562474] __kmalloc+0x2d4/0x760 [ 264.566021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.571565] ? ext4_reserve_inode_write+0x148/0x260 [ 264.576612] ? ext4_find_extent+0x757/0x9b0 [ 264.580941] ext4_find_extent+0x757/0x9b0 [ 264.585382] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 264.590336] ? cap_ptrace_access_check+0x2f0/0x6b0 [ 264.595269] ext4_ext_map_blocks+0x2ad/0x6330 [ 264.599773] ? unregister_lsm_notifier+0x20/0x20 [ 264.604536] ? ext4_init_acl+0x1d6/0x300 [ 264.608610] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 264.614146] ? block_commit_write+0x30/0x30 [ 264.618476] ? check_preemption_disabled+0x48/0x200 [ 264.623501] ? __ext4_new_inode+0xb2b/0x65b0 [ 264.627917] ? ext4_es_lookup_extent+0x446/0xde0 [ 264.632677] ? lock_downgrade+0x900/0x900 [ 264.636829] ? lock_release+0x970/0x970 [ 264.640810] ? lock_acquire+0x1ed/0x520 [ 264.644783] ? ext4_map_blocks+0x487/0x1b50 [ 264.649118] ? lock_release+0x970/0x970 [ 264.653097] ? arch_local_save_flags+0x40/0x40 [ 264.657688] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 264.663226] ? ext4_es_lookup_extent+0x499/0xde0 [ 264.667991] ? down_read+0xb0/0x1d0 [ 264.671615] ? ext4_map_blocks+0x487/0x1b50 [ 264.675940] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 264.680962] ? __down_interruptible+0x700/0x700 [ 264.685632] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 264.690652] ? ebitmap_cmp+0x227/0x2c0 [ 264.694548] ext4_map_blocks+0xe35/0x1b50 [ 264.698710] ? ext4_issue_zeroout+0x190/0x190 [ 264.703212] ext4_getblk+0x10e/0x630 [ 264.706930] ? ext4_iomap_begin+0x1390/0x1390 [ 264.711426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.716964] ? __dquot_initialize+0x629/0xdd0 [ 264.721465] ext4_bread+0x95/0x2b0 [ 264.725015] ? ext4_getblk+0x630/0x630 [ 264.728900] ? dquot_get_next_dqblk+0x180/0x180 [ 264.733584] ext4_append+0x14e/0x370 [ 264.737310] ext4_mkdir+0x532/0xe60 [ 264.740948] ? ext4_init_dot_dotdot+0x510/0x510 [ 264.745623] ? selinux_inode_mkdir+0x22/0x30 [ 264.750033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.755581] ? security_inode_mkdir+0xe8/0x120 [ 264.760167] vfs_mkdir+0x42e/0x6b0 [ 264.763716] ovl_create_real+0x225/0x410 [ 264.767781] ovl_workdir_create+0x564/0x820 [ 264.772118] ? ovl_mount_dir+0x1c0/0x1c0 [ 264.776184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.781736] ovl_fill_super+0xdd4/0x3f7b [ 264.785812] ? ovl_show_options+0x550/0x550 [ 264.790139] ? __free_pages+0x163/0x190 [ 264.794125] ? selinux_sb_copy_data+0x602/0x740 [ 264.798801] ? selinux_capable+0x36/0x40 [ 264.802864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.808409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.813948] ? get_anon_bdev+0xc0/0xc0 [ 264.817837] ? sget+0x113/0x150 [ 264.821137] ? ovl_show_options+0x550/0x550 [ 264.825462] mount_nodev+0x6b/0x110 [ 264.829094] ovl_mount+0x2c/0x40 [ 264.832470] mount_fs+0xae/0x31d [ 264.835848] vfs_kern_mount.part.35+0xdc/0x4f0 [ 264.840432] ? may_umount+0xb0/0xb0 [ 264.844059] ? _raw_read_unlock+0x2c/0x50 [ 264.848211] ? __get_fs_type+0x97/0xc0 [ 264.852108] do_mount+0x581/0x31f0 [ 264.855655] ? kasan_check_read+0x11/0x20 [ 264.859803] ? do_raw_spin_unlock+0xa7/0x2f0 [ 264.864213] ? copy_mount_string+0x40/0x40 [ 264.868444] ? kasan_check_write+0x14/0x20 [ 264.872684] ? kasan_unpoison_shadow+0x35/0x50 [ 264.877265] ? kasan_kmalloc+0xc7/0xe0 [ 264.881158] ? kmem_cache_alloc_trace+0x31f/0x750 [ 264.886005] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 264.891555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.897105] ? copy_mount_options+0x288/0x380 [ 264.901612] ksys_mount+0x12d/0x140 [ 264.905243] __x64_sys_mount+0xbe/0x150 [ 264.909222] do_syscall_64+0x1b9/0x820 [ 264.913116] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.918485] ? syscall_return_slowpath+0x5e0/0x5e0 [ 264.923417] ? trace_hardirqs_on_caller+0x310/0x310 [ 264.928434] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 264.933457] ? recalc_sigpending_tsk+0x180/0x180 [ 264.938215] ? kasan_check_write+0x14/0x20 [ 264.942457] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.947307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.952496] RIP: 0033:0x457579 [ 264.955695] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.974600] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 264.982323] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 21:38:14 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400a00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:14 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000fc0)=[&(0x7f0000000f80)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000d40), 0x0, 0x0, 0x0, 0x1, r1}]) r2 = accept4(r1, &(0x7f0000000a00)=@generic, &(0x7f0000000500)=0x80, 0x2) getpeername$inet6(r2, &(0x7f00000008c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000980)=0x1c) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(r3, &(0x7f0000000480), 0x10) sysinfo(&(0x7f0000000d80)=""/201) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) shutdown(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000009c0)=ANY=[@ANYBLOB="53000000a52c53a8e8991f8cf3dd8d847ec339596db925f2dbafedc5d0d24dfc32c6c32c5cff5d0308fc39d645db5706c73719b3df928249de"], &(0x7f0000000000)=0x1) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r5 = getpgrp(0x0) migrate_pages(r5, 0x9, &(0x7f0000000040)=0x3, &(0x7f0000000080)=0xffffffff80000801) 21:38:14 executing program 3 (fault-call:4 fault-nth:39): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 264.989601] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 264.996874] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 265.004143] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 265.011413] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:15 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400300, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 265.193091] 9pnet: Insufficient options for proto=fd [ 265.207817] overlayfs: filesystem on './file0' not supported as upperdir [ 265.219747] FAULT_INJECTION: forcing a failure. [ 265.219747] name failslab, interval 1, probability 0, space 0, times 0 [ 265.231085] CPU: 1 PID: 9717 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 21:38:15 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402800, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:15 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x403a00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:15 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64, @ANYRES64], 0x155) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 265.238289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.247653] Call Trace: [ 265.250262] dump_stack+0x1c4/0x2b4 [ 265.253916] ? dump_stack_print_info.cold.2+0x52/0x52 [ 265.259134] should_fail.cold.4+0xa/0x17 [ 265.263208] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.268314] ? mark_held_locks+0x130/0x130 [ 265.272550] ? mark_held_locks+0x130/0x130 [ 265.276818] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 265.281593] ? is_bpf_text_address+0xac/0x170 [ 265.286078] ? lock_downgrade+0x900/0x900 [ 265.290222] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 265.296009] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 265.301274] ? rcu_bh_qs+0xc0/0xc0 [ 265.304809] ? unwind_dump+0x190/0x190 [ 265.308692] ? is_bpf_text_address+0xd3/0x170 [ 265.313177] __should_failslab+0x124/0x180 [ 265.317397] should_failslab+0x9/0x14 [ 265.321188] kmem_cache_alloc+0x47/0x730 [ 265.325241] ? __es_tree_search.isra.12+0x1ba/0x220 [ 265.330268] __es_insert_extent+0x30c/0x1120 [ 265.334685] ? ext4_es_free_extent+0x790/0x790 [ 265.339268] ? lock_release+0x970/0x970 [ 265.343250] ? ovl_create_real+0x225/0x410 [ 265.347482] ? ovl_workdir_create+0x564/0x820 [ 265.351965] ? ovl_mount+0x2c/0x40 [ 265.355505] ? mount_fs+0xae/0x31d [ 265.359030] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 265.363772] ? kasan_check_write+0x14/0x20 [ 265.368006] ? do_raw_write_lock+0xbd/0x1b0 [ 265.372340] ext4_es_insert_extent+0x316/0x810 [ 265.376929] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 265.382727] ? ___might_sleep+0x1ed/0x300 [ 265.386871] ? trace_hardirqs_on+0xbd/0x310 [ 265.391189] ? ext4_block_write_begin+0x1870/0x1870 [ 265.396189] ? ext4_find_extent+0x757/0x9b0 [ 265.400495] ? kasan_unpoison_shadow+0x35/0x50 [ 265.405063] ? kasan_kmalloc+0xc7/0xe0 [ 265.408949] ext4_ext_put_gap_in_cache+0x158/0x1f0 [ 265.413864] ? ext4_zeroout_es+0x160/0x160 [ 265.418085] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 265.423633] ext4_ext_map_blocks+0x256a/0x6330 [ 265.428205] ? unregister_lsm_notifier+0x20/0x20 [ 265.432947] ? ext4_init_acl+0x1d6/0x300 [ 265.436999] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 265.442008] ? block_commit_write+0x30/0x30 [ 265.446328] ? check_preemption_disabled+0x48/0x200 [ 265.451339] ? __ext4_new_inode+0xb2b/0x65b0 [ 265.455747] ? ext4_es_lookup_extent+0x446/0xde0 [ 265.460510] ? lock_downgrade+0x900/0x900 [ 265.464656] ? lock_release+0x970/0x970 [ 265.468633] ? lock_acquire+0x1ed/0x520 [ 265.472602] ? ext4_map_blocks+0x487/0x1b50 [ 265.476916] ? lock_release+0x970/0x970 [ 265.480902] ? arch_local_save_flags+0x40/0x40 [ 265.485522] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 265.491045] ? ext4_es_lookup_extent+0x499/0xde0 [ 265.495809] ? down_read+0xb0/0x1d0 [ 265.499419] ? ext4_map_blocks+0x487/0x1b50 [ 265.503735] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 265.508737] ? __down_interruptible+0x700/0x700 [ 265.513391] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 265.518390] ? ebitmap_cmp+0x227/0x2c0 [ 265.522263] ext4_map_blocks+0xe35/0x1b50 [ 265.526412] ? ext4_issue_zeroout+0x190/0x190 [ 265.530892] ext4_getblk+0x10e/0x630 [ 265.534614] ? ext4_iomap_begin+0x1390/0x1390 [ 265.539134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.544662] ? __dquot_initialize+0x629/0xdd0 [ 265.549161] ext4_bread+0x95/0x2b0 [ 265.552689] ? ext4_getblk+0x630/0x630 [ 265.556562] ? dquot_get_next_dqblk+0x180/0x180 [ 265.561239] ext4_append+0x14e/0x370 [ 265.564952] ext4_mkdir+0x532/0xe60 [ 265.568567] ? ext4_init_dot_dotdot+0x510/0x510 [ 265.573235] ? selinux_inode_mkdir+0x22/0x30 [ 265.577632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.583153] ? security_inode_mkdir+0xe8/0x120 [ 265.587724] vfs_mkdir+0x42e/0x6b0 [ 265.591256] ovl_create_real+0x225/0x410 [ 265.595308] ovl_workdir_create+0x564/0x820 [ 265.599652] ? ovl_mount_dir+0x1c0/0x1c0 [ 265.603700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.609234] ovl_fill_super+0xdd4/0x3f7b [ 265.613293] ? ovl_show_options+0x550/0x550 [ 265.617620] ? __free_pages+0x163/0x190 [ 265.621590] ? selinux_sb_copy_data+0x602/0x740 [ 265.626249] ? selinux_capable+0x36/0x40 [ 265.630295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.635828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.641355] ? get_anon_bdev+0xc0/0xc0 [ 265.645244] ? sget+0x113/0x150 [ 265.648511] ? ovl_show_options+0x550/0x550 [ 265.652817] mount_nodev+0x6b/0x110 [ 265.656459] ovl_mount+0x2c/0x40 [ 265.659814] mount_fs+0xae/0x31d [ 265.663168] vfs_kern_mount.part.35+0xdc/0x4f0 [ 265.667737] ? may_umount+0xb0/0xb0 [ 265.671350] ? _raw_read_unlock+0x2c/0x50 [ 265.675514] ? __get_fs_type+0x97/0xc0 [ 265.679390] do_mount+0x581/0x31f0 [ 265.682917] ? kasan_check_read+0x11/0x20 [ 265.687050] ? do_raw_spin_unlock+0xa7/0x2f0 [ 265.691454] ? copy_mount_string+0x40/0x40 [ 265.695673] ? kasan_check_write+0x14/0x20 [ 265.699897] ? kasan_unpoison_shadow+0x35/0x50 [ 265.704463] ? kasan_kmalloc+0xc7/0xe0 [ 265.708341] ? kmem_cache_alloc_trace+0x31f/0x750 [ 265.713173] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.718698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.724219] ? copy_mount_options+0x288/0x380 [ 265.728699] ksys_mount+0x12d/0x140 [ 265.732315] __x64_sys_mount+0xbe/0x150 [ 265.736289] do_syscall_64+0x1b9/0x820 [ 265.740170] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 265.745540] ? syscall_return_slowpath+0x5e0/0x5e0 [ 265.750461] ? trace_hardirqs_on_caller+0x310/0x310 [ 265.755462] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 265.760466] ? recalc_sigpending_tsk+0x180/0x180 [ 265.765206] ? kasan_check_write+0x14/0x20 [ 265.769441] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.774273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.779446] RIP: 0033:0x457579 21:38:15 executing program 3 (fault-call:4 fault-nth:40): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 265.782639] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.801527] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 265.809220] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 265.816491] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 265.823767] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 265.831024] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 265.838275] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:15 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(0x0, 0x1, &(0x7f0000000fc0)=[&(0x7f0000000f80)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000d40), 0x0, 0x0, 0x0, 0x1, r1}]) r2 = accept4(r1, &(0x7f0000000a00)=@generic, &(0x7f0000000500)=0x80, 0x2) getpeername$inet6(r2, &(0x7f00000008c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000980)=0x1c) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(r3, &(0x7f0000000480), 0x10) sysinfo(&(0x7f0000000d80)=""/201) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) shutdown(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000009c0)=ANY=[@ANYBLOB="53000000a52c53a8e8991f8cf3dd8d847ec339596db925f2dbafedc5d0d24dfc32c6c32c5cff5d0308fc39d645db5706c73719b3df928249de"], &(0x7f0000000000)=0x1) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) r5 = getpgrp(0x0) migrate_pages(r5, 0x9, &(0x7f0000000040)=0x3, &(0x7f0000000080)=0xffffffff80000801) [ 265.970691] FAULT_INJECTION: forcing a failure. [ 265.970691] name failslab, interval 1, probability 0, space 0, times 0 [ 265.985454] overlayfs: filesystem on './file0' not supported as upperdir [ 265.995651] 9pnet: Insufficient options for proto=fd 21:38:15 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4003ca, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:15 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64], 0x14d) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:15 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x100000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 266.014944] CPU: 1 PID: 9733 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 266.022156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.031512] Call Trace: [ 266.034122] dump_stack+0x1c4/0x2b4 [ 266.037765] ? dump_stack_print_info.cold.2+0x52/0x52 [ 266.042977] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 266.048277] should_fail.cold.4+0xa/0x17 [ 266.052353] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.057471] ? __kernel_text_address+0xd/0x40 [ 266.061981] ? unwind_get_return_address+0x61/0xa0 [ 266.066927] ? __save_stack_trace+0x8d/0xf0 [ 266.071271] ? mark_held_locks+0x130/0x130 [ 266.075516] ? save_stack+0xa9/0xd0 [ 266.075530] ? save_stack+0x43/0xd0 [ 266.075542] ? __kasan_slab_free+0x102/0x150 [ 266.075555] ? kasan_slab_free+0xe/0x10 [ 266.075588] ? kmem_cache_free+0x83/0x290 [ 266.082832] ? jbd2_journal_stop+0x430/0x15d0 [ 266.082848] ? __ext4_journal_stop+0xde/0x1f0 [ 266.082865] ? ext4_mkdir+0xa2c/0xe60 [ 266.082878] ? vfs_mkdir+0x42e/0x6b0 [ 266.082893] ? ovl_create_real+0x225/0x410 [ 266.082914] ? ovl_workdir_create+0x564/0x820 21:38:15 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40f903, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 266.091275] ? ovl_fill_super+0xdd4/0x3f7b [ 266.091290] ? mount_nodev+0x6b/0x110 [ 266.091303] ? ovl_mount+0x2c/0x40 [ 266.091317] ? mount_fs+0xae/0x31d [ 266.091339] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 266.099985] ? ksys_mount+0x12d/0x140 [ 266.099998] ? __x64_sys_mount+0xbe/0x150 [ 266.100015] ? do_syscall_64+0x1b9/0x820 [ 266.100032] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.100054] ? ___might_sleep+0x1ed/0x300 [ 266.108333] ? arch_local_save_flags+0x40/0x40 [ 266.108352] ? trace_hardirqs_off+0xb8/0x310 [ 266.108371] __should_failslab+0x124/0x180 [ 266.108394] should_failslab+0x9/0x14 [ 266.120819] kmem_cache_alloc+0x2be/0x730 [ 266.120837] ? lock_release+0x970/0x970 [ 266.120853] ? arch_local_save_flags+0x40/0x40 [ 266.120877] jbd2__journal_start+0x1e7/0xa90 [ 266.135964] ? arch_local_save_flags+0x40/0x40 [ 266.135985] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 266.136000] ? lock_downgrade+0x900/0x900 [ 266.136023] ? __might_sleep+0x95/0x190 [ 266.144569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.144599] __ext4_journal_start_sb+0x1a5/0x5f0 [ 266.144615] ? ext4_set_acl+0x264/0x5a0 [ 266.144633] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 266.144647] ? up_read+0x1a/0x110 [ 266.144665] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 266.144686] ? ext4_xattr_set_credits+0xe5/0x120 [ 266.144706] ext4_set_acl+0x264/0x5a0 [ 266.152903] ? ext4_get_acl+0x730/0x730 [ 266.152921] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 266.152939] ? ___might_sleep+0x1ed/0x300 [ 266.152956] ? arch_local_save_flags+0x40/0x40 [ 266.152976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.152994] ? evm_protected_xattr+0x206/0x290 [ 266.153013] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 266.162511] set_posix_acl+0x22f/0x2e0 [ 266.162531] posix_acl_xattr_set+0x109/0x140 [ 266.162548] __vfs_removexattr+0x10f/0x170 [ 266.162565] ? posix_acl_from_xattr+0x5c0/0x5c0 [ 266.162589] ? __vfs_getxattr+0x150/0x150 [ 266.162606] ? evm_inode_removexattr+0x47/0x60 [ 266.162626] vfs_removexattr+0xb4/0x1e0 [ 266.162645] ? ovl_create_real+0xe0/0x410 [ 266.171618] ovl_workdir_create+0x597/0x820 [ 266.171639] ? ovl_mount_dir+0x1c0/0x1c0 [ 266.171654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.171693] ovl_fill_super+0xdd4/0x3f7b [ 266.192390] ? ovl_show_options+0x550/0x550 [ 266.192407] ? __free_pages+0x163/0x190 [ 266.192427] ? selinux_sb_copy_data+0x602/0x740 [ 266.192449] ? selinux_capable+0x36/0x40 [ 266.192467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.192491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.364383] ? get_anon_bdev+0xc0/0xc0 [ 266.368258] ? sget+0x113/0x150 [ 266.371523] ? ovl_show_options+0x550/0x550 [ 266.375834] mount_nodev+0x6b/0x110 [ 266.379458] ovl_mount+0x2c/0x40 [ 266.382811] mount_fs+0xae/0x31d [ 266.386171] vfs_kern_mount.part.35+0xdc/0x4f0 [ 266.390739] ? may_umount+0xb0/0xb0 [ 266.394351] ? _raw_read_unlock+0x2c/0x50 [ 266.398488] ? __get_fs_type+0x97/0xc0 [ 266.402362] do_mount+0x581/0x31f0 [ 266.405902] ? copy_mount_string+0x40/0x40 [ 266.410134] ? kasan_unpoison_shadow+0x35/0x50 [ 266.414709] ? kasan_kmalloc+0xc7/0xe0 [ 266.418611] ? kmem_cache_alloc_trace+0x31f/0x750 [ 266.423441] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 266.428965] ? _copy_from_user+0xdf/0x150 [ 266.433104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.438629] ? copy_mount_options+0x288/0x380 [ 266.443116] ksys_mount+0x12d/0x140 [ 266.446744] __x64_sys_mount+0xbe/0x150 [ 266.450710] do_syscall_64+0x1b9/0x820 [ 266.454598] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.459963] ? syscall_return_slowpath+0x5e0/0x5e0 [ 266.464878] ? trace_hardirqs_on_caller+0x310/0x310 [ 266.469882] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 266.474886] ? recalc_sigpending_tsk+0x180/0x180 [ 266.479629] ? kasan_check_write+0x14/0x20 [ 266.483852] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.488684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.493856] RIP: 0033:0x457579 [ 266.497037] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.515920] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 266.523614] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 266.530870] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 266.538137] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 266.545388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 266.552640] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:16 executing program 3 (fault-call:4 fault-nth:41): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x210000, 0x0) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000200)) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) io_setup(0x2005, &(0x7f0000000100)=0x0) r3 = socket$inet6(0xa, 0x1ffffffffffffffd, 0x0) bind$inet6(r3, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) getrlimit(0x2, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x4000, @dev={0xac, 0x14, 0x14, 0x234e}, [0xf401000000000000, 0x300000000000000, 0x0, 0x0, 0x4000000]}}}, 0x98) socket$netlink(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000030000000000000000000000", 0x10}]) [ 266.568323] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only 21:38:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x210000, 0x0) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000200)) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) io_setup(0x2005, &(0x7f0000000100)=0x0) r3 = socket$inet6(0xa, 0x1ffffffffffffffd, 0x0) bind$inet6(r3, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) getrlimit(0x2, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x4000, @dev={0xac, 0x14, 0x14, 0x234e}, [0xf401000000000000, 0x300000000000000, 0x0, 0x0, 0x4000000]}}}, 0x98) socket$netlink(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000030000000000000000000000", 0x10}]) 21:38:16 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4003cc, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 266.743257] 9pnet: Insufficient options for proto=fd [ 266.746311] FAULT_INJECTION: forcing a failure. [ 266.746311] name failslab, interval 1, probability 0, space 0, times 0 [ 266.785062] CPU: 0 PID: 9761 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 266.792275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.801632] Call Trace: [ 266.804247] dump_stack+0x1c4/0x2b4 [ 266.807886] ? dump_stack_print_info.cold.2+0x52/0x52 [ 266.813110] should_fail.cold.4+0xa/0x17 [ 266.817189] ? block_commit_write+0x30/0x30 [ 266.821515] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.826616] ? try_to_free_buffers+0xc80/0xc80 [ 266.831201] ? lock_downgrade+0x900/0x900 21:38:16 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64], 0x14d) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:16 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x80ffff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:16 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402c00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 266.835366] ? ext4_es_free_extent+0x790/0x790 [ 266.839962] ? ___might_sleep+0x1ed/0x300 [ 266.844126] ? lock_release+0x970/0x970 [ 266.848111] ? arch_local_save_flags+0x40/0x40 [ 266.848132] ? do_raw_write_trylock+0x1c0/0x1c0 [ 266.848153] ? __might_sleep+0x95/0x190 [ 266.857390] ? ___might_sleep+0x1ed/0x300 [ 266.857408] ? arch_local_save_flags+0x40/0x40 [ 266.857431] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 266.875915] __should_failslab+0x124/0x180 21:38:16 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400060, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 266.879666] overlayfs: filesystem on './file0' not supported as upperdir [ 266.880165] should_failslab+0x9/0x14 [ 266.880184] kmem_cache_alloc+0x2be/0x730 [ 266.880217] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 266.899988] ? ext4_data_block_valid+0x28b/0x330 [ 266.904757] jbd2_journal_add_journal_head+0x21a/0x670 [ 266.910045] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 266.915594] ? jbd2_journal_write_metadata_buffer+0xf30/0xf30 [ 266.921502] ? ___might_sleep+0x1ed/0x300 [ 266.925677] jbd2_journal_get_create_access+0x42/0x670 [ 266.930957] __ext4_journal_get_create_access+0x46/0x90 [ 266.936314] ext4_getblk+0x2b9/0x630 [ 266.940030] ? ext4_iomap_begin+0x1390/0x1390 [ 266.944513] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.950035] ? __dquot_initialize+0x629/0xdd0 [ 266.954525] ext4_bread+0x95/0x2b0 [ 266.958055] ? ext4_getblk+0x630/0x630 [ 266.961928] ? dquot_get_next_dqblk+0x180/0x180 [ 266.966595] ext4_append+0x14e/0x370 [ 266.970311] ext4_mkdir+0x532/0xe60 [ 266.973945] ? ext4_init_dot_dotdot+0x510/0x510 [ 266.978613] ? selinux_inode_mkdir+0x22/0x30 [ 266.983008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.988533] ? security_inode_mkdir+0xe8/0x120 [ 266.993108] vfs_mkdir+0x42e/0x6b0 [ 266.996638] ovl_create_real+0x225/0x410 [ 267.000702] ovl_workdir_create+0x564/0x820 [ 267.005023] ? ovl_mount_dir+0x1c0/0x1c0 [ 267.009074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.014618] ovl_fill_super+0xdd4/0x3f7b [ 267.018671] ? ovl_show_options+0x550/0x550 [ 267.022979] ? __free_pages+0x163/0x190 [ 267.026942] ? selinux_sb_copy_data+0x602/0x740 [ 267.031610] ? selinux_capable+0x36/0x40 [ 267.035658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.041186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.046711] ? get_anon_bdev+0xc0/0xc0 [ 267.050633] ? sget+0x113/0x150 [ 267.053918] ? ovl_show_options+0x550/0x550 [ 267.058233] mount_nodev+0x6b/0x110 [ 267.061950] ovl_mount+0x2c/0x40 [ 267.065319] mount_fs+0xae/0x31d [ 267.068678] vfs_kern_mount.part.35+0xdc/0x4f0 [ 267.073247] ? may_umount+0xb0/0xb0 [ 267.076862] ? _raw_read_unlock+0x2c/0x50 [ 267.080997] ? __get_fs_type+0x97/0xc0 [ 267.084874] do_mount+0x581/0x31f0 [ 267.088404] ? copy_mount_string+0x40/0x40 [ 267.092628] ? kasan_unpoison_shadow+0x35/0x50 [ 267.097201] ? kasan_kmalloc+0xc7/0xe0 [ 267.101081] ? kmem_cache_alloc_trace+0x31f/0x750 [ 267.105911] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 267.111435] ? _copy_from_user+0xdf/0x150 [ 267.115570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.121104] ? copy_mount_options+0x288/0x380 [ 267.125595] ksys_mount+0x12d/0x140 [ 267.129213] __x64_sys_mount+0xbe/0x150 [ 267.133173] do_syscall_64+0x1b9/0x820 [ 267.137053] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.142416] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.147351] ? trace_hardirqs_on_caller+0x310/0x310 [ 267.152357] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.157359] ? recalc_sigpending_tsk+0x180/0x180 [ 267.162103] ? kasan_check_write+0x14/0x20 [ 267.166326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.171157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.176341] RIP: 0033:0x457579 [ 267.179532] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.198419] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 267.206111] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 267.213366] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 267.220626] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 267.227881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 21:38:17 executing program 3 (fault-call:4 fault-nth:42): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 267.235140] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 267.243628] ENOMEM in journal_alloc_journal_head, retrying. 21:38:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x210000, 0x0) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000200)) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) io_setup(0x2005, &(0x7f0000000100)=0x0) r3 = socket$inet6(0xa, 0x1ffffffffffffffd, 0x0) bind$inet6(r3, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) getrlimit(0x2, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x4000, @dev={0xac, 0x14, 0x14, 0x234e}, [0xf401000000000000, 0x300000000000000, 0x0, 0x0, 0x4000000]}}}, 0x98) socket$netlink(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000030000000000000000000000", 0x10}]) [ 267.347023] 9pnet: Insufficient options for proto=fd 21:38:17 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a", @ANYRES64], 0x14d) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:17 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400008, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:17 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40f000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:17 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401526, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 267.407478] overlayfs: filesystem on './file0' not supported as upperdir [ 267.437072] FAULT_INJECTION: forcing a failure. [ 267.437072] name failslab, interval 1, probability 0, space 0, times 0 [ 267.449594] CPU: 1 PID: 9793 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 267.456803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.466159] Call Trace: [ 267.468739] dump_stack+0x1c4/0x2b4 [ 267.472356] ? dump_stack_print_info.cold.2+0x52/0x52 [ 267.477564] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 267.482837] should_fail.cold.4+0xa/0x17 [ 267.486944] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.492037] ? __kernel_text_address+0xd/0x40 [ 267.496520] ? unwind_get_return_address+0x61/0xa0 [ 267.501623] ? __save_stack_trace+0x8d/0xf0 [ 267.505948] ? mark_held_locks+0x130/0x130 [ 267.510167] ? save_stack+0xa9/0xd0 [ 267.513783] ? save_stack+0x43/0xd0 [ 267.517406] ? __kasan_slab_free+0x102/0x150 [ 267.521797] ? kasan_slab_free+0xe/0x10 [ 267.525759] ? kmem_cache_free+0x83/0x290 [ 267.529892] ? jbd2_journal_stop+0x430/0x15d0 [ 267.534372] ? __ext4_journal_stop+0xde/0x1f0 [ 267.538853] ? ext4_mkdir+0xa2c/0xe60 [ 267.542636] ? vfs_mkdir+0x42e/0x6b0 [ 267.546335] ? ovl_create_real+0x225/0x410 [ 267.550557] ? ovl_workdir_create+0x564/0x820 [ 267.555054] ? ovl_fill_super+0xdd4/0x3f7b [ 267.559271] ? mount_nodev+0x6b/0x110 [ 267.563072] ? ovl_mount+0x2c/0x40 [ 267.566612] ? mount_fs+0xae/0x31d [ 267.570137] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 267.574927] ? ksys_mount+0x12d/0x140 [ 267.578713] ? __x64_sys_mount+0xbe/0x150 [ 267.582867] ? do_syscall_64+0x1b9/0x820 [ 267.586916] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.592288] ? ___might_sleep+0x1ed/0x300 [ 267.596420] ? arch_local_save_flags+0x40/0x40 [ 267.600988] ? trace_hardirqs_off+0xb8/0x310 [ 267.605381] __should_failslab+0x124/0x180 [ 267.609608] should_failslab+0x9/0x14 [ 267.613399] kmem_cache_alloc+0x2be/0x730 [ 267.617544] ? lock_release+0x970/0x970 [ 267.621499] ? arch_local_save_flags+0x40/0x40 [ 267.626079] jbd2__journal_start+0x1e7/0xa90 [ 267.630498] ? arch_local_save_flags+0x40/0x40 [ 267.635112] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 267.640805] ? lock_downgrade+0x900/0x900 [ 267.644953] ? __might_sleep+0x95/0x190 [ 267.648929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.654450] __ext4_journal_start_sb+0x1a5/0x5f0 [ 267.659202] ? ext4_set_acl+0x264/0x5a0 [ 267.663166] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 267.668860] ? up_read+0x1a/0x110 [ 267.672300] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 267.677736] ? ext4_xattr_set_credits+0xe5/0x120 [ 267.682478] ext4_set_acl+0x264/0x5a0 [ 267.686265] ? ext4_get_acl+0x730/0x730 [ 267.690221] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 267.694810] ? ___might_sleep+0x1ed/0x300 [ 267.698959] ? arch_local_save_flags+0x40/0x40 [ 267.703545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.709068] ? evm_protected_xattr+0x206/0x290 [ 267.713645] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 267.718663] set_posix_acl+0x22f/0x2e0 [ 267.722548] posix_acl_xattr_set+0x109/0x140 [ 267.726972] __vfs_removexattr+0x10f/0x170 [ 267.731199] ? posix_acl_from_xattr+0x5c0/0x5c0 [ 267.735862] ? __vfs_getxattr+0x150/0x150 [ 267.739999] ? evm_inode_removexattr+0x47/0x60 [ 267.744587] vfs_removexattr+0xb4/0x1e0 [ 267.748554] ? ovl_create_real+0xe0/0x410 [ 267.752695] ovl_workdir_create+0x597/0x820 [ 267.757007] ? ovl_mount_dir+0x1c0/0x1c0 [ 267.761050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.766586] ovl_fill_super+0xdd4/0x3f7b [ 267.770643] ? ovl_show_options+0x550/0x550 [ 267.774951] ? __free_pages+0x163/0x190 [ 267.778915] ? selinux_sb_copy_data+0x602/0x740 [ 267.783588] ? selinux_capable+0x36/0x40 [ 267.787640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.793176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.798703] ? get_anon_bdev+0xc0/0xc0 [ 267.802583] ? sget+0x113/0x150 [ 267.805860] ? ovl_show_options+0x550/0x550 [ 267.810178] mount_nodev+0x6b/0x110 [ 267.813805] ovl_mount+0x2c/0x40 [ 267.817155] mount_fs+0xae/0x31d [ 267.820530] vfs_kern_mount.part.35+0xdc/0x4f0 [ 267.825108] ? may_umount+0xb0/0xb0 [ 267.828722] ? _raw_read_unlock+0x2c/0x50 [ 267.832856] ? __get_fs_type+0x97/0xc0 [ 267.836741] do_mount+0x581/0x31f0 [ 267.840300] ? copy_mount_string+0x40/0x40 [ 267.844535] ? kasan_unpoison_shadow+0x35/0x50 [ 267.849130] ? kasan_kmalloc+0xc7/0xe0 [ 267.853006] ? kmem_cache_alloc_trace+0x31f/0x750 [ 267.857851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 267.863405] ? _copy_from_user+0xdf/0x150 [ 267.867555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.873083] ? copy_mount_options+0x288/0x380 [ 267.877568] ksys_mount+0x12d/0x140 [ 267.881196] __x64_sys_mount+0xbe/0x150 [ 267.885158] do_syscall_64+0x1b9/0x820 [ 267.889051] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.894401] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.899334] ? trace_hardirqs_on_caller+0x310/0x310 [ 267.904338] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.909343] ? recalc_sigpending_tsk+0x180/0x180 [ 267.914085] ? kasan_check_write+0x14/0x20 [ 267.918311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.923142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.928318] RIP: 0033:0x457579 [ 267.931499] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.950384] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:38:17 executing program 3 (fault-call:4 fault-nth:43): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 267.958077] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 267.965334] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 267.972597] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 267.979852] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 267.987113] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 267.996221] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only 21:38:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x6) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 268.119469] 9pnet: Insufficient options for proto=fd [ 268.128184] ovl_get_fh: 22 callbacks suppressed [ 268.128195] overlayfs: invalid origin (7900) [ 268.130661] FAULT_INJECTION: forcing a failure. [ 268.130661] name failslab, interval 1, probability 0, space 0, times 0 [ 268.139941] overlayfs: invalid origin (7900) [ 268.158521] overlayfs: invalid origin (7900) 21:38:18 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400804, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:18 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400480, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 268.159552] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. [ 268.179621] overlayfs: invalid origin (7900) [ 268.196379] overlayfs: filesystem on './file0' not supported as upperdir [ 268.203852] CPU: 1 PID: 9804 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 21:38:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x8, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x7, {{0x2, 0x0, @multicast1}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000), &(0x7f0000000000)=0x369) 21:38:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 268.211056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.220409] Call Trace: [ 268.223019] dump_stack+0x1c4/0x2b4 [ 268.226664] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.231886] should_fail.cold.4+0xa/0x17 [ 268.235964] ? block_commit_write+0x30/0x30 [ 268.240302] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.245426] ? try_to_free_buffers+0xc80/0xc80 [ 268.250020] ? lock_downgrade+0x900/0x900 [ 268.254179] ? ext4_es_free_extent+0x790/0x790 [ 268.258783] ? ___might_sleep+0x1ed/0x300 [ 268.262945] ? lock_release+0x970/0x970 21:38:18 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB="373b4128859d609afbe2c8d75bd6de47460c66b1c8fdb36c97999d4771dcc630103e176456f6460545ca131584be01410be007646d5d7f5b74de0944ec08e0d510fa9e90f389f4f61605b7550de023fc205f3aae5394ab914ec8cc20c9e6a9ed1821eb2a9a"], 0x145) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:18 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x403f00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 268.266929] ? arch_local_save_flags+0x40/0x40 [ 268.271525] ? do_raw_write_trylock+0x1c0/0x1c0 [ 268.276210] ? __might_sleep+0x95/0x190 [ 268.280203] ? ___might_sleep+0x1ed/0x300 [ 268.284363] ? arch_local_save_flags+0x40/0x40 [ 268.288964] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 268.294775] __should_failslab+0x124/0x180 [ 268.299023] should_failslab+0x9/0x14 [ 268.302837] kmem_cache_alloc+0x2be/0x730 [ 268.306997] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 268.312021] ? ext4_data_block_valid+0x28b/0x330 21:38:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 268.316807] jbd2_journal_add_journal_head+0x21a/0x670 [ 268.322098] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 268.327660] ? jbd2_journal_write_metadata_buffer+0xf30/0xf30 [ 268.333563] ? ___might_sleep+0x1ed/0x300 [ 268.337746] jbd2_journal_get_create_access+0x42/0x670 [ 268.343049] __ext4_journal_get_create_access+0x46/0x90 [ 268.348428] ext4_getblk+0x2b9/0x630 [ 268.352153] ? ext4_iomap_begin+0x1390/0x1390 [ 268.356665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.362214] ? __dquot_initialize+0x629/0xdd0 [ 268.366729] ext4_bread+0x95/0x2b0 [ 268.370283] ? ext4_getblk+0x630/0x630 [ 268.374185] ? dquot_get_next_dqblk+0x180/0x180 [ 268.374209] ext4_append+0x14e/0x370 [ 268.374230] ext4_mkdir+0x532/0xe60 [ 268.374252] ? ext4_init_dot_dotdot+0x510/0x510 [ 268.382629] ? selinux_inode_mkdir+0x22/0x30 [ 268.382645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.382667] ? security_inode_mkdir+0xe8/0x120 [ 268.405447] vfs_mkdir+0x42e/0x6b0 [ 268.409003] ovl_create_real+0x225/0x410 [ 268.413078] ovl_workdir_create+0x564/0x820 [ 268.417422] ? ovl_mount_dir+0x1c0/0x1c0 [ 268.421500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.427061] ovl_fill_super+0xdd4/0x3f7b [ 268.431163] ? ovl_show_options+0x550/0x550 [ 268.435501] ? __free_pages+0x163/0x190 [ 268.435521] ? selinux_sb_copy_data+0x602/0x740 [ 268.435543] ? selinux_capable+0x36/0x40 [ 268.435564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.444214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.459332] ? get_anon_bdev+0xc0/0xc0 [ 268.463230] ? sget+0x113/0x150 [ 268.466523] ? ovl_show_options+0x550/0x550 [ 268.470859] mount_nodev+0x6b/0x110 [ 268.474494] ovl_mount+0x2c/0x40 [ 268.477872] mount_fs+0xae/0x31d [ 268.481239] vfs_kern_mount.part.35+0xdc/0x4f0 [ 268.485837] ? may_umount+0xb0/0xb0 [ 268.489479] ? _raw_read_unlock+0x2c/0x50 [ 268.493633] ? __get_fs_type+0x97/0xc0 [ 268.493651] do_mount+0x581/0x31f0 [ 268.493666] ? kasan_check_read+0x11/0x20 [ 268.493683] ? do_raw_spin_unlock+0xa7/0x2f0 [ 268.493701] ? copy_mount_string+0x40/0x40 [ 268.513892] ? kasan_check_write+0x14/0x20 [ 268.518129] ? kasan_unpoison_shadow+0x35/0x50 [ 268.522716] ? kasan_kmalloc+0xc7/0xe0 [ 268.526596] ? kmem_cache_alloc_trace+0x31f/0x750 [ 268.531427] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 268.536951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.542473] ? copy_mount_options+0x288/0x380 [ 268.546953] ksys_mount+0x12d/0x140 [ 268.550562] __x64_sys_mount+0xbe/0x150 [ 268.554531] do_syscall_64+0x1b9/0x820 [ 268.558401] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 268.563749] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.568668] ? trace_hardirqs_on_caller+0x310/0x310 [ 268.573669] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 268.578668] ? recalc_sigpending_tsk+0x180/0x180 [ 268.583407] ? kasan_check_write+0x14/0x20 [ 268.587630] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.592460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.597663] RIP: 0033:0x457579 [ 268.600842] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:38:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 268.619727] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 268.627417] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 268.634670] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 268.641920] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 268.649171] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 268.656424] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 268.666300] ENOMEM in journal_alloc_journal_head, retrying. 21:38:18 executing program 3 (fault-call:4 fault-nth:44): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 268.672929] overlayfs: invalid origin (7900) [ 268.798774] overlayfs: invalid origin (7900) [ 268.804042] overlayfs: invalid origin (7900) [ 268.815308] FAULT_INJECTION: forcing a failure. [ 268.815308] name failslab, interval 1, probability 0, space 0, times 0 [ 268.815937] overlayfs: invalid origin (7900) [ 268.831304] CPU: 0 PID: 9849 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 268.831923] overlayfs: filesystem on './file0' not supported as upperdir [ 268.838507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.838514] Call Trace: [ 268.838541] dump_stack+0x1c4/0x2b4 [ 268.838569] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.838610] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 268.838640] should_fail.cold.4+0xa/0x17 [ 268.866330] 9pnet: Insufficient options for proto=fd [ 268.871433] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.871452] ? __kernel_text_address+0xd/0x40 [ 268.871474] ? unwind_get_return_address+0x61/0xa0 21:38:18 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402642, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:18 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:18 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4003d6, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:18 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16"], 0xe0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 268.880271] overlayfs: invalid origin (7900) [ 268.880642] ? __save_stack_trace+0x8d/0xf0 [ 268.903849] ? mark_held_locks+0x130/0x130 [ 268.908105] ? save_stack+0xa9/0xd0 [ 268.911738] ? save_stack+0x43/0xd0 [ 268.915369] ? __kasan_slab_free+0x102/0x150 [ 268.919793] ? kasan_slab_free+0xe/0x10 [ 268.923793] ? kmem_cache_free+0x83/0x290 [ 268.927942] ? jbd2_journal_stop+0x430/0x15d0 [ 268.932441] ? __ext4_journal_stop+0xde/0x1f0 [ 268.936948] ? ext4_mkdir+0xa2c/0xe60 [ 268.940788] ? vfs_mkdir+0x42e/0x6b0 [ 268.944495] ? ovl_create_real+0x225/0x410 [ 268.948725] ? ovl_workdir_create+0x564/0x820 [ 268.953213] ? ovl_fill_super+0xdd4/0x3f7b [ 268.957479] ? mount_nodev+0x6b/0x110 [ 268.961292] ? ovl_mount+0x2c/0x40 [ 268.964812] ? mount_fs+0xae/0x31d [ 268.968335] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 268.973099] ? ksys_mount+0x12d/0x140 [ 268.976901] ? __x64_sys_mount+0xbe/0x150 [ 268.981034] ? do_syscall_64+0x1b9/0x820 [ 268.985085] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.990461] ? ___might_sleep+0x1ed/0x300 [ 268.994615] ? arch_local_save_flags+0x40/0x40 [ 268.999195] ? trace_hardirqs_off+0xb8/0x310 [ 269.003621] __should_failslab+0x124/0x180 [ 269.007842] should_failslab+0x9/0x14 [ 269.011638] kmem_cache_alloc+0x2be/0x730 [ 269.015803] ? lock_release+0x970/0x970 [ 269.019765] ? arch_local_save_flags+0x40/0x40 [ 269.024351] jbd2__journal_start+0x1e7/0xa90 [ 269.028746] ? arch_local_save_flags+0x40/0x40 [ 269.033313] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 269.039006] ? lock_downgrade+0x900/0x900 [ 269.043140] ? __might_sleep+0x95/0x190 [ 269.047112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.052641] __ext4_journal_start_sb+0x1a5/0x5f0 [ 269.057397] ? ext4_set_acl+0x264/0x5a0 [ 269.061355] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 269.067061] ? up_read+0x1a/0x110 [ 269.070503] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 269.075939] ? ext4_xattr_set_credits+0xe5/0x120 [ 269.080693] ext4_set_acl+0x264/0x5a0 [ 269.084478] ? ext4_get_acl+0x730/0x730 [ 269.088448] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 269.093018] ? ___might_sleep+0x1ed/0x300 [ 269.097161] ? arch_local_save_flags+0x40/0x40 [ 269.101728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.107249] ? evm_protected_xattr+0x206/0x290 [ 269.111815] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 269.116819] set_posix_acl+0x22f/0x2e0 [ 269.120694] posix_acl_xattr_set+0x109/0x140 [ 269.125091] __vfs_removexattr+0x10f/0x170 [ 269.129320] ? posix_acl_from_xattr+0x5c0/0x5c0 [ 269.133983] ? __vfs_getxattr+0x150/0x150 [ 269.138129] ? evm_inode_removexattr+0x47/0x60 [ 269.142711] vfs_removexattr+0xb4/0x1e0 [ 269.146692] ? ovl_create_real+0xe0/0x410 [ 269.150827] ovl_workdir_create+0x597/0x820 [ 269.155134] ? ovl_mount_dir+0x1c0/0x1c0 [ 269.159191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.164717] ovl_fill_super+0xdd4/0x3f7b [ 269.168770] ? ovl_show_options+0x550/0x550 [ 269.173075] ? __free_pages+0x163/0x190 [ 269.177039] ? selinux_sb_copy_data+0x602/0x740 [ 269.181721] ? selinux_capable+0x36/0x40 [ 269.185782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.191306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.196829] ? get_anon_bdev+0xc0/0xc0 [ 269.200703] ? sget+0x113/0x150 [ 269.203978] ? ovl_show_options+0x550/0x550 [ 269.208297] mount_nodev+0x6b/0x110 [ 269.211909] ovl_mount+0x2c/0x40 [ 269.215261] mount_fs+0xae/0x31d [ 269.218623] vfs_kern_mount.part.35+0xdc/0x4f0 [ 269.223202] ? may_umount+0xb0/0xb0 [ 269.226816] ? _raw_read_unlock+0x2c/0x50 [ 269.230947] ? __get_fs_type+0x97/0xc0 [ 269.234819] do_mount+0x581/0x31f0 [ 269.238343] ? kasan_check_read+0x11/0x20 [ 269.242474] ? do_raw_spin_unlock+0xa7/0x2f0 [ 269.246863] ? copy_mount_string+0x40/0x40 [ 269.251080] ? kasan_check_write+0x14/0x20 [ 269.255310] ? kasan_unpoison_shadow+0x35/0x50 [ 269.259874] ? kasan_kmalloc+0xc7/0xe0 [ 269.263748] ? kmem_cache_alloc_trace+0x31f/0x750 [ 269.268593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.274159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.279702] ? copy_mount_options+0x288/0x380 [ 269.284189] ksys_mount+0x12d/0x140 [ 269.287803] __x64_sys_mount+0xbe/0x150 [ 269.291764] do_syscall_64+0x1b9/0x820 [ 269.295633] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 269.300980] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.305892] ? trace_hardirqs_on_caller+0x310/0x310 [ 269.310920] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.315920] ? recalc_sigpending_tsk+0x180/0x180 [ 269.320659] ? kasan_check_write+0x14/0x20 [ 269.324884] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.329728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.334931] RIP: 0033:0x457579 [ 269.338112] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.356996] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 269.364698] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 269.371950] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 269.379216] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 269.386486] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 269.393753] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:19 executing program 3 (fault-call:4 fault-nth:45): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 269.404784] overlayfs: failed to create directory ./file1\/work (errno: 12); mounting read-only 21:38:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 269.550353] FAULT_INJECTION: forcing a failure. [ 269.550353] name failslab, interval 1, probability 0, space 0, times 0 [ 269.584639] overlayfs: invalid origin (7900) [ 269.585469] 9pnet: Insufficient options for proto=fd [ 269.591355] CPU: 1 PID: 9872 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 269.601425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.611275] Call Trace: [ 269.613881] dump_stack+0x1c4/0x2b4 [ 269.617521] ? dump_stack_print_info.cold.2+0x52/0x52 [ 269.622718] ? __find_get_block+0x3be/0xf20 [ 269.627048] ? __kernel_text_address+0xd/0x40 [ 269.631565] should_fail.cold.4+0xa/0x17 [ 269.635650] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.640770] ? is_bpf_text_address+0xac/0x170 [ 269.645279] ? kasan_check_read+0x11/0x20 21:38:19 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402c00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:19 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16"], 0xe0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:19 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400028, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:19 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400007, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 269.649441] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 269.654724] ? rcu_bh_qs+0xc0/0xc0 [ 269.658285] ? unwind_dump+0x190/0x190 [ 269.660620] overlayfs: filesystem on './file0' not supported as upperdir [ 269.662183] ? is_bpf_text_address+0xd3/0x170 [ 269.662212] ? kernel_text_address+0x79/0xf0 [ 269.662228] ? unwind_get_return_address+0x61/0xa0 [ 269.662246] ? ___might_sleep+0x1ed/0x300 [ 269.662262] ? arch_local_save_flags+0x40/0x40 [ 269.662283] __should_failslab+0x124/0x180 [ 269.662298] should_failslab+0x9/0x14 [ 269.662314] kmem_cache_alloc+0x2be/0x730 [ 269.662330] ? set_posix_acl+0x22f/0x2e0 [ 269.662351] ? posix_acl_xattr_set+0x109/0x140 [ 269.712391] ? __vfs_removexattr+0x10f/0x170 [ 269.716783] ? vfs_removexattr+0xb4/0x1e0 [ 269.720917] ? ovl_workdir_create+0x5f0/0x820 [ 269.725395] ? ovl_fill_super+0xdd4/0x3f7b [ 269.729616] ? mount_nodev+0x6b/0x110 [ 269.733397] ? ovl_mount+0x2c/0x40 [ 269.736930] jbd2__journal_start+0x1e7/0xa90 [ 269.741338] ? arch_local_save_flags+0x40/0x40 [ 269.745908] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 269.751606] ? __might_sleep+0x95/0x190 [ 269.755563] ? trace_hardirqs_on+0x310/0x310 [ 269.759967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.765493] __ext4_journal_start_sb+0x1a5/0x5f0 [ 269.770243] ? ext4_dirty_inode+0x62/0xc0 [ 269.774377] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 269.780075] ? mark_held_locks+0x130/0x130 [ 269.784291] ? __kasan_slab_free+0x119/0x150 [ 269.788705] ? jbd2_journal_stop+0x430/0x15d0 [ 269.793187] ? kmem_cache_free+0x21a/0x290 [ 269.797414] ? ext4_setattr+0x28f0/0x28f0 [ 269.801555] ext4_dirty_inode+0x62/0xc0 [ 269.805523] __mark_inode_dirty+0x7c3/0x1510 [ 269.809918] ? __inode_attach_wb+0x13f0/0x13f0 [ 269.814488] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 269.820297] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 269.825817] ? jbd2__journal_start+0x162/0xa90 [ 269.830386] ? mark_held_locks+0x130/0x130 [ 269.834618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.840143] ? avc_has_perm+0x55f/0x7e0 [ 269.844100] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 269.849125] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 269.854131] ? in_group_p+0x245/0x2d0 [ 269.857917] ? set_current_groups+0x50/0x50 [ 269.862235] ? set_cached_acl+0xb9/0x100 [ 269.866297] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 269.871344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.876868] ext4_setattr+0x115a/0x28f0 [ 269.880838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.886360] ? ext4_journalled_write_end+0x1680/0x1680 [ 269.891625] ? selinux_inode_setattr+0x308/0x450 [ 269.896367] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 269.901543] ? selinux_inode_removexattr+0x240/0x240 [ 269.906629] ? inode_init_owner+0x340/0x340 [ 269.910935] ? lock_acquire+0x1ed/0x520 [ 269.914894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.920416] ? evm_verify_current_integrity+0x8c/0xf0 [ 269.925593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.931137] ? evm_inode_setattr+0x6f/0x170 [ 269.935446] ? ext4_journalled_write_end+0x1680/0x1680 [ 269.940706] notify_change+0xbde/0x1110 [ 269.944667] ? setattr_prepare+0x830/0x830 [ 269.948889] ? vfs_removexattr+0x65/0x1e0 [ 269.953021] ovl_workdir_create+0x67a/0x820 [ 269.957331] ? ovl_mount_dir+0x1c0/0x1c0 [ 269.961377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.966907] ovl_fill_super+0xdd4/0x3f7b [ 269.970972] ? ovl_show_options+0x550/0x550 [ 269.975279] ? __free_pages+0x163/0x190 [ 269.979238] ? selinux_sb_copy_data+0x602/0x740 [ 269.983891] ? selinux_capable+0x36/0x40 [ 269.987954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.993498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.999023] ? get_anon_bdev+0xc0/0xc0 [ 270.002896] ? sget+0x113/0x150 [ 270.006159] ? ovl_show_options+0x550/0x550 [ 270.010462] mount_nodev+0x6b/0x110 [ 270.014070] ovl_mount+0x2c/0x40 [ 270.017446] mount_fs+0xae/0x31d [ 270.020803] vfs_kern_mount.part.35+0xdc/0x4f0 [ 270.025369] ? may_umount+0xb0/0xb0 [ 270.028979] ? _raw_read_unlock+0x2c/0x50 [ 270.033132] ? __get_fs_type+0x97/0xc0 [ 270.037020] do_mount+0x581/0x31f0 [ 270.040558] ? kasan_check_read+0x11/0x20 [ 270.044698] ? do_raw_spin_unlock+0xa7/0x2f0 [ 270.049092] ? copy_mount_string+0x40/0x40 [ 270.053312] ? kasan_check_write+0x14/0x20 [ 270.057529] ? kasan_unpoison_shadow+0x35/0x50 [ 270.062095] ? kasan_kmalloc+0xc7/0xe0 [ 270.065977] ? kmem_cache_alloc_trace+0x31f/0x750 [ 270.070803] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.076325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.081844] ? copy_mount_options+0x288/0x380 [ 270.086323] ksys_mount+0x12d/0x140 [ 270.089936] __x64_sys_mount+0xbe/0x150 [ 270.093899] do_syscall_64+0x1b9/0x820 [ 270.097798] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.103158] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.108080] ? trace_hardirqs_on_caller+0x310/0x310 [ 270.113106] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 270.118115] ? recalc_sigpending_tsk+0x180/0x180 [ 270.122864] ? kasan_check_write+0x14/0x20 [ 270.127115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.131970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.137178] RIP: 0033:0x457579 21:38:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:20 executing program 3 (fault-call:4 fault-nth:46): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 270.140387] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.159299] RSP: 002b:00007f4a24470c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 270.167017] RAX: ffffffffffffffda RBX: 00007f4a24470c90 RCX: 0000000000457579 [ 270.174279] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 270.181530] RBP: 000000000072bfa0 R08: 0000000020000100 R09: 0000000000000000 [ 270.188779] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244716d4 [ 270.196029] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:20 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401400, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 270.343376] overlayfs: filesystem on './file0' not supported as upperdir [ 270.346706] 9pnet: Insufficient options for proto=fd [ 270.363011] overlayfs: filesystem on './file0' not supported as upperdir [ 270.383984] FAULT_INJECTION: forcing a failure. [ 270.383984] name failslab, interval 1, probability 0, space 0, times 0 [ 270.406172] CPU: 0 PID: 9904 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 270.413398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.422748] Call Trace: [ 270.425361] dump_stack+0x1c4/0x2b4 [ 270.428995] ? dump_stack_print_info.cold.2+0x52/0x52 [ 270.434188] ? is_bpf_text_address+0xd3/0x170 [ 270.438687] should_fail.cold.4+0xa/0x17 [ 270.442740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.447833] ? save_stack+0xa9/0xd0 [ 270.451442] ? save_stack+0x43/0xd0 [ 270.455050] ? kasan_kmalloc+0xc7/0xe0 [ 270.458917] ? kasan_slab_alloc+0x12/0x20 [ 270.463062] ? kmem_cache_alloc+0x12e/0x730 [ 270.467366] ? __alloc_file+0xa8/0x470 [ 270.471234] ? alloc_empty_file+0x72/0x170 [ 270.475455] ? dentry_open+0x71/0x1d0 [ 270.479242] ? ovl_path_open+0x58/0x70 [ 270.483114] ? ovl_check_d_type_supported+0x109/0x480 [ 270.488288] ? ovl_fill_super+0xe12/0x3f7b [ 270.492502] ? mount_nodev+0x6b/0x110 [ 270.496283] ? ovl_mount+0x2c/0x40 [ 270.499801] ? mount_fs+0xae/0x31d [ 270.503328] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 270.508101] ? do_mount+0x581/0x31f0 [ 270.511843] ? ksys_mount+0x12d/0x140 [ 270.515628] ? __x64_sys_mount+0xbe/0x150 [ 270.519770] ? do_syscall_64+0x1b9/0x820 [ 270.523826] ? fs_reclaim_acquire+0x20/0x20 [ 270.528159] ? lock_downgrade+0x900/0x900 [ 270.532293] ? ___might_sleep+0x1ed/0x300 [ 270.536426] ? arch_local_save_flags+0x40/0x40 [ 270.540994] ? ___might_sleep+0x1ed/0x300 [ 270.545130] __should_failslab+0x124/0x180 [ 270.549354] should_failslab+0x9/0x14 [ 270.553138] kmem_cache_alloc+0x2be/0x730 [ 270.557284] selinux_file_alloc_security+0xb4/0x190 [ 270.562330] security_file_alloc+0x4c/0xa0 [ 270.566549] __alloc_file+0x12a/0x470 [ 270.570360] ? file_free_rcu+0xd0/0xd0 [ 270.574244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.579766] ? notify_change+0x792/0x1110 [ 270.583897] ? up_write+0x7b/0x220 [ 270.587431] ? up_read+0x110/0x110 [ 270.590967] alloc_empty_file+0x72/0x170 [ 270.595012] dentry_open+0x71/0x1d0 [ 270.598631] ovl_path_open+0x58/0x70 [ 270.602331] ovl_check_d_type_supported+0x109/0x480 [ 270.607348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.612870] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 270.617617] ? ovl_dir_fsync+0x4f0/0x4f0 [ 270.621667] ovl_fill_super+0xe12/0x3f7b [ 270.625717] ? ovl_show_options+0x550/0x550 [ 270.630025] ? __free_pages+0x163/0x190 [ 270.634001] ? selinux_sb_copy_data+0x602/0x740 [ 270.638658] ? selinux_capable+0x36/0x40 [ 270.642706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.648229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.653794] ? get_anon_bdev+0xc0/0xc0 [ 270.657667] ? sget+0x113/0x150 [ 270.660934] ? ovl_show_options+0x550/0x550 [ 270.665239] mount_nodev+0x6b/0x110 [ 270.668849] ovl_mount+0x2c/0x40 [ 270.672211] mount_fs+0xae/0x31d [ 270.675622] vfs_kern_mount.part.35+0xdc/0x4f0 [ 270.680206] ? may_umount+0xb0/0xb0 [ 270.683820] ? _raw_read_unlock+0x2c/0x50 [ 270.687953] ? __get_fs_type+0x97/0xc0 [ 270.691824] do_mount+0x581/0x31f0 [ 270.695350] ? copy_mount_string+0x40/0x40 [ 270.699592] ? kasan_unpoison_shadow+0x35/0x50 [ 270.704175] ? kasan_kmalloc+0xc7/0xe0 [ 270.708047] ? kmem_cache_alloc_trace+0x31f/0x750 [ 270.712889] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.718454] ? _copy_from_user+0xdf/0x150 [ 270.722615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.728134] ? copy_mount_options+0x288/0x380 [ 270.732619] ksys_mount+0x12d/0x140 [ 270.736231] __x64_sys_mount+0xbe/0x150 [ 270.740190] do_syscall_64+0x1b9/0x820 [ 270.744060] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 270.749408] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.754322] ? trace_hardirqs_on_caller+0x310/0x310 [ 270.759322] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 270.764335] ? recalc_sigpending_tsk+0x180/0x180 [ 270.769071] ? kasan_check_write+0x14/0x20 [ 270.773292] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.778120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.783290] RIP: 0033:0x457579 [ 270.786480] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.805360] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 270.813051] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 270.820298] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 270.827548] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 270.834813] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 21:38:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:20 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16"], 0xe0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:20 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401326, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:20 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:20 executing program 3 (fault-call:4 fault-nth:47): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 270.842064] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 270.988587] overlayfs: filesystem on './file0' not supported as upperdir [ 271.014085] FAULT_INJECTION: forcing a failure. [ 271.014085] name failslab, interval 1, probability 0, space 0, times 0 [ 271.018279] 9pnet: Insufficient options for proto=fd 21:38:20 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402c00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:20 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402800, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 271.050170] CPU: 0 PID: 9923 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 271.051335] overlayfs: filesystem on './file0' not supported as upperdir [ 271.057388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.057395] Call Trace: [ 271.057425] dump_stack+0x1c4/0x2b4 [ 271.057454] ? dump_stack_print_info.cold.2+0x52/0x52 [ 271.085004] ? __find_get_block+0x3be/0xf20 [ 271.089343] ? __kernel_text_address+0xd/0x40 [ 271.093856] should_fail.cold.4+0xa/0x17 21:38:20 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB], 0xe0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 271.097929] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.103046] ? is_bpf_text_address+0xac/0x170 [ 271.107553] ? kasan_check_read+0x11/0x20 [ 271.111773] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 271.117060] ? rcu_bh_qs+0xc0/0xc0 [ 271.120628] ? unwind_dump+0x190/0x190 [ 271.124530] ? is_bpf_text_address+0xd3/0x170 [ 271.129052] ? kernel_text_address+0x79/0xf0 [ 271.133463] ? unwind_get_return_address+0x61/0xa0 [ 271.138387] ? ___might_sleep+0x1ed/0x300 [ 271.142521] ? arch_local_save_flags+0x40/0x40 [ 271.147093] __should_failslab+0x124/0x180 [ 271.151312] should_failslab+0x9/0x14 [ 271.155123] kmem_cache_alloc+0x2be/0x730 [ 271.159254] ? set_posix_acl+0x22f/0x2e0 [ 271.163298] ? posix_acl_xattr_set+0x109/0x140 [ 271.167862] ? __vfs_removexattr+0x10f/0x170 [ 271.172250] ? vfs_removexattr+0xb4/0x1e0 [ 271.176384] ? ovl_workdir_create+0x5f0/0x820 [ 271.180861] ? ovl_fill_super+0xdd4/0x3f7b [ 271.185080] ? mount_nodev+0x6b/0x110 [ 271.188862] ? ovl_mount+0x2c/0x40 [ 271.192386] jbd2__journal_start+0x1e7/0xa90 [ 271.196778] ? arch_local_save_flags+0x40/0x40 [ 271.201346] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 271.207051] ? __might_sleep+0x95/0x190 [ 271.211036] ? trace_hardirqs_on+0x310/0x310 [ 271.215430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.220954] __ext4_journal_start_sb+0x1a5/0x5f0 [ 271.225695] ? ext4_dirty_inode+0x62/0xc0 [ 271.229828] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 271.235523] ? mark_held_locks+0x130/0x130 [ 271.239739] ? __kasan_slab_free+0x119/0x150 [ 271.244129] ? jbd2_journal_stop+0x430/0x15d0 [ 271.248617] ? kmem_cache_free+0x21a/0x290 [ 271.252843] ? ext4_setattr+0x28f0/0x28f0 [ 271.256975] ext4_dirty_inode+0x62/0xc0 [ 271.260943] __mark_inode_dirty+0x7c3/0x1510 [ 271.265353] ? __inode_attach_wb+0x13f0/0x13f0 [ 271.269927] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 271.275710] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 271.281231] ? jbd2__journal_start+0x162/0xa90 [ 271.285796] ? mark_held_locks+0x130/0x130 [ 271.290019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.295539] ? avc_has_perm+0x55f/0x7e0 [ 271.299529] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 271.304531] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 271.309529] ? in_group_p+0x245/0x2d0 [ 271.313324] ? set_current_groups+0x50/0x50 [ 271.317632] ? set_cached_acl+0xb9/0x100 [ 271.321691] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 271.326698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.332219] ext4_setattr+0x115a/0x28f0 [ 271.336198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.341727] ? ext4_journalled_write_end+0x1680/0x1680 [ 271.347007] ? selinux_inode_setattr+0x308/0x450 [ 271.351746] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 271.356919] ? selinux_inode_removexattr+0x240/0x240 [ 271.362004] ? inode_init_owner+0x340/0x340 [ 271.366307] ? lock_acquire+0x1ed/0x520 [ 271.370274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.375808] ? evm_verify_current_integrity+0x8c/0xf0 [ 271.380980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.386511] ? evm_inode_setattr+0x6f/0x170 [ 271.390846] ? ext4_journalled_write_end+0x1680/0x1680 [ 271.396107] notify_change+0xbde/0x1110 [ 271.400075] ? setattr_prepare+0x830/0x830 [ 271.404297] ? vfs_removexattr+0x65/0x1e0 [ 271.408430] ovl_workdir_create+0x67a/0x820 [ 271.412743] ? ovl_mount_dir+0x1c0/0x1c0 [ 271.416810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.422335] ovl_fill_super+0xdd4/0x3f7b [ 271.426383] ? ovl_show_options+0x550/0x550 [ 271.430697] ? __free_pages+0x163/0x190 [ 271.434653] ? selinux_sb_copy_data+0x602/0x740 [ 271.439316] ? selinux_capable+0x36/0x40 [ 271.443373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.448894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.454416] ? get_anon_bdev+0xc0/0xc0 [ 271.458285] ? sget+0x113/0x150 [ 271.461548] ? ovl_show_options+0x550/0x550 [ 271.465868] mount_nodev+0x6b/0x110 [ 271.469478] ovl_mount+0x2c/0x40 [ 271.472831] mount_fs+0xae/0x31d [ 271.476187] vfs_kern_mount.part.35+0xdc/0x4f0 [ 271.480759] ? may_umount+0xb0/0xb0 [ 271.484374] ? _raw_read_unlock+0x2c/0x50 [ 271.488509] ? __get_fs_type+0x97/0xc0 [ 271.492380] do_mount+0x581/0x31f0 [ 271.495903] ? kasan_check_read+0x11/0x20 [ 271.500048] ? do_raw_spin_unlock+0xa7/0x2f0 [ 271.504442] ? copy_mount_string+0x40/0x40 [ 271.508662] ? kasan_check_write+0x14/0x20 [ 271.512896] ? kasan_unpoison_shadow+0x35/0x50 [ 271.517470] ? kasan_kmalloc+0xc7/0xe0 [ 271.521352] ? kmem_cache_alloc_trace+0x31f/0x750 [ 271.526185] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.531710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.537243] ? copy_mount_options+0x288/0x380 [ 271.541735] ksys_mount+0x12d/0x140 [ 271.545381] __x64_sys_mount+0xbe/0x150 [ 271.549344] do_syscall_64+0x1b9/0x820 [ 271.553216] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 271.558566] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.563494] ? trace_hardirqs_on_caller+0x310/0x310 [ 271.568533] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 271.573539] ? recalc_sigpending_tsk+0x180/0x180 [ 271.578281] ? kasan_check_write+0x14/0x20 [ 271.582512] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.587353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.592533] RIP: 0033:0x457579 [ 271.595716] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.614716] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 271.622417] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 271.629669] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 271.636922] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 271.644174] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 21:38:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:21 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402800, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:21 executing program 3 (fault-call:4 fault-nth:48): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0x0) [ 271.651427] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 271.795974] 9pnet: Insufficient options for proto=fd [ 271.809964] FAULT_INJECTION: forcing a failure. [ 271.809964] name failslab, interval 1, probability 0, space 0, times 0 21:38:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:21 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400300, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 271.836689] overlayfs: filesystem on './file0' not supported as upperdir [ 271.876307] CPU: 0 PID: 9953 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 21:38:21 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402613, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 271.883560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.892945] Call Trace: [ 271.895552] dump_stack+0x1c4/0x2b4 [ 271.899206] ? dump_stack_print_info.cold.2+0x52/0x52 [ 271.904404] should_fail.cold.4+0xa/0x17 [ 271.908476] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.913616] ? set_posix_acl+0x2e0/0x2e0 [ 271.917714] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.923258] ? get_acl+0x1c2/0x2a0 [ 271.926800] ? posix_acl_chmod+0x281/0x360 [ 271.931023] ? __posix_acl_create+0x170/0x170 [ 271.935507] ? fs_reclaim_acquire+0x20/0x20 [ 271.939831] ? lock_downgrade+0x900/0x900 [ 271.943985] ? ___might_sleep+0x1ed/0x300 [ 271.948120] ? arch_local_save_flags+0x40/0x40 [ 271.952691] __should_failslab+0x124/0x180 [ 271.956910] should_failslab+0x9/0x14 [ 271.960704] kmem_cache_alloc+0x2be/0x730 [ 271.964841] ? ovl_workdir_create+0x3fd/0x820 [ 271.969320] ? lock_downgrade+0x900/0x900 [ 271.973476] __alloc_file+0xa8/0x470 [ 271.977186] ? file_free_rcu+0xd0/0xd0 [ 271.981062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.986592] ? notify_change+0x792/0x1110 [ 271.990733] ? up_write+0x7b/0x220 [ 271.994254] ? up_read+0x110/0x110 [ 271.997787] alloc_empty_file+0x72/0x170 [ 272.001835] dentry_open+0x71/0x1d0 [ 272.005454] ovl_path_open+0x58/0x70 [ 272.009151] ovl_check_d_type_supported+0x109/0x480 [ 272.014191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.019714] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 272.024457] ? ovl_dir_fsync+0x4f0/0x4f0 [ 272.028509] ovl_fill_super+0xe12/0x3f7b [ 272.032560] ? ovl_show_options+0x550/0x550 [ 272.036872] ? __free_pages+0x163/0x190 [ 272.040834] ? selinux_sb_copy_data+0x602/0x740 [ 272.045490] ? selinux_capable+0x36/0x40 [ 272.050756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.056278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.061801] ? get_anon_bdev+0xc0/0xc0 [ 272.065682] ? sget+0x113/0x150 [ 272.068970] ? ovl_show_options+0x550/0x550 [ 272.073343] mount_nodev+0x6b/0x110 [ 272.076967] ovl_mount+0x2c/0x40 [ 272.080320] mount_fs+0xae/0x31d [ 272.083678] vfs_kern_mount.part.35+0xdc/0x4f0 [ 272.088245] ? may_umount+0xb0/0xb0 [ 272.091859] ? _raw_read_unlock+0x2c/0x50 [ 272.095991] ? __get_fs_type+0x97/0xc0 [ 272.099866] do_mount+0x581/0x31f0 [ 272.103391] ? kasan_check_read+0x11/0x20 [ 272.107524] ? do_raw_spin_unlock+0xa7/0x2f0 [ 272.111919] ? copy_mount_string+0x40/0x40 [ 272.116135] ? kasan_check_write+0x14/0x20 [ 272.120368] ? kasan_unpoison_shadow+0x35/0x50 [ 272.124946] ? kasan_kmalloc+0xc7/0xe0 [ 272.128833] ? kmem_cache_alloc_trace+0x31f/0x750 [ 272.133661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.139205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.144744] ? copy_mount_options+0x288/0x380 [ 272.149227] ksys_mount+0x12d/0x140 [ 272.152839] __x64_sys_mount+0xbe/0x150 [ 272.156802] do_syscall_64+0x1b9/0x820 [ 272.160674] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.166022] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.170936] ? trace_hardirqs_on_caller+0x310/0x310 [ 272.175939] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.180941] ? recalc_sigpending_tsk+0x180/0x180 [ 272.185685] ? kasan_check_write+0x14/0x20 [ 272.189906] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.194739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.199913] RIP: 0033:0x457579 [ 272.203098] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.221998] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 272.229696] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 21:38:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:22 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB], 0xe0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:22 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40000d, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:22 executing program 3 (fault-call:4 fault-nth:49): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 272.236964] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 272.244217] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 272.251473] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 272.258745] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 272.406677] 9pnet: Insufficient options for proto=fd [ 272.408175] FAULT_INJECTION: forcing a failure. [ 272.408175] name failslab, interval 1, probability 0, space 0, times 0 [ 272.432885] overlayfs: filesystem on './file0' not supported as upperdir [ 272.434267] CPU: 1 PID: 9980 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 272.446939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 21:38:22 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4003f4, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:22 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40d603, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 272.456295] Call Trace: [ 272.458897] dump_stack+0x1c4/0x2b4 [ 272.462540] ? dump_stack_print_info.cold.2+0x52/0x52 [ 272.467769] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 272.473588] should_fail.cold.4+0xa/0x17 [ 272.477665] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 272.482784] ? is_bpf_text_address+0xd3/0x170 [ 272.487304] ? kernel_text_address+0x79/0xf0 [ 272.491725] ? __kernel_text_address+0xd/0x40 [ 272.496240] ? ___ratelimit.cold.2+0x6b/0x6b [ 272.500674] ? __save_stack_trace+0x8d/0xf0 [ 272.505009] ? mark_held_locks+0x130/0x130 [ 272.509229] ? save_stack+0xa9/0xd0 [ 272.512840] ? save_stack+0x43/0xd0 [ 272.516483] ? kasan_kmalloc+0xc7/0xe0 [ 272.520375] ? __kmalloc+0x14e/0x760 [ 272.524119] ? htree_dirblock_to_tree+0x56b/0xae0 [ 272.528950] ? ext4_htree_fill_tree+0x40c/0xd60 [ 272.533602] ? ext4_readdir+0x1ca1/0x3c30 [ 272.537759] ? iterate_dir+0x48c/0x5d0 [ 272.541633] ? ovl_check_d_type_supported+0x272/0x480 [ 272.546805] ? ovl_fill_super+0xe12/0x3f7b [ 272.551027] ? ___might_sleep+0x1ed/0x300 [ 272.555194] ? arch_local_save_flags+0x40/0x40 [ 272.559761] ? mark_held_locks+0x130/0x130 [ 272.563992] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.569368] ? ext4_issue_zeroout+0x190/0x190 [ 272.573849] __should_failslab+0x124/0x180 [ 272.578096] should_failslab+0x9/0x14 [ 272.581890] kmem_cache_alloc+0x2be/0x730 [ 272.586039] ? ___might_sleep+0x1ed/0x300 [ 272.590193] ? ratelimit_state_init+0xb0/0xb0 [ 272.594708] ext4_alloc_inode+0xc7/0x870 [ 272.598757] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 272.603592] ? ratelimit_state_init+0xb0/0xb0 [ 272.608075] ? kasan_unpoison_shadow+0x35/0x50 [ 272.612642] ? kasan_kmalloc+0xc7/0xe0 [ 272.616519] ? get_cached_acl+0x35c/0x460 [ 272.620652] ? lock_downgrade+0x900/0x900 [ 272.624790] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 272.630581] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 272.635595] ? modules_open+0xa0/0xa0 [ 272.639386] ? ratelimit_state_init+0xb0/0xb0 [ 272.643869] alloc_inode+0x63/0x190 [ 272.647483] new_inode_pseudo+0x71/0x1a0 [ 272.651531] ? prune_icache_sb+0x1c0/0x1c0 [ 272.655758] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 272.661562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.667093] ? __ext4_xattr_set_credits+0x3ae/0x520 [ 272.672118] new_inode+0x1c/0x40 [ 272.675472] __ext4_new_inode+0x4cd/0x65b0 [ 272.679695] ? is_bpf_text_address+0xd3/0x170 [ 272.684181] ? __kernel_text_address+0xd/0x40 [ 272.688668] ? unwind_get_return_address+0x61/0xa0 [ 272.693594] ? ext4_free_inode+0x1a10/0x1a10 [ 272.698000] ? save_stack+0xa9/0xd0 [ 272.701615] ? save_stack+0x43/0xd0 [ 272.705225] ? kasan_kmalloc+0xc7/0xe0 [ 272.709096] ? kasan_slab_alloc+0x12/0x20 [ 272.713234] ? kmem_cache_alloc+0x12e/0x730 [ 272.717550] ? __d_alloc+0xc8/0xcc0 [ 272.721173] ? d_alloc+0x96/0x380 [ 272.724612] ? vfs_tmpfile+0xd2/0x2a0 [ 272.728415] ? ovl_fill_super+0xe70/0x3f7b [ 272.732635] ? mount_nodev+0x6b/0x110 [ 272.736419] ? mount_fs+0xae/0x31d [ 272.739946] ? mark_held_locks+0x130/0x130 [ 272.744180] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.749542] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 272.755336] ? mark_held_locks+0x130/0x130 [ 272.759562] ? fs_reclaim_acquire+0x20/0x20 [ 272.763874] ? lock_downgrade+0x900/0x900 [ 272.768009] ? ___might_sleep+0x1ed/0x300 [ 272.772158] ? avc_has_perm_noaudit+0x424/0x630 [ 272.776815] ? trace_hardirqs_on+0xbd/0x310 [ 272.781123] ? __d_alloc+0xc8/0xcc0 [ 272.784733] ? kasan_unpoison_shadow+0x35/0x50 [ 272.789297] ? kasan_kmalloc+0xc7/0xe0 [ 272.793170] ? kasan_slab_alloc+0x12/0x20 [ 272.797312] ? kmem_cache_alloc+0x306/0x730 [ 272.801629] ? __lockdep_init_map+0x105/0x590 [ 272.806115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.811665] ? d_set_d_op+0x31d/0x410 [ 272.815456] ? __d_alloc+0x73f/0xcc0 [ 272.819155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.824676] ? __dquot_initialize+0x629/0xdd0 [ 272.829156] ? lock_downgrade+0x900/0x900 [ 272.833309] ? dquot_get_next_dqblk+0x180/0x180 [ 272.837986] ? kasan_check_read+0x11/0x20 [ 272.842122] ? do_raw_spin_unlock+0xa7/0x2f0 [ 272.846524] ext4_tmpfile+0x187/0x4e0 [ 272.850331] ? ext4_orphan_add+0xdb0/0xdb0 [ 272.854554] ? security_inode_permission+0xd2/0x100 [ 272.859562] ? inode_permission+0xb2/0x560 [ 272.863787] vfs_tmpfile+0x13b/0x2a0 [ 272.867488] ovl_fill_super+0xe70/0x3f7b [ 272.871538] ? ovl_show_options+0x550/0x550 [ 272.875865] ? __free_pages+0x163/0x190 [ 272.879826] ? selinux_sb_copy_data+0x602/0x740 [ 272.884484] ? selinux_capable+0x36/0x40 [ 272.888534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.894056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.899584] ? get_anon_bdev+0xc0/0xc0 [ 272.903458] ? sget+0x113/0x150 [ 272.906724] ? ovl_show_options+0x550/0x550 [ 272.911040] mount_nodev+0x6b/0x110 [ 272.914652] ovl_mount+0x2c/0x40 [ 272.918002] mount_fs+0xae/0x31d [ 272.921381] vfs_kern_mount.part.35+0xdc/0x4f0 [ 272.925959] ? may_umount+0xb0/0xb0 [ 272.929572] ? _raw_read_unlock+0x2c/0x50 [ 272.933742] ? __get_fs_type+0x97/0xc0 [ 272.937620] do_mount+0x581/0x31f0 [ 272.941147] ? copy_mount_string+0x40/0x40 [ 272.945366] ? kasan_unpoison_shadow+0x35/0x50 [ 272.949932] ? kasan_kmalloc+0xc7/0xe0 [ 272.953809] ? kmem_cache_alloc_trace+0x31f/0x750 [ 272.958649] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.964189] ? _copy_from_user+0xdf/0x150 [ 272.968322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.973841] ? copy_mount_options+0x288/0x380 [ 272.978320] ksys_mount+0x12d/0x140 [ 272.981930] __x64_sys_mount+0xbe/0x150 [ 272.985893] do_syscall_64+0x1b9/0x820 [ 272.989763] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 272.995120] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.000042] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.005056] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.010067] ? recalc_sigpending_tsk+0x180/0x180 [ 273.014831] ? kasan_check_write+0x14/0x20 [ 273.019073] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.023926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.029106] RIP: 0033:0x457579 [ 273.032310] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.051205] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:38:22 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400018, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:22 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB="1be9d7bdf66959ed6500d47b5c1548bed8a3ba45961a27136b07621a4bad30b9efd95b6985f89ef5651387ff8b502a56da20f0f21ff6b7ce451fdb7e6ae07f7b974570bfbfc5fc403c8cc1c43ddf2793b1ce1433e61d4c09d07fc9ce9ba181bb67499ea0882f11de506095f43c49fef0465015a69f9a98acc3f431eba229808aff5aaaea04948ca12ea5040ad6e848890ccca5242952dfd5f373fcbde1e26d2b223b6a81da4a4af56f0f50619b4f16", @ANYBLOB], 0xe0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:22 executing program 3 (fault-call:4 fault-nth:50): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 273.058908] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 273.066180] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 273.073430] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 273.080706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 273.087958] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 273.097326] overlayfs: upper fs does not support tmpfile. 21:38:23 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 273.173098] ovl_get_fh: 22 callbacks suppressed [ 273.173117] overlayfs: invalid origin (7900) 21:38:23 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:23 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 273.258660] 9pnet: Insufficient options for proto=fd [ 273.273982] overlayfs: invalid origin (7900) [ 273.276220] overlayfs: invalid origin (7900) [ 273.283033] overlayfs: invalid origin (7900) 21:38:23 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB], 0x31) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 273.311741] overlayfs: filesystem on './file0' not supported as upperdir [ 273.321355] FAULT_INJECTION: forcing a failure. [ 273.321355] name failslab, interval 1, probability 0, space 0, times 0 21:38:23 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401400, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 273.357393] CPU: 0 PID: 10008 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 273.364737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.374090] Call Trace: [ 273.376696] dump_stack+0x1c4/0x2b4 [ 273.380349] ? dump_stack_print_info.cold.2+0x52/0x52 [ 273.385544] ? __kernel_text_address+0xd/0x40 [ 273.390047] ? ___ratelimit.cold.2+0x6b/0x6b [ 273.394445] should_fail.cold.4+0xa/0x17 [ 273.398490] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 273.403585] ? save_stack+0xa9/0xd0 [ 273.407201] ? save_stack+0x43/0xd0 [ 273.410823] ? kasan_kmalloc+0xc7/0xe0 [ 273.414706] ? __kmalloc+0x14e/0x760 [ 273.418404] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 273.423260] ? htree_dirblock_to_tree+0x56b/0xae0 [ 273.428113] ? ext4_htree_fill_tree+0x40c/0xd60 [ 273.432769] ? iterate_dir+0x48c/0x5d0 [ 273.436645] ? ovl_check_d_type_supported+0x272/0x480 [ 273.441827] ? ovl_fill_super+0xe12/0x3f7b [ 273.446047] ? mount_nodev+0x6b/0x110 [ 273.449829] ? ovl_mount+0x2c/0x40 [ 273.453401] ? mount_fs+0xae/0x31d [ 273.456929] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 273.461672] ? do_mount+0x581/0x31f0 [ 273.465367] ? ksys_mount+0x12d/0x140 [ 273.469148] ? __x64_sys_mount+0xbe/0x150 [ 273.473293] ? do_syscall_64+0x1b9/0x820 [ 273.477339] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.482687] ? ext4_issue_zeroout+0x190/0x190 [ 273.487170] ? fs_reclaim_acquire+0x20/0x20 [ 273.491477] ? lock_downgrade+0x900/0x900 [ 273.495629] ? ___might_sleep+0x1ed/0x300 [ 273.499762] ? arch_local_save_flags+0x40/0x40 [ 273.504353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.509879] ? ext4fs_dirhash+0xb49/0x10d0 [ 273.514102] __should_failslab+0x124/0x180 [ 273.518339] should_failslab+0x9/0x14 [ 273.522150] __kmalloc+0x2d4/0x760 [ 273.525698] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 273.530964] ? rcu_bh_qs+0xc0/0xc0 [ 273.534525] ? unwind_dump+0x190/0x190 [ 273.538396] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 273.543248] ext4_htree_store_dirent+0x8d/0x5a0 [ 273.547908] htree_dirblock_to_tree+0x56b/0xae0 [ 273.552563] ? dx_probe+0x1120/0x1120 [ 273.556356] ? save_stack+0xa9/0xd0 [ 273.559965] ? save_stack+0x43/0xd0 [ 273.563585] ? ext4_readdir+0x2734/0x3c30 [ 273.567740] ? iterate_dir+0x48c/0x5d0 [ 273.571636] ? ovl_check_d_type_supported+0x272/0x480 [ 273.576813] ? ovl_fill_super+0xe12/0x3f7b [ 273.581047] ? mount_nodev+0x6b/0x110 [ 273.584832] ? ovl_mount+0x2c/0x40 [ 273.588354] ? mount_fs+0xae/0x31d [ 273.591881] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 273.596624] ? do_mount+0x581/0x31f0 [ 273.600335] ? ksys_mount+0x12d/0x140 [ 273.604120] ? __x64_sys_mount+0xbe/0x150 [ 273.608266] ? do_syscall_64+0x1b9/0x820 [ 273.612503] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.617856] ext4_htree_fill_tree+0x40c/0xd60 [ 273.622339] ? do_split+0x1bc0/0x1bc0 [ 273.626126] ? lock_downgrade+0x900/0x900 [ 273.630260] ? ___might_sleep+0x1ed/0x300 [ 273.634392] ? security_file_alloc+0x4c/0xa0 [ 273.638788] ? trace_hardirqs_on+0xbd/0x310 [ 273.643109] ? ext4_readdir+0x2734/0x3c30 [ 273.647244] ? kasan_kmalloc+0xc7/0xe0 [ 273.651121] ? kmem_cache_alloc_trace+0x31f/0x750 [ 273.655952] ? fs_reclaim_acquire+0x20/0x20 [ 273.660261] ext4_readdir+0x1ca1/0x3c30 [ 273.664219] ? ___might_sleep+0x1ed/0x300 [ 273.668355] ? __ext4_check_dir_entry+0x350/0x350 [ 273.673183] ? lock_acquire+0x1ed/0x520 [ 273.677145] ? lock_release+0x970/0x970 [ 273.681125] ? arch_local_save_flags+0x40/0x40 [ 273.685694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.691215] ? fsnotify+0xaae/0x12f0 [ 273.694925] ? down_read_killable+0xaf/0x1f0 [ 273.699322] ? iterate_dir+0xd8/0x5d0 [ 273.703109] ? fsnotify+0x12f0/0x12f0 [ 273.706910] ? down_write+0x130/0x130 [ 273.710700] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 273.715708] ? security_file_permission+0x1ba/0x230 [ 273.720714] iterate_dir+0x48c/0x5d0 [ 273.724448] ovl_check_d_type_supported+0x272/0x480 [ 273.729470] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 273.734226] ? ovl_dir_fsync+0x4f0/0x4f0 [ 273.738281] ovl_fill_super+0xe12/0x3f7b [ 273.742350] ? ovl_show_options+0x550/0x550 [ 273.746660] ? __free_pages+0x163/0x190 [ 273.750630] ? selinux_sb_copy_data+0x602/0x740 [ 273.755289] ? selinux_capable+0x36/0x40 [ 273.759358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.764905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.770440] ? get_anon_bdev+0xc0/0xc0 [ 273.774309] ? sget+0x113/0x150 [ 273.777584] ? ovl_show_options+0x550/0x550 [ 273.781897] mount_nodev+0x6b/0x110 [ 273.785507] ovl_mount+0x2c/0x40 [ 273.788855] mount_fs+0xae/0x31d [ 273.792213] vfs_kern_mount.part.35+0xdc/0x4f0 [ 273.796782] ? may_umount+0xb0/0xb0 [ 273.800395] ? _raw_read_unlock+0x2c/0x50 [ 273.804525] ? __get_fs_type+0x97/0xc0 [ 273.808400] do_mount+0x581/0x31f0 [ 273.811937] ? copy_mount_string+0x40/0x40 [ 273.816159] ? kasan_unpoison_shadow+0x35/0x50 [ 273.820724] ? kasan_kmalloc+0xc7/0xe0 [ 273.824607] ? kmem_cache_alloc_trace+0x31f/0x750 [ 273.829457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.834979] ? _copy_from_user+0xdf/0x150 [ 273.839141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 273.844687] ? copy_mount_options+0x288/0x380 [ 273.849170] ksys_mount+0x12d/0x140 [ 273.852783] __x64_sys_mount+0xbe/0x150 [ 273.856747] do_syscall_64+0x1b9/0x820 [ 273.860631] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 273.865978] ? syscall_return_slowpath+0x5e0/0x5e0 [ 273.870892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.875726] ? trace_hardirqs_on_caller+0x310/0x310 [ 273.880740] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 273.885744] ? prepare_exit_to_usermode+0x291/0x3b0 [ 273.890748] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.895586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.900765] RIP: 0033:0x457579 [ 273.903967] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.922850] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 273.930550] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 273.937800] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 273.945053] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 273.952304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 21:38:23 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x7000000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:23 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:23 executing program 3 (fault-call:4 fault-nth:51): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 273.959556] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:23 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 274.077141] overlayfs: invalid origin (7900) [ 274.089777] overlayfs: invalid origin (7900) [ 274.105337] FAULT_INJECTION: forcing a failure. [ 274.105337] name failslab, interval 1, probability 0, space 0, times 0 [ 274.115153] 9pnet: Insufficient options for proto=fd 21:38:24 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 274.136484] overlayfs: filesystem on './file0' not supported as upperdir [ 274.143029] CPU: 1 PID: 10024 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 274.145636] overlayfs: invalid origin (7900) [ 274.150645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.150653] Call Trace: [ 274.150683] dump_stack+0x1c4/0x2b4 [ 274.150712] ? dump_stack_print_info.cold.2+0x52/0x52 [ 274.175837] ? __kernel_text_address+0xd/0x40 [ 274.180373] ? ___ratelimit.cold.2+0x6b/0x6b 21:38:24 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400c00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:24 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB], 0x31) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 274.184797] should_fail.cold.4+0xa/0x17 [ 274.188874] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.194005] ? save_stack+0xa9/0xd0 [ 274.197637] ? save_stack+0x43/0xd0 [ 274.201266] ? kasan_kmalloc+0xc7/0xe0 [ 274.205163] ? __kmalloc+0x14e/0x760 [ 274.208890] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 274.213742] ? htree_dirblock_to_tree+0x56b/0xae0 [ 274.218614] ? ext4_htree_fill_tree+0x40c/0xd60 [ 274.223296] ? iterate_dir+0x48c/0x5d0 [ 274.227198] ? ovl_check_d_type_supported+0x272/0x480 [ 274.228333] overlayfs: invalid origin (7900) 21:38:24 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40005c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:24 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4001e2, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 274.232391] ? ovl_fill_super+0xe12/0x3f7b [ 274.232406] ? mount_nodev+0x6b/0x110 [ 274.232418] ? ovl_mount+0x2c/0x40 [ 274.232430] ? mount_fs+0xae/0x31d [ 274.232452] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 274.256680] ? do_mount+0x581/0x31f0 [ 274.260418] ? ksys_mount+0x12d/0x140 [ 274.264219] ? __x64_sys_mount+0xbe/0x150 [ 274.268376] ? do_syscall_64+0x1b9/0x820 [ 274.272450] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.277833] ? ext4_issue_zeroout+0x190/0x190 [ 274.282343] ? fs_reclaim_acquire+0x20/0x20 [ 274.286695] ? lock_downgrade+0x900/0x900 [ 274.290848] ? ___might_sleep+0x1ed/0x300 [ 274.294994] ? arch_local_save_flags+0x40/0x40 [ 274.299626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.305165] ? ext4fs_dirhash+0xb49/0x10d0 [ 274.309595] __should_failslab+0x124/0x180 [ 274.313823] should_failslab+0x9/0x14 [ 274.317781] __kmalloc+0x2d4/0x760 [ 274.321684] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 274.327729] ? rcu_bh_qs+0xc0/0xc0 [ 274.331262] ? unwind_dump+0x190/0x190 [ 274.335253] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 274.340094] ext4_htree_store_dirent+0x8d/0x5a0 [ 274.345489] htree_dirblock_to_tree+0x56b/0xae0 [ 274.350270] ? dx_probe+0x1120/0x1120 [ 274.354416] ? save_stack+0xa9/0xd0 [ 274.358029] ? save_stack+0x43/0xd0 [ 274.361895] ? ext4_readdir+0x2734/0x3c30 [ 274.366295] ? iterate_dir+0x48c/0x5d0 [ 274.370330] ? ovl_check_d_type_supported+0x272/0x480 [ 274.375620] ? ovl_fill_super+0xe12/0x3f7b [ 274.379853] ? mount_nodev+0x6b/0x110 [ 274.383641] ? ovl_mount+0x2c/0x40 [ 274.387180] ? mount_fs+0xae/0x31d [ 274.390705] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 274.395450] ? do_mount+0x581/0x31f0 [ 274.399158] ? ksys_mount+0x12d/0x140 [ 274.402937] ? __x64_sys_mount+0xbe/0x150 [ 274.407085] ? do_syscall_64+0x1b9/0x820 [ 274.411141] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.416505] ext4_htree_fill_tree+0x40c/0xd60 [ 274.420987] ? do_split+0x1bc0/0x1bc0 [ 274.424779] ? lock_downgrade+0x900/0x900 [ 274.428914] ? ___might_sleep+0x1ed/0x300 [ 274.433050] ? security_file_alloc+0x4c/0xa0 [ 274.437447] ? trace_hardirqs_on+0xbd/0x310 [ 274.441770] ? ext4_readdir+0x2734/0x3c30 [ 274.446049] ? kasan_kmalloc+0xc7/0xe0 [ 274.449929] ? kmem_cache_alloc_trace+0x31f/0x750 [ 274.454761] ? fs_reclaim_acquire+0x20/0x20 [ 274.459068] ext4_readdir+0x1ca1/0x3c30 [ 274.463030] ? ___might_sleep+0x1ed/0x300 [ 274.467167] ? __ext4_check_dir_entry+0x350/0x350 [ 274.472010] ? lock_acquire+0x1ed/0x520 [ 274.475978] ? lock_release+0x970/0x970 [ 274.479935] ? arch_local_save_flags+0x40/0x40 [ 274.484506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.490029] ? fsnotify+0xaae/0x12f0 [ 274.493736] ? down_read_killable+0xaf/0x1f0 [ 274.498128] ? iterate_dir+0xd8/0x5d0 [ 274.501911] ? fsnotify+0x12f0/0x12f0 [ 274.505704] ? down_write+0x130/0x130 [ 274.509505] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 274.514512] ? security_file_permission+0x1ba/0x230 [ 274.519516] iterate_dir+0x48c/0x5d0 [ 274.523234] ovl_check_d_type_supported+0x272/0x480 [ 274.528267] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 274.533011] ? ovl_dir_fsync+0x4f0/0x4f0 [ 274.537063] ovl_fill_super+0xe12/0x3f7b [ 274.541119] ? ovl_show_options+0x550/0x550 [ 274.545429] ? __free_pages+0x163/0x190 [ 274.549392] ? selinux_sb_copy_data+0x602/0x740 [ 274.554062] ? selinux_capable+0x36/0x40 [ 274.558132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.563681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.569218] ? get_anon_bdev+0xc0/0xc0 [ 274.573113] ? sget+0x113/0x150 [ 274.576390] ? ovl_show_options+0x550/0x550 [ 274.580693] mount_nodev+0x6b/0x110 [ 274.584305] ovl_mount+0x2c/0x40 [ 274.587658] mount_fs+0xae/0x31d [ 274.591013] vfs_kern_mount.part.35+0xdc/0x4f0 [ 274.595589] ? may_umount+0xb0/0xb0 [ 274.599214] ? _raw_read_unlock+0x2c/0x50 [ 274.603394] ? __get_fs_type+0x97/0xc0 [ 274.607278] do_mount+0x581/0x31f0 [ 274.610803] ? kasan_check_read+0x11/0x20 [ 274.614940] ? do_raw_spin_unlock+0xa7/0x2f0 [ 274.619334] ? copy_mount_string+0x40/0x40 [ 274.623585] ? kasan_check_write+0x14/0x20 [ 274.627806] ? kasan_unpoison_shadow+0x35/0x50 [ 274.632373] ? kasan_kmalloc+0xc7/0xe0 [ 274.636260] ? kmem_cache_alloc_trace+0x31f/0x750 [ 274.641088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 274.646658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.652182] ? copy_mount_options+0x288/0x380 [ 274.656674] ksys_mount+0x12d/0x140 [ 274.660292] __x64_sys_mount+0xbe/0x150 [ 274.664253] do_syscall_64+0x1b9/0x820 [ 274.668145] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 274.673496] ? syscall_return_slowpath+0x5e0/0x5e0 [ 274.678413] ? trace_hardirqs_on_caller+0x310/0x310 [ 274.683416] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 274.688431] ? recalc_sigpending_tsk+0x180/0x180 [ 274.693183] ? kasan_check_write+0x14/0x20 [ 274.697414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.702243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.707425] RIP: 0033:0x457579 [ 274.710611] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.729495] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:38:24 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:24 executing program 3 (fault-call:4 fault-nth:52): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 274.737188] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 274.744438] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 274.751692] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 274.758962] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 274.766211] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 274.850423] FAULT_INJECTION: forcing a failure. [ 274.850423] name failslab, interval 1, probability 0, space 0, times 0 21:38:24 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40000c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 274.902423] overlayfs: invalid origin (7900) [ 274.904709] overlayfs: invalid origin (7900) [ 274.911415] CPU: 1 PID: 10048 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 274.916426] overlayfs: filesystem on './file0' not supported as upperdir [ 274.918703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.918711] Call Trace: [ 274.918739] dump_stack+0x1c4/0x2b4 [ 274.918769] ? dump_stack_print_info.cold.2+0x52/0x52 [ 274.946324] ? __kernel_text_address+0xd/0x40 21:38:24 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400480, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:24 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 274.950827] ? ___ratelimit.cold.2+0x6b/0x6b [ 274.955250] should_fail.cold.4+0xa/0x17 [ 274.959321] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 274.961103] 9pnet: Insufficient options for proto=fd [ 274.964430] ? save_stack+0xa9/0xd0 [ 274.964445] ? save_stack+0x43/0xd0 [ 274.964456] ? kasan_kmalloc+0xc7/0xe0 [ 274.964472] ? __kmalloc+0x14e/0x760 [ 274.964494] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 274.989265] ? htree_dirblock_to_tree+0x56b/0xae0 [ 274.994144] ? ext4_htree_fill_tree+0x40c/0xd60 21:38:24 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) 21:38:24 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYRESOCT=r0, @ANYBLOB], 0x31) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 274.999008] ? iterate_dir+0x48c/0x5d0 [ 275.003543] ? ovl_check_d_type_supported+0x272/0x480 [ 275.009456] ? ovl_fill_super+0xe12/0x3f7b [ 275.013884] ? mount_nodev+0x6b/0x110 [ 275.018275] ? ovl_mount+0x2c/0x40 [ 275.022423] ? mount_fs+0xae/0x31d [ 275.025972] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 275.030728] ? do_mount+0x581/0x31f0 [ 275.034441] ? ksys_mount+0x12d/0x140 [ 275.038266] ? __x64_sys_mount+0xbe/0x150 [ 275.043126] ? do_syscall_64+0x1b9/0x820 21:38:24 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401100, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:24 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setregid(0x0, 0x0) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r0) [ 275.047725] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.049700] overlayfs: filesystem on './file0' not supported as upperdir [ 275.053789] ? ext4_issue_zeroout+0x190/0x190 [ 275.053810] ? fs_reclaim_acquire+0x20/0x20 [ 275.053827] ? lock_downgrade+0x900/0x900 [ 275.053853] ? ___might_sleep+0x1ed/0x300 [ 275.078026] ? arch_local_save_flags+0x40/0x40 [ 275.082638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.088189] ? ext4fs_dirhash+0xb49/0x10d0 [ 275.092480] __should_failslab+0x124/0x180 [ 275.096717] should_failslab+0x9/0x14 21:38:24 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x0, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0x0) [ 275.100526] __kmalloc+0x2d4/0x760 [ 275.104075] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 275.109387] ? rcu_bh_qs+0xc0/0xc0 [ 275.112931] ? unwind_dump+0x190/0x190 [ 275.116827] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 275.121686] ext4_htree_store_dirent+0x8d/0x5a0 [ 275.126366] htree_dirblock_to_tree+0x56b/0xae0 [ 275.131068] ? dx_probe+0x1120/0x1120 [ 275.134884] ? save_stack+0xa9/0xd0 [ 275.138523] ? save_stack+0x43/0xd0 [ 275.142194] ? ext4_readdir+0x2734/0x3c30 [ 275.146346] ? iterate_dir+0x48c/0x5d0 [ 275.150249] ? ovl_check_d_type_supported+0x272/0x480 [ 275.155446] ? ovl_fill_super+0xe12/0x3f7b [ 275.159689] ? mount_nodev+0x6b/0x110 [ 275.163494] ? ovl_mount+0x2c/0x40 [ 275.163506] ? mount_fs+0xae/0x31d [ 275.163535] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 275.163547] ? do_mount+0x581/0x31f0 [ 275.163587] ? ksys_mount+0x12d/0x140 [ 275.182922] ? __x64_sys_mount+0xbe/0x150 [ 275.187070] ? do_syscall_64+0x1b9/0x820 [ 275.191119] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.196472] ext4_htree_fill_tree+0x40c/0xd60 [ 275.200973] ? do_split+0x1bc0/0x1bc0 [ 275.204783] ? lock_downgrade+0x900/0x900 [ 275.208931] ? ___might_sleep+0x1ed/0x300 [ 275.213075] ? security_file_alloc+0x4c/0xa0 [ 275.217467] ? trace_hardirqs_on+0xbd/0x310 [ 275.221772] ? ext4_readdir+0x2734/0x3c30 [ 275.225924] ? kasan_kmalloc+0xc7/0xe0 [ 275.229798] ? kmem_cache_alloc_trace+0x31f/0x750 [ 275.234626] ? fs_reclaim_acquire+0x20/0x20 [ 275.238932] ext4_readdir+0x1ca1/0x3c30 [ 275.242910] ? ___might_sleep+0x1ed/0x300 [ 275.247047] ? __ext4_check_dir_entry+0x350/0x350 [ 275.251874] ? lock_acquire+0x1ed/0x520 [ 275.255835] ? lock_release+0x970/0x970 [ 275.259789] ? arch_local_save_flags+0x40/0x40 [ 275.264353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.269873] ? fsnotify+0xaae/0x12f0 [ 275.273583] ? down_read_killable+0xaf/0x1f0 [ 275.277988] ? iterate_dir+0xd8/0x5d0 [ 275.281782] ? fsnotify+0x12f0/0x12f0 [ 275.285565] ? down_write+0x130/0x130 [ 275.289353] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 275.294360] ? security_file_permission+0x1ba/0x230 [ 275.299388] iterate_dir+0x48c/0x5d0 [ 275.303090] ovl_check_d_type_supported+0x272/0x480 [ 275.308096] ? ovl_cleanup_whiteouts+0x2a0/0x2a0 [ 275.312840] ? ovl_dir_fsync+0x4f0/0x4f0 [ 275.316890] ovl_fill_super+0xe12/0x3f7b [ 275.320937] ? ovl_show_options+0x550/0x550 [ 275.325245] ? __free_pages+0x163/0x190 [ 275.329205] ? selinux_sb_copy_data+0x602/0x740 [ 275.333862] ? selinux_capable+0x36/0x40 [ 275.337907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.343428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.348952] ? get_anon_bdev+0xc0/0xc0 [ 275.352823] ? sget+0x113/0x150 [ 275.356095] ? ovl_show_options+0x550/0x550 [ 275.360417] mount_nodev+0x6b/0x110 [ 275.364033] ovl_mount+0x2c/0x40 [ 275.367385] mount_fs+0xae/0x31d [ 275.370740] vfs_kern_mount.part.35+0xdc/0x4f0 [ 275.375307] ? may_umount+0xb0/0xb0 [ 275.378918] ? _raw_read_unlock+0x2c/0x50 [ 275.383053] ? __get_fs_type+0x97/0xc0 [ 275.386925] do_mount+0x581/0x31f0 [ 275.390447] ? kasan_check_read+0x11/0x20 [ 275.394592] ? do_raw_spin_unlock+0xa7/0x2f0 [ 275.398986] ? copy_mount_string+0x40/0x40 [ 275.403202] ? kasan_check_write+0x14/0x20 [ 275.407420] ? kasan_unpoison_shadow+0x35/0x50 [ 275.411999] ? kasan_kmalloc+0xc7/0xe0 [ 275.415909] ? kmem_cache_alloc_trace+0x31f/0x750 [ 275.420836] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.426379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.431896] ? copy_mount_options+0x288/0x380 [ 275.436375] ksys_mount+0x12d/0x140 [ 275.439989] __x64_sys_mount+0xbe/0x150 [ 275.443954] do_syscall_64+0x1b9/0x820 [ 275.447831] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 275.453179] ? syscall_return_slowpath+0x5e0/0x5e0 [ 275.458094] ? trace_hardirqs_on_caller+0x310/0x310 [ 275.463100] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 275.468114] ? recalc_sigpending_tsk+0x180/0x180 [ 275.472853] ? kasan_check_write+0x14/0x20 [ 275.477076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.481905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.487078] RIP: 0033:0x457579 21:38:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:25 executing program 3 (fault-call:4 fault-nth:53): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 275.490346] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.509405] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 275.517097] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 275.524357] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 275.531610] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 275.538881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 275.546133] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) 21:38:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, r1) [ 275.664937] FAULT_INJECTION: forcing a failure. [ 275.664937] name failslab, interval 1, probability 0, space 0, times 0 [ 275.702092] 9pnet: Insufficient options for proto=fd [ 275.704512] CPU: 0 PID: 10086 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 275.714512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.723875] Call Trace: [ 275.726484] dump_stack+0x1c4/0x2b4 [ 275.730130] ? dump_stack_print_info.cold.2+0x52/0x52 [ 275.735337] ? ext4_htree_fill_tree+0x452/0xd60 [ 275.740023] should_fail.cold.4+0xa/0x17 [ 275.744105] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 275.749227] ? ___might_sleep+0x1ed/0x300 [ 275.753384] ? security_file_alloc+0x4c/0xa0 [ 275.757807] ? trace_hardirqs_on+0xbd/0x310 [ 275.762141] ? avc_has_perm_noaudit+0x424/0x630 [ 275.766817] ? lock_downgrade+0x900/0x900 [ 275.770981] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 275.776778] ? mark_held_locks+0x130/0x130 [ 275.781016] ? fs_reclaim_acquire+0x20/0x20 [ 275.785341] ? lock_downgrade+0x900/0x900 [ 275.786158] overlayfs: filesystem on './file0' not supported as upperdir [ 275.789494] ? ___might_sleep+0x1ed/0x300 [ 275.789509] ? avc_has_perm_noaudit+0x424/0x630 [ 275.789531] ? arch_local_save_flags+0x40/0x40 [ 275.809733] ? lock_downgrade+0x900/0x900 [ 275.813904] __should_failslab+0x124/0x180 [ 275.818149] should_failslab+0x9/0x14 [ 275.821970] kmem_cache_alloc+0x2be/0x730 [ 275.826134] __d_alloc+0xc8/0xcc0 [ 275.829618] ? avc_has_extended_perms+0x15a0/0x15a0 [ 275.834636] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 275.839653] ? arch_local_save_flags+0x40/0x40 [ 275.844232] ? make_kprojid+0x30/0x30 [ 275.848020] ? __might_sleep+0x95/0x190 [ 275.851992] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 275.857524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.863048] ? selinux_inode_permission+0xb7/0x750 [ 275.867963] ? selinux_capable+0x40/0x40 [ 275.872015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.877538] d_alloc+0x96/0x380 [ 275.880806] ? __d_alloc+0xcc0/0xcc0 [ 275.884506] ? security_inode_permission+0xd2/0x100 [ 275.889511] ? inode_permission+0xb2/0x560 [ 275.893735] vfs_tmpfile+0xd2/0x2a0 [ 275.897351] ovl_fill_super+0xe70/0x3f7b [ 275.901405] ? ovl_show_options+0x550/0x550 [ 275.905721] ? __free_pages+0x163/0x190 [ 275.909703] ? selinux_sb_copy_data+0x602/0x740 [ 275.914362] ? selinux_capable+0x36/0x40 [ 275.918413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.923938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.929462] ? get_anon_bdev+0xc0/0xc0 [ 275.933341] ? sget+0x113/0x150 [ 275.936629] ? ovl_show_options+0x550/0x550 [ 275.940946] mount_nodev+0x6b/0x110 [ 275.944562] ovl_mount+0x2c/0x40 [ 275.947923] mount_fs+0xae/0x31d [ 275.951278] vfs_kern_mount.part.35+0xdc/0x4f0 [ 275.955851] ? may_umount+0xb0/0xb0 [ 275.959464] ? _raw_read_unlock+0x2c/0x50 [ 275.963610] ? __get_fs_type+0x97/0xc0 [ 275.967488] do_mount+0x581/0x31f0 [ 275.971015] ? kasan_check_read+0x11/0x20 [ 275.975161] ? do_raw_spin_unlock+0xa7/0x2f0 [ 275.979589] ? copy_mount_string+0x40/0x40 [ 275.983815] ? kasan_check_write+0x14/0x20 [ 275.988034] ? kasan_unpoison_shadow+0x35/0x50 [ 275.992611] ? kasan_kmalloc+0xc7/0xe0 [ 275.996491] ? kmem_cache_alloc_trace+0x31f/0x750 [ 276.001322] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.006852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.012376] ? copy_mount_options+0x288/0x380 [ 276.016859] ksys_mount+0x12d/0x140 [ 276.020475] __x64_sys_mount+0xbe/0x150 [ 276.024439] do_syscall_64+0x1b9/0x820 [ 276.028315] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.033685] ? syscall_return_slowpath+0x5e0/0x5e0 [ 276.038613] ? trace_hardirqs_on_caller+0x310/0x310 [ 276.043619] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 276.048629] ? recalc_sigpending_tsk+0x180/0x180 [ 276.053369] ? kasan_check_write+0x14/0x20 [ 276.057618] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.062450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.067626] RIP: 0033:0x457579 [ 276.070805] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.089701] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 276.097416] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 276.104684] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 21:38:25 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4025f9, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:25 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x408004, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r2) 21:38:25 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYBLOB], 0x1a) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:25 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x6000000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:26 executing program 3 (fault-call:4 fault-nth:54): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:26 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x200000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 276.111936] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 276.119194] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 276.126451] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 276.142635] overlayfs: upper fs does not support tmpfile. 21:38:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) setregid(0x0, 0x0) [ 276.243380] 9pnet: Insufficient options for proto=fd 21:38:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) setregid(0x0, 0x0) 21:38:26 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400011, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 276.304675] overlayfs: filesystem on './file0' not supported as upperdir 21:38:26 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYBLOB], 0x1a) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 276.349279] FAULT_INJECTION: forcing a failure. [ 276.349279] name failslab, interval 1, probability 0, space 0, times 0 [ 276.385212] CPU: 1 PID: 10127 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 276.392512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.401875] Call Trace: [ 276.404488] dump_stack+0x1c4/0x2b4 [ 276.404515] ? dump_stack_print_info.cold.2+0x52/0x52 [ 276.404544] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 276.419152] should_fail.cold.4+0xa/0x17 [ 276.423229] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.428349] ? is_bpf_text_address+0xd3/0x170 [ 276.432852] ? kernel_text_address+0x79/0xf0 [ 276.437267] ? __kernel_text_address+0xd/0x40 [ 276.441776] ? ___ratelimit.cold.2+0x6b/0x6b 21:38:26 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x80ffff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 276.446204] ? __save_stack_trace+0x8d/0xf0 [ 276.450546] ? mark_held_locks+0x130/0x130 [ 276.455003] ? save_stack+0xa9/0xd0 [ 276.458640] ? save_stack+0x43/0xd0 [ 276.462278] ? kasan_kmalloc+0xc7/0xe0 [ 276.466181] ? __kmalloc+0x14e/0x760 [ 276.469913] ? htree_dirblock_to_tree+0x56b/0xae0 [ 276.474767] ? ext4_htree_fill_tree+0x40c/0xd60 [ 276.479428] ? ext4_readdir+0x1ca1/0x3c30 [ 276.483588] ? iterate_dir+0x48c/0x5d0 [ 276.487473] ? ovl_check_d_type_supported+0x272/0x480 [ 276.492649] ? ovl_fill_super+0xe12/0x3f7b [ 276.496875] ? ___might_sleep+0x1ed/0x300 [ 276.501009] ? arch_local_save_flags+0x40/0x40 [ 276.505584] ? mark_held_locks+0x130/0x130 [ 276.509999] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.515355] ? ext4_issue_zeroout+0x190/0x190 [ 276.519837] __should_failslab+0x124/0x180 [ 276.524061] should_failslab+0x9/0x14 [ 276.527850] kmem_cache_alloc+0x2be/0x730 [ 276.531999] ? ___might_sleep+0x1ed/0x300 [ 276.536152] ? ratelimit_state_init+0xb0/0xb0 [ 276.540638] ext4_alloc_inode+0xc7/0x870 [ 276.544689] ? ext4_htree_store_dirent+0x8d/0x5a0 [ 276.549518] ? ratelimit_state_init+0xb0/0xb0 [ 276.554007] ? kasan_unpoison_shadow+0x35/0x50 [ 276.558600] ? kasan_kmalloc+0xc7/0xe0 [ 276.562489] ? get_cached_acl+0x35c/0x460 [ 276.566635] ? lock_downgrade+0x900/0x900 [ 276.570783] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 276.576672] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 276.581694] ? modules_open+0xa0/0xa0 [ 276.585486] ? ratelimit_state_init+0xb0/0xb0 [ 276.589972] alloc_inode+0x63/0x190 [ 276.593595] new_inode_pseudo+0x71/0x1a0 [ 276.597643] ? prune_icache_sb+0x1c0/0x1c0 [ 276.601864] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 276.607656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.613180] ? __ext4_xattr_set_credits+0x3ae/0x520 [ 276.618181] new_inode+0x1c/0x40 [ 276.621535] __ext4_new_inode+0x4cd/0x65b0 [ 276.625758] ? is_bpf_text_address+0xd3/0x170 [ 276.630344] ? __kernel_text_address+0xd/0x40 [ 276.634826] ? unwind_get_return_address+0x61/0xa0 [ 276.639743] ? ext4_free_inode+0x1a10/0x1a10 [ 276.644158] ? save_stack+0xa9/0xd0 [ 276.647768] ? save_stack+0x43/0xd0 [ 276.651509] ? kasan_kmalloc+0xc7/0xe0 [ 276.655379] ? kasan_slab_alloc+0x12/0x20 [ 276.659515] ? kmem_cache_alloc+0x12e/0x730 [ 276.663819] ? __d_alloc+0xc8/0xcc0 [ 276.667432] ? d_alloc+0x96/0x380 [ 276.670877] ? vfs_tmpfile+0xd2/0x2a0 [ 276.674701] ? ovl_fill_super+0xe70/0x3f7b [ 276.678922] ? mount_nodev+0x6b/0x110 [ 276.682706] ? mount_fs+0xae/0x31d [ 276.686235] ? mark_held_locks+0x130/0x130 [ 276.690474] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.695828] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 276.701614] ? mark_held_locks+0x130/0x130 [ 276.705844] ? fs_reclaim_acquire+0x20/0x20 [ 276.710154] ? lock_downgrade+0x900/0x900 [ 276.714401] ? ___might_sleep+0x1ed/0x300 [ 276.719136] ? avc_has_perm_noaudit+0x424/0x630 [ 276.723792] ? trace_hardirqs_on+0xbd/0x310 [ 276.728100] ? __d_alloc+0xc8/0xcc0 [ 276.731717] ? kasan_unpoison_shadow+0x35/0x50 [ 276.736284] ? kasan_kmalloc+0xc7/0xe0 [ 276.740175] ? kasan_slab_alloc+0x12/0x20 [ 276.744315] ? kmem_cache_alloc+0x306/0x730 [ 276.748623] ? __lockdep_init_map+0x105/0x590 [ 276.753115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.758638] ? d_set_d_op+0x31d/0x410 [ 276.762424] ? __d_alloc+0x73f/0xcc0 [ 276.766133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.771665] ? __dquot_initialize+0x629/0xdd0 [ 276.776148] ? lock_downgrade+0x900/0x900 [ 276.780281] ? dquot_get_next_dqblk+0x180/0x180 [ 276.784934] ? kasan_check_read+0x11/0x20 [ 276.789068] ? do_raw_spin_unlock+0xa7/0x2f0 [ 276.793468] ext4_tmpfile+0x187/0x4e0 [ 276.797264] ? ext4_orphan_add+0xdb0/0xdb0 [ 276.801486] ? security_inode_permission+0xd2/0x100 [ 276.806486] ? inode_permission+0xb2/0x560 [ 276.810704] vfs_tmpfile+0x13b/0x2a0 [ 276.814422] ovl_fill_super+0xe70/0x3f7b [ 276.818477] ? ovl_show_options+0x550/0x550 [ 276.822788] ? __free_pages+0x163/0x190 [ 276.826755] ? selinux_sb_copy_data+0x602/0x740 [ 276.831431] ? selinux_capable+0x36/0x40 [ 276.835480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.841005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.846536] ? get_anon_bdev+0xc0/0xc0 [ 276.850409] ? sget+0x113/0x150 [ 276.853676] ? ovl_show_options+0x550/0x550 [ 276.857983] mount_nodev+0x6b/0x110 [ 276.861602] ovl_mount+0x2c/0x40 [ 276.864959] mount_fs+0xae/0x31d [ 276.868318] vfs_kern_mount.part.35+0xdc/0x4f0 [ 276.872887] ? may_umount+0xb0/0xb0 [ 276.876500] ? _raw_read_unlock+0x2c/0x50 [ 276.880637] ? __get_fs_type+0x97/0xc0 [ 276.884510] do_mount+0x581/0x31f0 [ 276.888037] ? kasan_check_read+0x11/0x20 [ 276.892170] ? do_raw_spin_unlock+0xa7/0x2f0 [ 276.896562] ? copy_mount_string+0x40/0x40 [ 276.900790] ? kasan_check_write+0x14/0x20 [ 276.905012] ? kasan_unpoison_shadow+0x35/0x50 [ 276.909591] ? kasan_kmalloc+0xc7/0xe0 [ 276.913473] ? kmem_cache_alloc_trace+0x31f/0x750 [ 276.918313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.923856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.929385] ? copy_mount_options+0x288/0x380 [ 276.933869] ksys_mount+0x12d/0x140 [ 276.937483] __x64_sys_mount+0xbe/0x150 [ 276.941456] do_syscall_64+0x1b9/0x820 [ 276.945347] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 276.950713] ? syscall_return_slowpath+0x5e0/0x5e0 [ 276.955632] ? trace_hardirqs_on_caller+0x310/0x310 [ 276.960635] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 276.965639] ? recalc_sigpending_tsk+0x180/0x180 [ 276.970392] ? kasan_check_write+0x14/0x20 [ 276.974628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.979461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.984633] RIP: 0033:0x457579 [ 276.987816] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.006865] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 277.015487] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 277.022746] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 277.030015] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 277.037268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 277.044536] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:26 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402616, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:26 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400060, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:26 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40e201, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r1, 0x1000002192c04) setregid(0x0, 0x0) 21:38:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) [ 277.060007] overlayfs: upper fs does not support tmpfile. 21:38:26 executing program 3 (fault-call:4 fault-nth:55): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 277.167095] 9pnet: Insufficient options for proto=fd 21:38:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) 21:38:27 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40cc03, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:27 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYRES64=0x0, @ANYBLOB], 0x1a) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 277.223725] overlayfs: filesystem on './file0' not supported as upperdir [ 277.233739] overlayfs: filesystem on './file0' not supported as upperdir [ 277.244074] FAULT_INJECTION: forcing a failure. [ 277.244074] name failslab, interval 1, probability 0, space 0, times 0 21:38:27 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4003fa, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) [ 277.280958] CPU: 0 PID: 10159 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 277.288264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.297636] Call Trace: [ 277.300250] dump_stack+0x1c4/0x2b4 [ 277.303899] ? dump_stack_print_info.cold.2+0x52/0x52 [ 277.309109] should_fail.cold.4+0xa/0x17 [ 277.313187] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.318300] ? mark_held_locks+0x130/0x130 [ 277.322540] ? __debug_object_init+0x57d/0x1290 21:38:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) [ 277.327232] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 277.327249] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 277.327270] ? kasan_check_write+0x14/0x20 [ 277.341531] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 277.346640] ? __debug_object_init+0x57d/0x1290 [ 277.346658] ? debug_object_activate+0x402/0x600 [ 277.346678] ? lock_downgrade+0x900/0x900 [ 277.360232] ? kasan_check_read+0x11/0x20 [ 277.364396] ? debug_object_activate+0x402/0x600 [ 277.369167] ? ___might_sleep+0x1ed/0x300 [ 277.373330] ? arch_local_save_flags+0x40/0x40 [ 277.377924] ? debug_object_active_state+0x2f5/0x4d0 [ 277.383071] ? lock_downgrade+0x900/0x900 [ 277.387234] __should_failslab+0x124/0x180 [ 277.391487] should_failslab+0x9/0x14 [ 277.395298] kmem_cache_alloc+0x2be/0x730 [ 277.395315] ? lock_acquire+0x1ed/0x520 [ 277.395340] ? ext4_xattr_set_credits.part.31+0x33/0x120 [ 277.403451] jbd2__journal_start+0x1e7/0xa90 [ 277.403469] ? arch_local_save_flags+0x40/0x40 [ 277.403489] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 277.403509] ? __might_sleep+0x95/0x190 [ 277.427614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.433141] __ext4_journal_start_sb+0x1a5/0x5f0 [ 277.437887] ? ext4_xattr_set+0x1f7/0x420 [ 277.442021] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 277.447718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.453244] ? __ext4_xattr_set_credits+0x3ae/0x520 [ 277.458248] ? up_read+0x1a/0x110 [ 277.461693] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 277.467137] ext4_xattr_set+0x1f7/0x420 [ 277.471104] ? ext4_xattr_set_credits+0x120/0x120 [ 277.475936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.481461] ? evm_protected_xattr+0x206/0x290 [ 277.486032] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 277.491038] ? ext4_xattr_destroy_cache+0x30/0x30 [ 277.495865] ext4_xattr_trusted_set+0x36/0x40 [ 277.500349] __vfs_setxattr+0x124/0x180 [ 277.504311] ? xattr_resolve_name+0x430/0x430 [ 277.508800] __vfs_setxattr_noperm+0x11d/0x410 [ 277.513382] vfs_setxattr+0xd8/0x100 [ 277.517101] ovl_fill_super+0xf26/0x3f7b [ 277.521172] ? ovl_show_options+0x550/0x550 [ 277.525491] ? __free_pages+0x163/0x190 [ 277.529457] ? selinux_sb_copy_data+0x602/0x740 [ 277.534116] ? selinux_capable+0x36/0x40 [ 277.538164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.543688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.549214] ? get_anon_bdev+0xc0/0xc0 [ 277.553089] ? sget+0x113/0x150 [ 277.556359] ? ovl_show_options+0x550/0x550 [ 277.560666] mount_nodev+0x6b/0x110 [ 277.564290] ovl_mount+0x2c/0x40 [ 277.567641] mount_fs+0xae/0x31d [ 277.570998] vfs_kern_mount.part.35+0xdc/0x4f0 [ 277.575584] ? may_umount+0xb0/0xb0 [ 277.579222] ? _raw_read_unlock+0x2c/0x50 [ 277.583357] ? __get_fs_type+0x97/0xc0 [ 277.587234] do_mount+0x581/0x31f0 [ 277.590762] ? copy_mount_string+0x40/0x40 [ 277.594986] ? kasan_unpoison_shadow+0x35/0x50 [ 277.599556] ? kasan_kmalloc+0xc7/0xe0 [ 277.603442] ? kmem_cache_alloc_trace+0x31f/0x750 [ 277.608271] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 277.613797] ? _copy_from_user+0xdf/0x150 [ 277.617931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.623664] ? copy_mount_options+0x288/0x380 [ 277.628144] ksys_mount+0x12d/0x140 [ 277.631762] __x64_sys_mount+0xbe/0x150 [ 277.635729] do_syscall_64+0x1b9/0x820 [ 277.639615] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 277.644967] ? syscall_return_slowpath+0x5e0/0x5e0 [ 277.649887] ? trace_hardirqs_on_caller+0x310/0x310 [ 277.654889] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 277.659893] ? recalc_sigpending_tsk+0x180/0x180 [ 277.664634] ? kasan_check_write+0x14/0x20 [ 277.668861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.673693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.678866] RIP: 0033:0x457579 [ 277.682054] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.700962] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 277.708673] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 277.715928] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 277.723197] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 21:38:27 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400480, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) 21:38:27 executing program 3 (fault-call:4 fault-nth:56): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) [ 277.730451] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 277.737704] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 277.745615] overlayfs: upper fs does not support xattr, falling back to index=off and metacopy=off. [ 277.878372] 9pnet: Insufficient options for proto=fd [ 277.904242] FAULT_INJECTION: forcing a failure. [ 277.904242] name failslab, interval 1, probability 0, space 0, times 0 [ 277.915523] CPU: 1 PID: 10188 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 277.922803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.932156] Call Trace: [ 277.934759] dump_stack+0x1c4/0x2b4 [ 277.938404] ? dump_stack_print_info.cold.2+0x52/0x52 [ 277.943836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.949392] ? add_transaction_credits+0x3f9/0xe50 [ 277.955049] should_fail.cold.4+0xa/0x17 [ 277.959134] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 277.964251] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 277.970055] ? kasan_check_read+0x11/0x20 [ 277.974217] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 277.974242] ? hashtab_stat+0x1f0/0x1f0 [ 277.983482] ? security_compute_sid+0xe71/0x1f40 [ 277.983500] ? lock_downgrade+0x900/0x900 [ 277.983520] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 277.997411] ? ebitmap_contains+0x233/0x520 21:38:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) 21:38:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) 21:38:27 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40002c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) 21:38:27 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYRES16=r0, @ANYBLOB], 0x12) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 278.001743] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 278.006768] ? ebitmap_cmp+0x227/0x2c0 [ 278.010674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.016227] ? sidtab_context_to_sid+0xf01/0x1290 [ 278.021078] ? mls_context_isvalid+0x55/0x340 [ 278.025604] ? memset+0x31/0x40 [ 278.028899] ? security_compute_sid+0x19a/0x1f40 [ 278.033674] __should_failslab+0x124/0x180 [ 278.037927] should_failslab+0x9/0x14 [ 278.042279] __kmalloc+0x63/0x760 [ 278.045757] ? flex_array_get+0x1da/0x260 [ 278.049737] overlayfs: filesystem on './file0' not supported as upperdir [ 278.049916] ? context_struct_to_string+0x401/0x900 [ 278.061771] context_struct_to_string+0x401/0x900 [ 278.062339] overlayfs: filesystem on './file0' not supported as upperdir [ 278.066633] ? get_permissions_callback+0xb0/0xb0 [ 278.066650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.066671] ? sidtab_search_core+0x21f/0x3b0 [ 278.088361] security_sid_to_context_core.isra.12+0x229/0x2f0 [ 278.094263] security_sid_to_context_force+0x38/0x50 [ 278.099380] selinux_inode_init_security+0x416/0x890 21:38:27 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x403000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:27 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400600, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) [ 278.104495] ? current_time+0x72/0x1b0 [ 278.108401] ? selinux_inode_create+0x30/0x30 [ 278.112924] ? get_cached_acl+0x383/0x460 [ 278.117099] security_inode_init_security+0x15d/0x3d0 [ 278.122312] ? ext4_init_acl+0x300/0x300 [ 278.126385] ? unregister_lsm_notifier+0x20/0x20 [ 278.131146] ? ext4_init_acl+0x1d6/0x300 [ 278.135221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.140769] ? check_preemption_disabled+0x48/0x200 [ 278.145803] ext4_init_security+0x34/0x40 [ 278.149964] __ext4_new_inode+0x4a6a/0x65b0 21:38:28 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) 21:38:28 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) [ 278.154310] ? ext4_free_inode+0x1a10/0x1a10 [ 278.158738] ? save_stack+0xa9/0xd0 [ 278.162372] ? save_stack+0x43/0xd0 [ 278.166009] ? kasan_kmalloc+0xc7/0xe0 [ 278.169905] ? kasan_slab_alloc+0x12/0x20 [ 278.174078] ? kmem_cache_alloc+0x12e/0x730 [ 278.178417] ? __d_alloc+0xc8/0xcc0 [ 278.182055] ? d_alloc+0x96/0x380 [ 278.185678] ? vfs_tmpfile+0xd2/0x2a0 [ 278.189495] ? mount_nodev+0x6b/0x110 [ 278.193307] ? mount_fs+0xae/0x31d [ 278.196860] ? mark_held_locks+0x130/0x130 [ 278.201118] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.206826] ? mark_held_locks+0x130/0x130 [ 278.211227] ? fs_reclaim_acquire+0x20/0x20 [ 278.215557] ? lock_downgrade+0x900/0x900 [ 278.219731] ? ___might_sleep+0x1ed/0x300 [ 278.223886] ? avc_has_perm_noaudit+0x424/0x630 [ 278.228561] ? __d_alloc+0xc8/0xcc0 [ 278.232206] ? kasan_unpoison_shadow+0x35/0x50 [ 278.236801] ? kasan_kmalloc+0xc7/0xe0 [ 278.240706] ? kasan_slab_alloc+0x12/0x20 [ 278.244870] ? kmem_cache_alloc+0x306/0x730 [ 278.249190] ? __lockdep_init_map+0x105/0x590 [ 278.253677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.259204] ? d_set_d_op+0x31d/0x410 [ 278.262991] ? __d_alloc+0x73f/0xcc0 [ 278.266701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.272225] ? __dquot_initialize+0x629/0xdd0 [ 278.276712] ? lock_downgrade+0x900/0x900 [ 278.280860] ? dquot_get_next_dqblk+0x180/0x180 [ 278.285516] ? kasan_check_read+0x11/0x20 [ 278.289667] ? do_raw_spin_unlock+0xa7/0x2f0 [ 278.294067] ext4_tmpfile+0x187/0x4e0 [ 278.297857] ? ext4_orphan_add+0xdb0/0xdb0 [ 278.302080] ? security_inode_permission+0xd2/0x100 [ 278.307084] ? inode_permission+0xb2/0x560 [ 278.311306] vfs_tmpfile+0x13b/0x2a0 [ 278.315008] ovl_fill_super+0xe70/0x3f7b [ 278.319061] ? ovl_show_options+0x550/0x550 [ 278.323370] ? __free_pages+0x163/0x190 [ 278.327349] ? selinux_sb_copy_data+0x602/0x740 [ 278.332019] ? selinux_capable+0x36/0x40 [ 278.336073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.341614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.347137] ? get_anon_bdev+0xc0/0xc0 [ 278.351026] ? sget+0x113/0x150 [ 278.354291] ? ovl_show_options+0x550/0x550 [ 278.358604] mount_nodev+0x6b/0x110 [ 278.362219] ovl_mount+0x2c/0x40 [ 278.365569] mount_fs+0xae/0x31d [ 278.368931] vfs_kern_mount.part.35+0xdc/0x4f0 [ 278.373499] ? may_umount+0xb0/0xb0 [ 278.377125] ? _raw_read_unlock+0x2c/0x50 [ 278.381275] ? __get_fs_type+0x97/0xc0 [ 278.385151] do_mount+0x581/0x31f0 [ 278.388677] ? trace_hardirqs_off+0x310/0x310 [ 278.393158] ? retint_kernel+0x1b/0x2d [ 278.397030] ? copy_mount_string+0x40/0x40 [ 278.401252] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 278.405993] ? trace_hardirqs_off+0xaf/0x310 [ 278.410389] ? retint_kernel+0x2d/0x2d [ 278.414266] ? copy_mount_options+0x214/0x380 [ 278.418745] ? copy_mount_options+0x217/0x380 [ 278.423228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.428750] ? copy_mount_options+0x288/0x380 [ 278.433247] ksys_mount+0x12d/0x140 [ 278.436862] __x64_sys_mount+0xbe/0x150 [ 278.440826] do_syscall_64+0x1b9/0x820 [ 278.444706] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 278.450055] ? syscall_return_slowpath+0x5e0/0x5e0 [ 278.454972] ? trace_hardirqs_on_caller+0x310/0x310 [ 278.459973] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 278.464974] ? recalc_sigpending_tsk+0x180/0x180 [ 278.469724] ? kasan_check_write+0x14/0x20 [ 278.473955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.478783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.483955] RIP: 0033:0x457579 [ 278.487139] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.506023] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 278.513717] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 278.520969] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 278.528223] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 278.535478] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 278.542747] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:28 executing program 3 (fault-call:4 fault-nth:57): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:28 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) [ 278.552298] overlayfs: upper fs does not support tmpfile. [ 278.558236] ovl_get_fh: 20 callbacks suppressed [ 278.558240] overlayfs: invalid origin (7900) 21:38:28 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) [ 278.685149] overlayfs: invalid origin (7900) [ 278.705139] overlayfs: invalid origin (7900) [ 278.706411] FAULT_INJECTION: forcing a failure. [ 278.706411] name failslab, interval 1, probability 0, space 0, times 0 [ 278.710465] overlayfs: invalid origin (7900) [ 278.724967] CPU: 1 PID: 10225 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 278.732625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.733790] 9pnet: Insufficient options for proto=fd [ 278.741982] Call Trace: [ 278.742008] dump_stack+0x1c4/0x2b4 [ 278.742028] ? dump_stack_print_info.cold.2+0x52/0x52 [ 278.742054] should_fail.cold.4+0xa/0x17 [ 278.742074] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.758081] overlayfs: invalid origin (7900) [ 278.758552] ? __ext4_journal_stop+0x106/0x1f0 [ 278.758569] ? ext4_setattr+0x28f0/0x28f0 [ 278.758600] ? ext4_dirty_inode+0xb0/0xc0 21:38:28 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) [ 278.775729] overlayfs: filesystem on './file0' not supported as upperdir [ 278.776730] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 278.776754] ? __mark_inode_dirty+0x4b2/0x1510 [ 278.801445] ? __inode_attach_wb+0x13f0/0x13f0 [ 278.806043] ? kasan_check_read+0x11/0x20 [ 278.810206] ? do_raw_spin_unlock+0xa7/0x2f0 [ 278.814626] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 278.814645] ? kasan_check_write+0x14/0x20 [ 278.823448] ? do_raw_spin_lock+0xc1/0x200 [ 278.823470] ? ___might_sleep+0x1ed/0x300 [ 278.823486] ? inode_add_bytes+0xd3/0xf0 21:38:28 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x405c00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:28 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) [ 278.823506] ? arch_local_save_flags+0x40/0x40 [ 278.840504] ? __dquot_alloc_space+0x4b9/0x8c0 [ 278.845097] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 278.850146] __should_failslab+0x124/0x180 [ 278.854395] should_failslab+0x9/0x14 [ 278.858211] kmem_cache_alloc+0x2be/0x730 [ 278.862379] ext4_mb_new_blocks+0x787/0x4840 [ 278.866797] ? mark_held_locks+0x130/0x130 [ 278.871041] ? lock_downgrade+0x900/0x900 [ 278.875682] ? lock_downgrade+0x900/0x900 [ 278.879852] ? ext4_discard_preallocations+0x13c0/0x13c0 [ 278.885320] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 278.890440] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 278.895477] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 278.900259] ? is_bpf_text_address+0xac/0x170 [ 278.904769] ? lock_downgrade+0x900/0x900 [ 278.908933] ? iput+0x67e/0xa90 [ 278.912225] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 278.912242] ? kasan_check_read+0x11/0x20 [ 278.912256] ? inode_add_lru+0x2a0/0x2a0 [ 278.912276] ? rcu_bh_qs+0xc0/0xc0 [ 278.922213] ? unwind_dump+0x190/0x190 [ 278.922236] ? is_bpf_text_address+0xd3/0x170 [ 278.922255] ? kernel_text_address+0x79/0xf0 [ 278.922278] ? ext4_xattr_set_entry+0x18fb/0x3d70 [ 278.947505] ? ext4_xattr_inode_get+0xa20/0xa20 [ 278.952161] ? mount_fs+0xae/0x31d [ 278.955688] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 278.960425] ? do_mount+0x581/0x31f0 [ 278.964124] ? ksys_mount+0x12d/0x140 [ 278.967908] ? __x64_sys_mount+0xbe/0x150 [ 278.972044] ? do_syscall_64+0x1b9/0x820 [ 278.976090] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.981446] ? cache_grow_end+0xa8/0x190 [ 278.985495] ? lock_downgrade+0x900/0x900 [ 278.989631] ? kasan_check_read+0x11/0x20 [ 278.993763] ? do_raw_spin_unlock+0xa7/0x2f0 [ 278.998153] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 279.002721] ? trace_hardirqs_on+0xbd/0x310 [ 279.007030] ? kasan_check_write+0x14/0x20 [ 279.011249] ext4_new_meta_blocks+0x30a/0x520 [ 279.015728] ? ext4_should_retry_alloc+0x220/0x220 [ 279.020652] ? dquot_initialize_needed+0x192/0x290 [ 279.025569] ext4_xattr_block_set+0x1851/0x4490 [ 279.030226] ? ext4_xattr_inode_get+0xa20/0xa20 [ 279.034885] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 279.039537] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 279.045320] ? ext4_get_group_desc+0x1c6/0x2c0 [ 279.049886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.055408] ? __ext4_get_inode_loc+0x470/0x1330 [ 279.060154] ? jbd2_write_access_granted.part.8+0x264/0x410 [ 279.065852] ? jbd2_journal_file_inode+0x660/0x660 [ 279.070765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.076292] ? ext4_xattr_check_entries+0x133/0x430 [ 279.081312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.086853] ? xattr_find_entry+0x1e4/0x280 [ 279.091162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.096684] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 279.101340] ext4_xattr_set_handle+0xff4/0x1650 [ 279.105998] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 279.111263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.116786] ? ext4_xattr_set+0x1f7/0x420 [ 279.120921] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 279.126619] ? up_read+0x1a/0x110 [ 279.130074] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 279.135509] ext4_xattr_set+0x248/0x420 [ 279.139471] ? ext4_xattr_set_credits+0x120/0x120 [ 279.144299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.149821] ? evm_protected_xattr+0x206/0x290 [ 279.154388] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 279.159388] ? ext4_xattr_destroy_cache+0x30/0x30 [ 279.164217] ext4_xattr_trusted_set+0x36/0x40 [ 279.168696] __vfs_setxattr+0x124/0x180 [ 279.172655] ? xattr_resolve_name+0x430/0x430 [ 279.177136] __vfs_setxattr_noperm+0x11d/0x410 [ 279.181702] vfs_setxattr+0xd8/0x100 [ 279.185408] ovl_fill_super+0xf26/0x3f7b [ 279.189457] ? ovl_show_options+0x550/0x550 [ 279.193766] ? __free_pages+0x163/0x190 [ 279.197728] ? selinux_sb_copy_data+0x602/0x740 [ 279.202384] ? selinux_capable+0x36/0x40 [ 279.206432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.211958] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.217494] ? get_anon_bdev+0xc0/0xc0 [ 279.221362] ? sget+0x113/0x150 [ 279.224627] ? ovl_show_options+0x550/0x550 [ 279.228934] mount_nodev+0x6b/0x110 [ 279.232545] ovl_mount+0x2c/0x40 [ 279.235894] mount_fs+0xae/0x31d [ 279.239244] vfs_kern_mount.part.35+0xdc/0x4f0 [ 279.243826] ? may_umount+0xb0/0xb0 [ 279.247439] ? _raw_read_unlock+0x2c/0x50 [ 279.251567] ? __get_fs_type+0x97/0xc0 [ 279.255445] do_mount+0x581/0x31f0 [ 279.258985] ? copy_mount_string+0x40/0x40 [ 279.263208] ? kasan_unpoison_shadow+0x35/0x50 [ 279.267774] ? kasan_kmalloc+0xc7/0xe0 [ 279.271696] ? kmem_cache_alloc_trace+0x31f/0x750 [ 279.276524] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.282051] ? _copy_from_user+0xdf/0x150 [ 279.286185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.291704] ? copy_mount_options+0x288/0x380 [ 279.296185] ksys_mount+0x12d/0x140 [ 279.299799] __x64_sys_mount+0xbe/0x150 [ 279.303763] do_syscall_64+0x1b9/0x820 [ 279.307634] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 279.312994] ? syscall_return_slowpath+0x5e0/0x5e0 [ 279.317927] ? trace_hardirqs_on_caller+0x310/0x310 [ 279.322929] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 279.327946] ? recalc_sigpending_tsk+0x180/0x180 [ 279.332686] ? kasan_check_write+0x14/0x20 [ 279.336905] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.341733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.346904] RIP: 0033:0x457579 [ 279.350085] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.368974] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 279.376665] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 21:38:29 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRESHEX, @ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYRES64, @ANYRESDEC, @ANYRESOCT=r0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="da0fdfc5fcdebb266bf667990e504e827603513c5b3fd00cb6c2f6871dfa7978c4e752d607b843982a25ac3738a2e0c381d0137a5d534506ccab06366efcf5788339b1d6a1099f2a3ddad5ee90a35f364d6c4699cc", @ANYRES32=r0]], @ANYBLOB], 0x10) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) 21:38:29 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40f803, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:29 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0xa0ffff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:29 executing program 3 (fault-call:4 fault-nth:58): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) [ 279.383920] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 279.391172] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 279.398426] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 279.405681] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 279.414717] overlayfs: upper fs does not support xattr, falling back to index=off and metacopy=off. 21:38:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r0) [ 279.551372] overlayfs: invalid origin (7900) [ 279.567010] overlayfs: invalid origin (7900) [ 279.574639] FAULT_INJECTION: forcing a failure. [ 279.574639] name failslab, interval 1, probability 0, space 0, times 0 [ 279.581270] overlayfs: invalid origin (7900) 21:38:29 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x5000000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 279.597652] overlayfs: filesystem on './file0' not supported as upperdir [ 279.600699] 9pnet: Insufficient options for proto=fd [ 279.631792] CPU: 1 PID: 10250 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 279.639087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.648447] Call Trace: 21:38:29 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x6000000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 279.651034] dump_stack+0x1c4/0x2b4 [ 279.652209] overlayfs: invalid origin (7900) [ 279.654663] ? dump_stack_print_info.cold.2+0x52/0x52 [ 279.654681] ? trace_hardirqs_on+0xbd/0x310 [ 279.654701] ? kasan_check_read+0x11/0x20 [ 279.672759] ? debug_object_activate+0x402/0x600 [ 279.677542] should_fail.cold.4+0xa/0x17 [ 279.681621] ? trace_hardirqs_on+0xbd/0x310 [ 279.685955] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.691059] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.696595] ? check_preemption_disabled+0x48/0x200 [ 279.701611] ? __find_get_block+0x3be/0xf20 [ 279.705942] ? mark_held_locks+0x130/0x130 [ 279.710169] ? iput+0x67e/0xa90 [ 279.713439] ? ___might_sleep+0x1ed/0x300 [ 279.717570] ? inode_add_lru+0x2a0/0x2a0 [ 279.721634] ? ___might_sleep+0x1ed/0x300 [ 279.725768] ? __might_sleep+0x95/0x190 [ 279.729730] ? arch_local_save_flags+0x40/0x40 [ 279.734315] ? __getblk_gfp+0x11b/0xd50 [ 279.738280] __should_failslab+0x124/0x180 [ 279.742512] should_failslab+0x9/0x14 [ 279.746315] __kmalloc+0x2d4/0x760 [ 279.749848] ? start_this_handle+0x581/0x1250 [ 279.754329] ? ext4_xattr_block_set+0xa94/0x4490 [ 279.759071] ext4_xattr_block_set+0xa94/0x4490 [ 279.763663] ? ext4_xattr_inode_get+0xa20/0xa20 [ 279.768320] ? lock_downgrade+0x900/0x900 [ 279.772468] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 279.777132] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 279.782916] ? ext4_get_group_desc+0x1c6/0x2c0 [ 279.787485] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.793007] ? __ext4_get_inode_loc+0x470/0x1330 [ 279.797770] ? jbd2_write_access_granted.part.8+0x264/0x410 [ 279.803485] ? jbd2_journal_file_inode+0x660/0x660 [ 279.808431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.813954] ? ext4_xattr_check_entries+0x133/0x430 [ 279.818968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.824517] ? xattr_find_entry+0x1e4/0x280 [ 279.828839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.834380] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 279.839036] ext4_xattr_set_handle+0xff4/0x1650 [ 279.843706] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 279.848971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.854506] ? ext4_xattr_set+0x1f7/0x420 [ 279.858641] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 279.864339] ? up_read+0x1a/0x110 [ 279.867778] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 279.873218] ext4_xattr_set+0x248/0x420 [ 279.877184] ? ext4_xattr_set_credits+0x120/0x120 [ 279.882021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.887567] ? evm_protected_xattr+0x206/0x290 [ 279.892156] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 279.897174] ? ext4_xattr_destroy_cache+0x30/0x30 [ 279.902022] ext4_xattr_trusted_set+0x36/0x40 [ 279.906537] __vfs_setxattr+0x124/0x180 [ 279.910500] ? xattr_resolve_name+0x430/0x430 [ 279.914984] __vfs_setxattr_noperm+0x11d/0x410 [ 279.919555] vfs_setxattr+0xd8/0x100 [ 279.923282] ovl_fill_super+0xf26/0x3f7b [ 279.927337] ? ovl_show_options+0x550/0x550 [ 279.931646] ? __free_pages+0x163/0x190 [ 279.935624] ? selinux_sb_copy_data+0x602/0x740 [ 279.940292] ? selinux_capable+0x36/0x40 [ 279.944339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.949864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.955386] ? get_anon_bdev+0xc0/0xc0 [ 279.959257] ? sget+0x113/0x150 [ 279.962526] ? ovl_show_options+0x550/0x550 [ 279.966842] mount_nodev+0x6b/0x110 [ 279.970469] ovl_mount+0x2c/0x40 [ 279.975129] mount_fs+0xae/0x31d [ 279.978484] vfs_kern_mount.part.35+0xdc/0x4f0 [ 279.983051] ? may_umount+0xb0/0xb0 [ 279.986663] ? _raw_read_unlock+0x2c/0x50 [ 279.990799] ? __get_fs_type+0x97/0xc0 [ 279.994680] do_mount+0x581/0x31f0 [ 279.998212] ? copy_mount_string+0x40/0x40 [ 280.002438] ? kasan_unpoison_shadow+0x35/0x50 [ 280.007007] ? kasan_kmalloc+0xc7/0xe0 [ 280.010885] ? kmem_cache_alloc_trace+0x31f/0x750 [ 280.015724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.021256] ? _copy_from_user+0xdf/0x150 [ 280.025393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.030913] ? copy_mount_options+0x288/0x380 [ 280.035394] ksys_mount+0x12d/0x140 [ 280.039014] __x64_sys_mount+0xbe/0x150 [ 280.042976] do_syscall_64+0x1b9/0x820 [ 280.046849] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.052202] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.057133] ? trace_hardirqs_on_caller+0x310/0x310 [ 280.062143] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.067146] ? recalc_sigpending_tsk+0x180/0x180 [ 280.071884] ? kasan_check_write+0x14/0x20 [ 280.076112] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.080942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.086120] RIP: 0033:0x457579 21:38:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) [ 280.089302] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.108187] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 280.115878] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 280.123130] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 280.130381] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 280.137632] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 280.144886] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:30 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESOCT], @ANYBLOB], 0x8) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:30 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x600000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) [ 280.163177] overlayfs: upper fs does not support xattr, falling back to index=off and metacopy=off. 21:38:30 executing program 3 (fault-call:4 fault-nth:59): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:30 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4001e2, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 280.315884] 9pnet: Insufficient options for proto=fd 21:38:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) 21:38:30 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402641, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 280.340783] FAULT_INJECTION: forcing a failure. [ 280.340783] name failslab, interval 1, probability 0, space 0, times 0 [ 280.363276] overlayfs: invalid origin (7900) [ 280.398960] CPU: 1 PID: 10285 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 280.406278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.415638] Call Trace: [ 280.418250] dump_stack+0x1c4/0x2b4 [ 280.421899] ? dump_stack_print_info.cold.2+0x52/0x52 [ 280.427113] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 280.432419] should_fail.cold.4+0xa/0x17 [ 280.437001] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.443140] ? ext4_xattr_set+0x1f7/0x420 21:38:30 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 280.447960] ? mntput_no_expire+0x1ba/0xc00 [ 280.452851] ? lock_downgrade+0x900/0x900 [ 280.457495] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 280.464022] ? fs_reclaim_acquire+0x20/0x20 [ 280.468356] ? lock_downgrade+0x900/0x900 [ 280.472532] ? ___might_sleep+0x1ed/0x300 [ 280.476697] ? arch_local_save_flags+0x40/0x40 [ 280.481298] __should_failslab+0x124/0x180 [ 280.485542] should_failslab+0x9/0x14 [ 280.489369] __kmalloc_track_caller+0x2d0/0x750 [ 280.494049] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 21:38:30 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400007, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:30 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 280.499612] ? check_preemption_disabled+0x48/0x200 [ 280.504663] ? ovl_fill_super+0x12bf/0x3f7b [ 280.509001] kstrdup+0x39/0x70 [ 280.512208] ovl_fill_super+0x12bf/0x3f7b [ 280.516383] ? ovl_show_options+0x550/0x550 [ 280.520715] ? __free_pages+0x160/0x190 [ 280.524705] ? selinux_sb_copy_data+0x602/0x740 [ 280.529394] ? selinux_capable+0x36/0x40 [ 280.533466] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.539017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.544570] ? get_anon_bdev+0xc0/0xc0 21:38:30 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40d503, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 280.548479] ? sget+0x113/0x150 [ 280.551773] ? ovl_show_options+0x550/0x550 [ 280.556104] mount_nodev+0x6b/0x110 [ 280.556595] overlayfs: filesystem on './file0' not supported as upperdir [ 280.559757] ovl_mount+0x2c/0x40 [ 280.559772] mount_fs+0xae/0x31d [ 280.559796] vfs_kern_mount.part.35+0xdc/0x4f0 [ 280.577942] ? may_umount+0xb0/0xb0 [ 280.581594] ? _raw_read_unlock+0x2c/0x50 [ 280.585739] ? __get_fs_type+0x97/0xc0 [ 280.589620] do_mount+0x581/0x31f0 [ 280.593151] ? copy_mount_string+0x40/0x40 [ 280.597371] ? kasan_unpoison_shadow+0x35/0x50 [ 280.601936] ? kasan_kmalloc+0xc7/0xe0 [ 280.605821] ? kmem_cache_alloc_trace+0x31f/0x750 [ 280.610652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.616179] ? _copy_from_user+0xdf/0x150 [ 280.620314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.625841] ? copy_mount_options+0x288/0x380 [ 280.630323] ksys_mount+0x12d/0x140 [ 280.633938] __x64_sys_mount+0xbe/0x150 [ 280.637903] do_syscall_64+0x1b9/0x820 [ 280.641787] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.647140] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.652069] ? trace_hardirqs_on_caller+0x310/0x310 [ 280.657077] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.662080] ? recalc_sigpending_tsk+0x180/0x180 [ 280.666850] ? kasan_check_write+0x14/0x20 [ 280.671071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.675900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.681078] RIP: 0033:0x457579 21:38:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setregid(0x0, 0x0) 21:38:30 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:30 executing program 3 (fault-call:4 fault-nth:60): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 280.684282] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.703183] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 280.710879] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 280.718132] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 280.725387] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 280.732639] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 280.739894] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setregid(0x0, 0x0) 21:38:30 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x408004, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 280.874885] 9pnet: Insufficient options for proto=fd [ 280.890742] FAULT_INJECTION: forcing a failure. [ 280.890742] name failslab, interval 1, probability 0, space 0, times 0 21:38:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) setregid(0x0, 0x0) [ 280.937669] overlayfs: filesystem on './file0' not supported as upperdir [ 280.942642] CPU: 1 PID: 10318 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 280.952472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.952478] Call Trace: [ 280.952508] dump_stack+0x1c4/0x2b4 [ 280.952531] ? dump_stack_print_info.cold.2+0x52/0x52 [ 280.952559] should_fail.cold.4+0xa/0x17 [ 280.952817] ? fault_create_debugfs_attr+0x1f0/0x1f0 21:38:30 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 280.952846] ? __ext4_journal_stop+0x106/0x1f0 [ 280.978428] ? ext4_setattr+0x28f0/0x28f0 [ 280.993123] ? ext4_dirty_inode+0xb0/0xc0 [ 280.997704] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 281.002984] ? __mark_inode_dirty+0x4b2/0x1510 [ 281.007592] ? __inode_attach_wb+0x13f0/0x13f0 [ 281.012188] ? kasan_check_read+0x11/0x20 [ 281.016351] ? do_raw_spin_unlock+0xa7/0x2f0 [ 281.020773] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 281.025370] ? kasan_check_write+0x14/0x20 [ 281.029624] ? do_raw_spin_lock+0xc1/0x200 [ 281.034122] ? ___might_sleep+0x1ed/0x300 [ 281.038284] ? inode_add_bytes+0xd3/0xf0 [ 281.042608] ? arch_local_save_flags+0x40/0x40 [ 281.042632] ? __dquot_alloc_space+0x4b9/0x8c0 [ 281.042656] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 281.042677] __should_failslab+0x124/0x180 [ 281.051838] should_failslab+0x9/0x14 [ 281.051856] kmem_cache_alloc+0x2be/0x730 [ 281.051879] ext4_mb_new_blocks+0x787/0x4840 [ 281.073746] ? mark_held_locks+0x130/0x130 [ 281.077981] ? lock_downgrade+0x900/0x900 [ 281.082132] ? lock_downgrade+0x900/0x900 [ 281.086298] ? ext4_discard_preallocations+0x13c0/0x13c0 [ 281.091750] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 281.096859] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 281.101883] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 281.106629] ? is_bpf_text_address+0xac/0x170 [ 281.111256] ? lock_downgrade+0x900/0x900 [ 281.115411] ? iput+0x67e/0xa90 [ 281.118681] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 281.124466] ? kasan_check_read+0x11/0x20 [ 281.128621] ? inode_add_lru+0x2a0/0x2a0 [ 281.132687] ? rcu_bh_qs+0xc0/0xc0 [ 281.136241] ? unwind_dump+0x190/0x190 [ 281.140191] ? is_bpf_text_address+0xd3/0x170 [ 281.144688] ? kernel_text_address+0x79/0xf0 [ 281.149088] ? ext4_xattr_set_entry+0x18fb/0x3d70 [ 281.153931] ? ext4_xattr_inode_get+0xa20/0xa20 [ 281.158592] ? mount_fs+0xae/0x31d [ 281.162126] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 281.166877] ? do_mount+0x581/0x31f0 [ 281.170586] ? ksys_mount+0x12d/0x140 [ 281.174391] ? __x64_sys_mount+0xbe/0x150 [ 281.178525] ? do_syscall_64+0x1b9/0x820 [ 281.182571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.187942] ? iput+0x67e/0xa90 [ 281.191229] ? ___might_sleep+0x1ed/0x300 [ 281.195375] ? __kmalloc+0x581/0x760 [ 281.199074] ? lock_downgrade+0x900/0x900 [ 281.203212] ? trace_hardirqs_on+0xbd/0x310 [ 281.207525] ext4_new_meta_blocks+0x30a/0x520 [ 281.212015] ? ext4_should_retry_alloc+0x220/0x220 [ 281.216935] ? dquot_initialize_needed+0x192/0x290 [ 281.221852] ext4_xattr_block_set+0x1851/0x4490 [ 281.226507] ? ext4_xattr_inode_get+0xa20/0xa20 [ 281.231190] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 281.235847] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 281.241642] ? ext4_get_group_desc+0x1c6/0x2c0 [ 281.246222] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 281.251761] ? __ext4_get_inode_loc+0x470/0x1330 [ 281.256506] ? jbd2_write_access_granted.part.8+0x264/0x410 [ 281.262203] ? jbd2_journal_file_inode+0x660/0x660 [ 281.267130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.272658] ? ext4_xattr_check_entries+0x133/0x430 [ 281.277683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.283208] ? xattr_find_entry+0x1e4/0x280 [ 281.287519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.293041] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 281.297696] ext4_xattr_set_handle+0xff4/0x1650 [ 281.302355] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 281.307622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.313150] ? ext4_xattr_set+0x1f7/0x420 [ 281.317285] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 281.322981] ? up_read+0x1a/0x110 [ 281.326418] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 281.331857] ext4_xattr_set+0x248/0x420 [ 281.335821] ? ext4_xattr_set_credits+0x120/0x120 [ 281.340653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.346176] ? evm_protected_xattr+0x206/0x290 [ 281.350758] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 281.355771] ? ext4_xattr_destroy_cache+0x30/0x30 [ 281.360616] ext4_xattr_trusted_set+0x36/0x40 [ 281.365117] __vfs_setxattr+0x124/0x180 [ 281.369097] ? xattr_resolve_name+0x430/0x430 [ 281.373596] __vfs_setxattr_noperm+0x11d/0x410 [ 281.378191] vfs_setxattr+0xd8/0x100 [ 281.382111] ovl_fill_super+0xf26/0x3f7b [ 281.386182] ? ovl_show_options+0x550/0x550 [ 281.390491] ? __free_pages+0x163/0x190 [ 281.394457] ? selinux_sb_copy_data+0x602/0x740 [ 281.399151] ? selinux_capable+0x36/0x40 [ 281.403209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.408732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.414255] ? get_anon_bdev+0xc0/0xc0 [ 281.418132] ? sget+0x113/0x150 [ 281.421401] ? ovl_show_options+0x550/0x550 [ 281.425719] mount_nodev+0x6b/0x110 [ 281.429342] ovl_mount+0x2c/0x40 [ 281.432703] mount_fs+0xae/0x31d [ 281.436061] vfs_kern_mount.part.35+0xdc/0x4f0 [ 281.440643] ? may_umount+0xb0/0xb0 [ 281.444257] ? _raw_read_unlock+0x2c/0x50 [ 281.448390] ? __get_fs_type+0x97/0xc0 [ 281.452263] do_mount+0x581/0x31f0 [ 281.455790] ? copy_mount_string+0x40/0x40 [ 281.460018] ? kasan_unpoison_shadow+0x35/0x50 [ 281.464594] ? kasan_kmalloc+0xc7/0xe0 [ 281.468488] ? kmem_cache_alloc_trace+0x31f/0x750 [ 281.473317] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 281.478844] ? _copy_from_user+0xdf/0x150 [ 281.482982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.488504] ? copy_mount_options+0x288/0x380 [ 281.492985] ksys_mount+0x12d/0x140 [ 281.496606] __x64_sys_mount+0xbe/0x150 [ 281.500575] do_syscall_64+0x1b9/0x820 [ 281.504468] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 281.509817] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.514733] ? trace_hardirqs_on_caller+0x310/0x310 [ 281.519737] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 281.524749] ? recalc_sigpending_tsk+0x180/0x180 [ 281.529511] ? kasan_check_write+0x14/0x20 [ 281.533736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.538569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.543751] RIP: 0033:0x457579 [ 281.546929] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.565815] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 281.573508] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 281.580765] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 21:38:31 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4000e0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:31 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40000b, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:31 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402200, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:31 executing program 3 (fault-call:4 fault-nth:61): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 281.588020] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 281.595289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 281.602542] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 281.612560] overlayfs: upper fs does not support xattr, falling back to index=off and metacopy=off. 21:38:31 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4000e0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 281.742644] overlayfs: filesystem on './file0' not supported as upperdir [ 281.751621] FAULT_INJECTION: forcing a failure. [ 281.751621] name failslab, interval 1, probability 0, space 0, times 0 [ 281.751813] 9pnet: Insufficient options for proto=fd [ 281.769207] CPU: 0 PID: 10345 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 281.776495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.785844] Call Trace: [ 281.788442] dump_stack+0x1c4/0x2b4 [ 281.792092] ? dump_stack_print_info.cold.2+0x52/0x52 [ 281.797287] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 281.802570] should_fail.cold.4+0xa/0x17 [ 281.806656] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.811762] ? ext4_xattr_set+0x1f7/0x420 [ 281.815922] ? mntput_no_expire+0x1ba/0xc00 [ 281.820258] ? lock_downgrade+0x900/0x900 [ 281.824411] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 281.830212] ? fs_reclaim_acquire+0x20/0x20 [ 281.834533] ? lock_downgrade+0x900/0x900 [ 281.838687] ? ___might_sleep+0x1ed/0x300 [ 281.842838] ? arch_local_save_flags+0x40/0x40 [ 281.847428] __should_failslab+0x124/0x180 [ 281.851671] should_failslab+0x9/0x14 [ 281.855477] __kmalloc_track_caller+0x2d0/0x750 [ 281.860151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.865696] ? check_preemption_disabled+0x48/0x200 [ 281.870715] ? ovl_fill_super+0x12bf/0x3f7b [ 281.875041] kstrdup+0x39/0x70 [ 281.878239] ovl_fill_super+0x12bf/0x3f7b [ 281.882402] ? ovl_show_options+0x550/0x550 [ 281.886724] ? __free_pages+0x160/0x190 [ 281.890701] ? selinux_sb_copy_data+0x602/0x740 [ 281.895378] ? selinux_capable+0x36/0x40 [ 281.899444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.904984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.910523] ? get_anon_bdev+0xc0/0xc0 [ 281.914413] ? sget+0x113/0x150 [ 281.917705] ? ovl_show_options+0x550/0x550 [ 281.922028] mount_nodev+0x6b/0x110 [ 281.925657] ovl_mount+0x2c/0x40 [ 281.929022] mount_fs+0xae/0x31d [ 281.932421] vfs_kern_mount.part.35+0xdc/0x4f0 [ 281.937006] ? may_umount+0xb0/0xb0 [ 281.940639] ? _raw_read_unlock+0x2c/0x50 [ 281.944789] ? __get_fs_type+0x97/0xc0 [ 281.948682] do_mount+0x581/0x31f0 [ 281.952228] ? copy_mount_string+0x40/0x40 [ 281.956464] ? kasan_unpoison_shadow+0x35/0x50 [ 281.961043] ? kasan_kmalloc+0xc7/0xe0 [ 281.964945] ? kmem_cache_alloc_trace+0x31f/0x750 [ 281.969794] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 281.975333] ? _copy_from_user+0xdf/0x150 [ 281.979482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.985022] ? copy_mount_options+0x288/0x380 [ 281.989522] ksys_mount+0x12d/0x140 [ 281.993150] __x64_sys_mount+0xbe/0x150 [ 281.997133] do_syscall_64+0x1b9/0x820 [ 282.001021] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.006386] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.011330] ? trace_hardirqs_on_caller+0x310/0x310 [ 282.016350] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.021383] ? recalc_sigpending_tsk+0x180/0x180 [ 282.026137] ? kasan_check_write+0x14/0x20 [ 282.030377] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.035225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.040415] RIP: 0033:0x457579 [ 282.043625] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.062523] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 282.070233] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 282.077499] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 282.084771] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 21:38:31 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x6000000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:31 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:31 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400004, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:31 executing program 3 (fault-call:4 fault-nth:62): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:32 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 282.092036] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 282.099301] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 282.113414] overlayfs: filesystem on './file0' not supported as upperdir 21:38:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f00000001c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="000775b005e381e5b3b60ced5c54dbb7", 0x10) fcntl$setstatus(r0, 0x4, 0x2800) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r3, 0x6}, &(0x7f00000002c0)=0x8) r4 = accept$alg(r2, 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 21:38:32 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:32 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400010, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 282.282543] 9pnet: Insufficient options for proto=fd [ 282.288173] FAULT_INJECTION: forcing a failure. [ 282.288173] name failslab, interval 1, probability 0, space 0, times 0 [ 282.323489] CPU: 1 PID: 10371 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 282.330771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.340112] Call Trace: [ 282.342694] dump_stack+0x1c4/0x2b4 [ 282.346308] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.351482] ? save_stack+0xa9/0xd0 [ 282.355098] should_fail.cold.4+0xa/0x17 [ 282.359154] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.364243] ? __find_get_block+0x3be/0xf20 [ 282.368549] ? kasan_check_write+0x14/0x20 [ 282.372771] ? try_to_free_buffers+0xc80/0xc80 [ 282.377344] ? trace_hardirqs_on+0x310/0x310 [ 282.381738] ? debug_check_no_obj_freed+0x305/0x58d [ 282.386743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 282.392270] ? check_preemption_disabled+0x48/0x200 [ 282.397272] ? ___might_sleep+0x1ed/0x300 [ 282.401413] ? arch_local_save_flags+0x40/0x40 [ 282.405983] ? jbd2_journal_stop+0x430/0x15d0 [ 282.410464] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 282.415902] ? __might_sleep+0x95/0x190 [ 282.419862] ? ___might_sleep+0x1ed/0x300 [ 282.424005] ? __getblk_gfp+0x11b/0xd50 [ 282.427973] ? arch_local_save_flags+0x40/0x40 [ 282.432543] ? up_write+0x7b/0x220 [ 282.436075] ? up_read+0x110/0x110 [ 282.439612] __should_failslab+0x124/0x180 [ 282.443832] should_failslab+0x9/0x14 [ 282.447623] kmem_cache_alloc+0x2be/0x730 [ 282.451757] ? lock_acquire+0x1ed/0x520 [ 282.455718] ? ext4_xattr_set_credits.part.31+0x33/0x120 [ 282.461158] jbd2__journal_start+0x1e7/0xa90 [ 282.465552] ? arch_local_save_flags+0x40/0x40 [ 282.470141] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 282.475853] ? __might_sleep+0x95/0x190 [ 282.479829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.485354] __ext4_journal_start_sb+0x1a5/0x5f0 [ 282.490095] ? ext4_xattr_set+0x1f7/0x420 [ 282.494234] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 282.499933] ? __ext4_xattr_set_credits+0x3ae/0x520 [ 282.504938] ? up_read+0x1a/0x110 [ 282.508379] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 282.513819] ext4_xattr_set+0x1f7/0x420 [ 282.517786] ? ext4_xattr_set_credits+0x120/0x120 [ 282.522623] ? ima_inode_removexattr+0xc0/0xc0 [ 282.527211] ? inode_has_perm.isra.58+0x17a/0x210 [ 282.532054] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 282.537059] ext4_xattr_trusted_set+0x36/0x40 [ 282.541545] __vfs_removexattr+0x10f/0x170 [ 282.545764] ? ext4_xattr_destroy_cache+0x30/0x30 [ 282.550599] ? __vfs_getxattr+0x150/0x150 [ 282.554737] ? evm_inode_removexattr+0x47/0x60 [ 282.559307] vfs_removexattr+0xb4/0x1e0 [ 282.563271] ovl_fill_super+0xf6e/0x3f7b [ 282.567334] ? ovl_show_options+0x550/0x550 [ 282.571655] ? __free_pages+0x163/0x190 [ 282.575628] ? selinux_sb_copy_data+0x602/0x740 [ 282.580289] ? selinux_capable+0x36/0x40 [ 282.584347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.589869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.595392] ? get_anon_bdev+0xc0/0xc0 [ 282.599265] ? sget+0x113/0x150 [ 282.602534] ? ovl_show_options+0x550/0x550 [ 282.606855] mount_nodev+0x6b/0x110 [ 282.610480] ovl_mount+0x2c/0x40 [ 282.613832] mount_fs+0xae/0x31d [ 282.617190] vfs_kern_mount.part.35+0xdc/0x4f0 [ 282.621758] ? may_umount+0xb0/0xb0 [ 282.625381] ? _raw_read_unlock+0x2c/0x50 [ 282.629525] ? __get_fs_type+0x97/0xc0 [ 282.633402] do_mount+0x581/0x31f0 [ 282.636939] ? trace_hardirqs_off+0x310/0x310 [ 282.641431] ? retint_kernel+0x1b/0x2d [ 282.645303] ? copy_mount_string+0x40/0x40 [ 282.649527] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 282.654268] ? trace_hardirqs_off+0xaf/0x310 [ 282.658666] ? retint_kernel+0x2d/0x2d [ 282.662544] ? copy_mount_options+0x1f3/0x380 [ 282.667028] ? copy_mount_options+0x1fd/0x380 [ 282.671511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.677052] ? copy_mount_options+0x288/0x380 [ 282.681536] ksys_mount+0x12d/0x140 [ 282.685148] __x64_sys_mount+0xbe/0x150 [ 282.689113] do_syscall_64+0x1b9/0x820 [ 282.692985] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.698346] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.703263] ? trace_hardirqs_on_caller+0x310/0x310 [ 282.708267] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.713268] ? recalc_sigpending_tsk+0x180/0x180 [ 282.718011] ? kasan_check_write+0x14/0x20 [ 282.722237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.727065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.732237] RIP: 0033:0x457579 [ 282.735420] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.754306] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 282.762009] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 21:38:32 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40f000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:32 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400408, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 282.769273] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 282.776527] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 282.783780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 282.791038] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:32 executing program 3 (fault-call:4 fault-nth:63): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 282.859904] overlayfs: filesystem on './file0' not supported as upperdir 21:38:32 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4003d4, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 282.926440] 9pnet: Insufficient options for proto=fd 21:38:32 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:32 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40000d, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 283.008490] FAULT_INJECTION: forcing a failure. [ 283.008490] name failslab, interval 1, probability 0, space 0, times 0 [ 283.026061] CPU: 0 PID: 10394 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 283.033357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.042705] Call Trace: [ 283.045305] dump_stack+0x1c4/0x2b4 [ 283.048938] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.054134] ? save_stack+0xa9/0xd0 [ 283.057772] should_fail.cold.4+0xa/0x17 [ 283.061839] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.066947] ? __find_get_block+0x3be/0xf20 [ 283.071273] ? kasan_check_write+0x14/0x20 [ 283.075513] ? try_to_free_buffers+0xc80/0xc80 [ 283.080100] ? trace_hardirqs_on+0x310/0x310 [ 283.084509] ? debug_check_no_obj_freed+0x305/0x58d [ 283.089533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.095076] ? check_preemption_disabled+0x48/0x200 [ 283.100098] ? ___might_sleep+0x1ed/0x300 [ 283.104250] ? arch_local_save_flags+0x40/0x40 [ 283.108836] ? jbd2_journal_stop+0x430/0x15d0 [ 283.113336] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 283.118793] ? __might_sleep+0x95/0x190 [ 283.122770] ? ___might_sleep+0x1ed/0x300 [ 283.126915] ? __getblk_gfp+0x11b/0xd50 [ 283.130893] ? arch_local_save_flags+0x40/0x40 [ 283.135479] ? up_write+0x7b/0x220 [ 283.139022] ? up_read+0x110/0x110 [ 283.142572] __should_failslab+0x124/0x180 [ 283.146826] should_failslab+0x9/0x14 [ 283.150656] kmem_cache_alloc+0x2be/0x730 [ 283.154806] ? lock_acquire+0x1ed/0x520 [ 283.158785] ? ext4_xattr_set_credits.part.31+0x33/0x120 [ 283.164239] jbd2__journal_start+0x1e7/0xa90 [ 283.168650] ? arch_local_save_flags+0x40/0x40 [ 283.173236] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 283.178951] ? __might_sleep+0x95/0x190 [ 283.182935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.188478] __ext4_journal_start_sb+0x1a5/0x5f0 [ 283.193238] ? ext4_xattr_set+0x1f7/0x420 [ 283.197387] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 283.203129] ? __ext4_xattr_set_credits+0x3ae/0x520 [ 283.208163] ? up_read+0x1a/0x110 [ 283.211628] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 283.217082] ext4_xattr_set+0x1f7/0x420 [ 283.221066] ? ext4_xattr_set_credits+0x120/0x120 [ 283.225914] ? ima_inode_removexattr+0xc0/0xc0 [ 283.230506] ? inode_has_perm.isra.58+0x17a/0x210 [ 283.235357] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 283.240379] ext4_xattr_trusted_set+0x36/0x40 [ 283.244877] __vfs_removexattr+0x10f/0x170 [ 283.249119] ? ext4_xattr_destroy_cache+0x30/0x30 [ 283.253965] ? __vfs_getxattr+0x150/0x150 [ 283.258120] ? evm_inode_removexattr+0x47/0x60 [ 283.262708] vfs_removexattr+0xb4/0x1e0 [ 283.266694] ovl_fill_super+0xf6e/0x3f7b [ 283.270766] ? ovl_show_options+0x550/0x550 [ 283.275093] ? __free_pages+0x163/0x190 [ 283.279072] ? selinux_sb_copy_data+0x602/0x740 [ 283.283749] ? selinux_capable+0x36/0x40 [ 283.287814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.293361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.298900] ? get_anon_bdev+0xc0/0xc0 [ 283.302791] ? sget+0x113/0x150 [ 283.306076] ? ovl_show_options+0x550/0x550 [ 283.310398] mount_nodev+0x6b/0x110 [ 283.314033] ovl_mount+0x2c/0x40 [ 283.317400] mount_fs+0xae/0x31d [ 283.320773] vfs_kern_mount.part.35+0xdc/0x4f0 [ 283.325366] ? may_umount+0xb0/0xb0 [ 283.328994] ? _raw_read_unlock+0x2c/0x50 [ 283.333149] ? __get_fs_type+0x97/0xc0 [ 283.337039] do_mount+0x581/0x31f0 [ 283.340577] ? kasan_check_read+0x11/0x20 [ 283.344746] ? do_raw_spin_unlock+0xa7/0x2f0 [ 283.349156] ? copy_mount_string+0x40/0x40 [ 283.353388] ? kasan_check_write+0x14/0x20 [ 283.357632] ? kasan_unpoison_shadow+0x35/0x50 [ 283.362215] ? kasan_kmalloc+0xc7/0xe0 [ 283.366109] ? kmem_cache_alloc_trace+0x31f/0x750 [ 283.370957] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.376500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.382042] ? copy_mount_options+0x288/0x380 [ 283.386543] ksys_mount+0x12d/0x140 [ 283.390174] __x64_sys_mount+0xbe/0x150 [ 283.394152] do_syscall_64+0x1b9/0x820 [ 283.398041] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.403411] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.408344] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.413361] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 283.418379] ? recalc_sigpending_tsk+0x180/0x180 [ 283.423136] ? kasan_check_write+0x14/0x20 [ 283.427379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.432226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.437412] RIP: 0033:0x457579 [ 283.440631] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.459535] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 283.467246] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 283.474516] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 283.481782] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 283.489047] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 283.496336] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:33 executing program 3 (fault-call:4 fault-nth:64): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:33 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="f20bf4ffff28010000000000"], 0xb) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 283.566566] overlayfs: filesystem on './file0' not supported as upperdir 21:38:33 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401626, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f00000001c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="000775b005e381e5b3b60ced5c54dbb7", 0x10) fcntl$setstatus(r0, 0x4, 0x2800) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r3, 0x6}, &(0x7f00000002c0)=0x8) r4 = accept$alg(r2, 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) [ 283.624089] ovl_get_fh: 23 callbacks suppressed [ 283.624098] overlayfs: invalid origin (7900) [ 283.641560] overlayfs: invalid origin (7900) [ 283.660328] FAULT_INJECTION: forcing a failure. [ 283.660328] name failslab, interval 1, probability 0, space 0, times 0 21:38:33 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40e0ff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 283.673954] CPU: 0 PID: 10408 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 283.681244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.690591] Call Trace: [ 283.693175] dump_stack+0x1c4/0x2b4 [ 283.696791] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.701989] ? __kernel_text_address+0xd/0x40 [ 283.706486] should_fail.cold.4+0xa/0x17 [ 283.710533] ? mark_held_locks+0x130/0x130 [ 283.714756] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.719852] ? save_stack+0xa9/0xd0 [ 283.723477] ? save_stack+0x43/0xd0 [ 283.727090] ? kasan_kmalloc+0xc7/0xe0 [ 283.730966] ? kasan_slab_alloc+0x12/0x20 [ 283.735100] ? kmem_cache_alloc+0x12e/0x730 [ 283.739421] ? jbd2_journal_add_journal_head+0x21a/0x670 [ 283.744869] ? __ext4_journal_get_create_access+0x46/0x90 [ 283.750416] ? ext4_xattr_block_set+0x1cf7/0x4490 [ 283.755249] ? ext4_xattr_set_handle+0xff4/0x1650 [ 283.760078] ? ext4_xattr_set+0x248/0x420 [ 283.764211] ? ext4_xattr_trusted_set+0x36/0x40 [ 283.768864] ? __vfs_setxattr+0x124/0x180 [ 283.772995] ? __vfs_setxattr_noperm+0x11d/0x410 [ 283.777735] ? vfs_setxattr+0xd8/0x100 [ 283.781618] ? ovl_fill_super+0xf26/0x3f7b [ 283.785858] ? mount_nodev+0x6b/0x110 [ 283.789644] ? ovl_mount+0x2c/0x40 [ 283.793166] ? mount_fs+0xae/0x31d [ 283.796724] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 283.801477] ? do_mount+0x581/0x31f0 [ 283.805175] ? ksys_mount+0x12d/0x140 [ 283.808958] ? __x64_sys_mount+0xbe/0x150 [ 283.813092] ? do_syscall_64+0x1b9/0x820 [ 283.817142] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.822493] ? arch_local_save_flags+0x40/0x40 [ 283.827064] ? ___might_sleep+0x1ed/0x300 [ 283.831199] ? arch_local_save_flags+0x40/0x40 [ 283.835770] ? trace_hardirqs_on+0xbd/0x310 [ 283.840087] ? do_mount+0x581/0x31f0 [ 283.843786] ? ksys_mount+0x12d/0x140 [ 283.847591] ? jbd2_journal_add_journal_head+0x21a/0x670 [ 283.853053] __should_failslab+0x124/0x180 [ 283.857290] should_failslab+0x9/0x14 [ 283.861079] kmem_cache_alloc+0x2be/0x730 [ 283.865238] ? jbd2_journal_get_create_access+0x4f6/0x670 [ 283.870779] ? lock_downgrade+0x900/0x900 [ 283.874923] mb_cache_entry_create+0x143/0xb30 [ 283.879525] ? jbd2_journal_cancel_revoke+0xfe/0x500 [ 283.884636] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 283.889204] ? mb_cache_scan+0x50/0x50 [ 283.893078] ? var_wake_function+0x150/0x150 [ 283.897476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.903005] ext4_xattr_block_set+0x1f3d/0x4490 [ 283.907690] ? ext4_xattr_inode_get+0xa20/0xa20 [ 283.912348] ? ext4_xattr_ibody_set+0x2c0/0x2c0 [ 283.917009] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 283.922796] ? ext4_get_group_desc+0x1c6/0x2c0 [ 283.927366] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.932887] ? __ext4_get_inode_loc+0x470/0x1330 [ 283.937635] ? jbd2_write_access_granted.part.8+0x264/0x410 [ 283.943334] ? jbd2_journal_file_inode+0x660/0x660 [ 283.948252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.953776] ? ext4_xattr_check_entries+0x133/0x430 [ 283.958776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.964296] ? xattr_find_entry+0x1e4/0x280 [ 283.968616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.974154] ? ext4_xattr_ibody_set+0x1ec/0x2c0 [ 283.978811] ext4_xattr_set_handle+0xff4/0x1650 [ 283.983480] ? ext4_xattr_ibody_inline_set+0x2c0/0x2c0 [ 283.988764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.994287] ? ext4_xattr_set+0x1f7/0x420 [ 283.998427] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 284.004126] ? up_read+0x1a/0x110 [ 284.007569] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 284.013014] ext4_xattr_set+0x248/0x420 [ 284.016980] ? ext4_xattr_set_credits+0x120/0x120 [ 284.021808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.027336] ? evm_protected_xattr+0x206/0x290 [ 284.031905] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 284.036909] ? ext4_xattr_destroy_cache+0x30/0x30 [ 284.041739] ext4_xattr_trusted_set+0x36/0x40 [ 284.046221] __vfs_setxattr+0x124/0x180 [ 284.050181] ? xattr_resolve_name+0x430/0x430 [ 284.054665] __vfs_setxattr_noperm+0x11d/0x410 [ 284.059257] vfs_setxattr+0xd8/0x100 [ 284.062970] ovl_fill_super+0xf26/0x3f7b [ 284.067050] ? ovl_show_options+0x550/0x550 [ 284.071360] ? __free_pages+0x163/0x190 [ 284.075323] ? selinux_sb_copy_data+0x602/0x740 [ 284.079980] ? selinux_capable+0x36/0x40 [ 284.084040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.089576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.095130] ? get_anon_bdev+0xc0/0xc0 [ 284.099001] ? sget+0x113/0x150 [ 284.102268] ? ovl_show_options+0x550/0x550 [ 284.106574] mount_nodev+0x6b/0x110 [ 284.110198] ovl_mount+0x2c/0x40 [ 284.113550] mount_fs+0xae/0x31d [ 284.116905] vfs_kern_mount.part.35+0xdc/0x4f0 [ 284.121484] ? may_umount+0xb0/0xb0 [ 284.125102] ? _raw_read_unlock+0x2c/0x50 [ 284.129252] ? __get_fs_type+0x97/0xc0 [ 284.133130] do_mount+0x581/0x31f0 [ 284.136696] ? kasan_check_read+0x11/0x20 [ 284.140842] ? do_raw_spin_unlock+0xa7/0x2f0 [ 284.145238] ? copy_mount_string+0x40/0x40 [ 284.149455] ? kasan_check_write+0x14/0x20 [ 284.153698] ? kasan_unpoison_shadow+0x35/0x50 [ 284.158271] ? kasan_kmalloc+0xc7/0xe0 [ 284.162148] ? kmem_cache_alloc_trace+0x31f/0x750 [ 284.166980] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.172506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.178045] ? copy_mount_options+0x288/0x380 [ 284.182530] ksys_mount+0x12d/0x140 [ 284.186144] __x64_sys_mount+0xbe/0x150 [ 284.190121] do_syscall_64+0x1b9/0x820 [ 284.194015] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.199363] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.204280] ? trace_hardirqs_on_caller+0x310/0x310 [ 284.209285] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.214289] ? recalc_sigpending_tsk+0x180/0x180 [ 284.219030] ? kasan_check_write+0x14/0x20 [ 284.223280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.228117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.233293] RIP: 0033:0x457579 [ 284.236490] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.255387] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 284.263079] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 284.270331] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 284.277594] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 284.284854] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 284.292113] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 284.323331] overlayfs: invalid origin (7900) [ 284.371892] 9pnet: Insufficient options for proto=fd 21:38:34 executing program 3 (fault-call:4 fault-nth:65): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:34 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40e0ff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 284.392295] overlayfs: invalid origin (7900) [ 284.409468] overlayfs: filesystem on './file0' not supported as upperdir [ 284.419021] overlayfs: invalid origin (7900) [ 284.421697] overlayfs: invalid origin (7900) 21:38:34 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400700, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:34 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f00000001c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000000)="000775b005e381e5b3b60ced5c54dbb7", 0x10) fcntl$setstatus(r0, 0x4, 0x2800) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r3, 0x6}, &(0x7f00000002c0)=0x8) r4 = accept$alg(r2, 0x0, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x0) sendmmsg$alg(r4, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 21:38:34 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x401800, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 284.548916] FAULT_INJECTION: forcing a failure. [ 284.548916] name failslab, interval 1, probability 0, space 0, times 0 [ 284.563363] CPU: 0 PID: 10431 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 284.570682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.580049] Call Trace: [ 284.582681] dump_stack+0x1c4/0x2b4 [ 284.586326] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.591520] ? save_stack+0xa9/0xd0 [ 284.595164] should_fail.cold.4+0xa/0x17 [ 284.599250] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.604368] ? __find_get_block+0x3be/0xf20 [ 284.608702] ? kasan_check_write+0x14/0x20 [ 284.612952] ? try_to_free_buffers+0xc80/0xc80 [ 284.617543] ? trace_hardirqs_on+0x310/0x310 [ 284.621984] ? debug_check_no_obj_freed+0x305/0x58d [ 284.627010] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.632558] ? check_preemption_disabled+0x48/0x200 [ 284.637627] ? ___might_sleep+0x1ed/0x300 [ 284.641788] ? arch_local_save_flags+0x40/0x40 [ 284.646380] ? jbd2_journal_stop+0x430/0x15d0 [ 284.650883] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 284.656374] ? __might_sleep+0x95/0x190 [ 284.660372] ? ___might_sleep+0x1ed/0x300 [ 284.664539] ? __getblk_gfp+0x11b/0xd50 [ 284.668520] ? arch_local_save_flags+0x40/0x40 [ 284.673134] ? up_write+0x7b/0x220 [ 284.676682] ? up_read+0x110/0x110 [ 284.680231] __should_failslab+0x124/0x180 [ 284.684475] should_failslab+0x9/0x14 [ 284.688296] kmem_cache_alloc+0x2be/0x730 [ 284.692453] ? lock_acquire+0x1ed/0x520 [ 284.696435] ? ext4_xattr_set_credits.part.31+0x33/0x120 [ 284.701911] jbd2__journal_start+0x1e7/0xa90 [ 284.706326] ? arch_local_save_flags+0x40/0x40 [ 284.710919] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 284.716646] ? __might_sleep+0x95/0x190 [ 284.720637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.726183] __ext4_journal_start_sb+0x1a5/0x5f0 [ 284.730947] ? ext4_xattr_set+0x1f7/0x420 [ 284.735104] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 284.740828] ? __ext4_xattr_set_credits+0x3ae/0x520 [ 284.745869] ? up_read+0x1a/0x110 [ 284.749330] ? ext4_xattr_set_credits.part.31+0x6b/0x120 [ 284.754789] ext4_xattr_set+0x1f7/0x420 [ 284.758780] ? ext4_xattr_set_credits+0x120/0x120 [ 284.763656] ? ima_inode_removexattr+0xc0/0xc0 [ 284.768263] ? inode_has_perm.isra.58+0x17a/0x210 [ 284.773117] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 284.778142] ext4_xattr_trusted_set+0x36/0x40 [ 284.782646] __vfs_removexattr+0x10f/0x170 [ 284.786893] ? ext4_xattr_destroy_cache+0x30/0x30 [ 284.791768] ? __vfs_getxattr+0x150/0x150 [ 284.795920] ? evm_inode_removexattr+0x47/0x60 [ 284.800513] vfs_removexattr+0xb4/0x1e0 [ 284.804495] ovl_fill_super+0xf6e/0x3f7b [ 284.808571] ? ovl_show_options+0x550/0x550 [ 284.812908] ? __free_pages+0x163/0x190 [ 284.816893] ? selinux_sb_copy_data+0x602/0x740 [ 284.821569] ? selinux_capable+0x36/0x40 [ 284.825655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.831198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.836744] ? get_anon_bdev+0xc0/0xc0 [ 284.840646] ? sget+0x113/0x150 [ 284.843934] ? ovl_show_options+0x550/0x550 [ 284.848263] mount_nodev+0x6b/0x110 [ 284.851895] ovl_mount+0x2c/0x40 [ 284.855268] mount_fs+0xae/0x31d [ 284.858654] vfs_kern_mount.part.35+0xdc/0x4f0 [ 284.863242] ? may_umount+0xb0/0xb0 [ 284.866877] ? _raw_read_unlock+0x2c/0x50 [ 284.871029] ? __get_fs_type+0x97/0xc0 [ 284.874923] do_mount+0x581/0x31f0 [ 284.878522] ? kasan_check_read+0x11/0x20 [ 284.882678] ? do_raw_spin_unlock+0xa7/0x2f0 [ 284.887098] ? copy_mount_string+0x40/0x40 [ 284.891336] ? kasan_check_write+0x14/0x20 [ 284.895589] ? kasan_unpoison_shadow+0x35/0x50 [ 284.900189] ? kasan_kmalloc+0xc7/0xe0 [ 284.904109] ? kmem_cache_alloc_trace+0x31f/0x750 [ 284.908967] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.914528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.920100] ? copy_mount_options+0x288/0x380 [ 284.924613] ksys_mount+0x12d/0x140 [ 284.928249] __x64_sys_mount+0xbe/0x150 [ 284.932237] do_syscall_64+0x1b9/0x820 [ 284.936159] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.941547] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.946505] ? trace_hardirqs_on_caller+0x310/0x310 [ 284.951526] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.956556] ? recalc_sigpending_tsk+0x180/0x180 [ 284.961324] ? kasan_check_write+0x14/0x20 [ 284.965569] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.970443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.975635] RIP: 0033:0x457579 [ 284.978833] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.997741] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 285.005459] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 285.012729] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 285.020006] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 285.027281] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 285.034556] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 285.073802] overlayfs: invalid origin (7900) [ 285.094756] overlayfs: invalid origin (7900) 21:38:34 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40ff01, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:35 executing program 3 (fault-call:4 fault-nth:66): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 285.128460] overlayfs: filesystem on './file0' not supported as upperdir [ 285.156610] overlayfs: invalid origin (7900) [ 285.165266] overlayfs: filesystem on './file0' not supported as upperdir 21:38:35 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40d003, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 285.174192] 9pnet: Insufficient options for proto=fd [ 285.196416] overlayfs: invalid origin (7900) 21:38:35 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0xa0ffff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:35 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x0, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 285.301660] FAULT_INJECTION: forcing a failure. [ 285.301660] name failslab, interval 1, probability 0, space 0, times 0 [ 285.415475] CPU: 0 PID: 10451 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 285.422784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.432139] Call Trace: [ 285.434743] dump_stack+0x1c4/0x2b4 [ 285.438394] ? dump_stack_print_info.cold.2+0x52/0x52 [ 285.443626] should_fail.cold.4+0xa/0x17 [ 285.447703] ? kernel_text_address+0x79/0xf0 [ 285.452124] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.457252] ? unwind_get_return_address+0x61/0xa0 [ 285.462197] ? __save_stack_trace+0x8d/0xf0 [ 285.466547] ? save_stack+0xa9/0xd0 [ 285.470200] ? save_stack+0x43/0xd0 [ 285.473830] ? kasan_kmalloc+0xc7/0xe0 [ 285.477732] ? __kmalloc+0x14e/0x760 [ 285.481453] ? ovl_fill_super+0x19f1/0x3f7b [ 285.485793] ? mount_nodev+0x6b/0x110 [ 285.489615] ? ovl_mount+0x2c/0x40 [ 285.493161] ? mount_fs+0xae/0x31d [ 285.496714] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 285.501932] ? do_mount+0x581/0x31f0 [ 285.505649] ? ksys_mount+0x12d/0x140 [ 285.509460] ? fs_reclaim_acquire+0x20/0x20 [ 285.513805] ? lock_downgrade+0x900/0x900 [ 285.517969] ? ___might_sleep+0x1ed/0x300 [ 285.522127] ? arch_local_save_flags+0x40/0x40 [ 285.526718] ? fs_reclaim_acquire+0x20/0x20 [ 285.531055] __should_failslab+0x124/0x180 [ 285.535297] should_failslab+0x9/0x14 [ 285.539114] kmem_cache_alloc+0x2be/0x730 [ 285.543271] ? kasan_unpoison_shadow+0x35/0x50 [ 285.547859] ? kasan_kmalloc+0xc7/0xe0 [ 285.551761] getname_kernel+0x54/0x370 [ 285.555659] kern_path+0x1e/0x40 [ 285.559040] ovl_mount_dir_noesc+0x6b/0x190 [ 285.563375] ovl_fill_super+0x1d03/0x3f7b [ 285.567547] ? ovl_show_options+0x550/0x550 [ 285.571889] ? __free_pages+0x160/0x190 [ 285.575875] ? selinux_sb_copy_data+0x602/0x740 [ 285.580558] ? selinux_capable+0x36/0x40 [ 285.584643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.590197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.595743] ? get_anon_bdev+0xc0/0xc0 [ 285.599644] ? sget+0x113/0x150 [ 285.602934] ? ovl_show_options+0x550/0x550 [ 285.607264] mount_nodev+0x6b/0x110 [ 285.611064] ovl_mount+0x2c/0x40 [ 285.614442] mount_fs+0xae/0x31d [ 285.617824] vfs_kern_mount.part.35+0xdc/0x4f0 [ 285.622416] ? may_umount+0xb0/0xb0 [ 285.626057] ? _raw_read_unlock+0x2c/0x50 [ 285.630215] ? __get_fs_type+0x97/0xc0 [ 285.634115] do_mount+0x581/0x31f0 [ 285.637670] ? trace_hardirqs_off+0x310/0x310 [ 285.642173] ? retint_kernel+0x1b/0x2d [ 285.646075] ? copy_mount_string+0x40/0x40 [ 285.650322] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 285.655090] ? trace_hardirqs_off+0xaf/0x310 [ 285.659512] ? retint_kernel+0x2d/0x2d [ 285.663416] ? copy_mount_options+0x1f3/0x380 [ 285.667917] ? copy_mount_options+0x1fd/0x380 [ 285.672421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.677965] ? copy_mount_options+0x288/0x380 [ 285.682473] ksys_mount+0x12d/0x140 [ 285.686109] __x64_sys_mount+0xbe/0x150 [ 285.690102] do_syscall_64+0x1b9/0x820 [ 285.694001] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 285.699385] ? syscall_return_slowpath+0x5e0/0x5e0 [ 285.704331] ? trace_hardirqs_on_caller+0x310/0x310 [ 285.709368] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 285.714398] ? recalc_sigpending_tsk+0x180/0x180 [ 285.719163] ? kasan_check_write+0x14/0x20 [ 285.723409] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.728266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.733461] RIP: 0033:0x457579 [ 285.736669] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.755573] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 285.763309] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 285.770597] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 285.777883] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 285.785159] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 285.792431] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:35 executing program 1 (fault-call:5 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) 21:38:35 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40fa03, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:35 executing program 3 (fault-call:4 fault-nth:67): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 285.838974] overlayfs: failed to resolve './file0': -12 [ 285.857444] overlayfs: filesystem on './file0' not supported as upperdir [ 285.874653] overlayfs: filesystem on './file0' not supported as upperdir 21:38:35 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400408, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 285.889980] 9pnet: Insufficient options for proto=fd [ 285.931944] FAULT_INJECTION: forcing a failure. [ 285.931944] name failslab, interval 1, probability 0, space 0, times 0 [ 285.951344] FAULT_INJECTION: forcing a failure. [ 285.951344] name failslab, interval 1, probability 0, space 0, times 0 [ 285.956235] CPU: 0 PID: 10471 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #53 [ 285.969855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.979209] Call Trace: [ 285.981806] dump_stack+0x1c4/0x2b4 [ 285.985444] ? dump_stack_print_info.cold.2+0x52/0x52 [ 285.990642] ? usercopy_warn+0x110/0x110 [ 285.994717] should_fail.cold.4+0xa/0x17 [ 285.998787] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.003890] ? lock_downgrade+0x900/0x900 [ 286.008048] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 286.013854] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.019391] ? pid_task+0x115/0x200 [ 286.023022] ? find_vpid+0xf0/0xf0 [ 286.026567] ? __f_unlock_pos+0x19/0x20 [ 286.030559] ? lock_downgrade+0x900/0x900 [ 286.034722] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 286.040264] ? fs_reclaim_acquire+0x20/0x20 [ 286.044597] ? lock_downgrade+0x900/0x900 [ 286.048758] ? ___might_sleep+0x1ed/0x300 [ 286.052909] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 286.058446] ? arch_local_save_flags+0x40/0x40 [ 286.063033] ? creds_are_invalid+0x140/0x140 [ 286.067443] ? wait_for_completion+0x8a0/0x8a0 [ 286.072032] __should_failslab+0x124/0x180 [ 286.076269] should_failslab+0x9/0x14 [ 286.080071] kmem_cache_alloc+0x2be/0x730 [ 286.084222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.089767] ? check_preemption_disabled+0x48/0x200 [ 286.094787] prepare_creds+0xab/0x4d0 [ 286.098597] ? map_id_range_down+0x1ee/0x430 [ 286.103015] ? abort_creds+0x2a0/0x2a0 [ 286.106905] ? __put_user_ns+0x60/0x60 [ 286.110815] ? fput+0x130/0x1a0 [ 286.114096] ? ksys_write+0x1ae/0x260 [ 286.117913] __sys_setregid+0x106/0x6e0 [ 286.121893] __x64_sys_setregid+0x54/0x80 [ 286.126046] do_syscall_64+0x1b9/0x820 [ 286.129938] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 286.135308] ? syscall_return_slowpath+0x5e0/0x5e0 [ 286.140238] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.145084] ? trace_hardirqs_on_caller+0x310/0x310 [ 286.150101] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 286.155124] ? prepare_exit_to_usermode+0x291/0x3b0 [ 286.160151] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.164998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.170197] RIP: 0033:0x457579 [ 286.173393] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.192290] RSP: 002b:00007f3e25441c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000072 [ 286.200013] RAX: ffffffffffffffda RBX: 00007f3e25441c90 RCX: 0000000000457579 [ 286.207278] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 286.214544] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 286.221812] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e254426d4 21:38:36 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x800000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 286.229080] R13: 00000000004c39ed R14: 00000000004d5970 R15: 0000000000000006 [ 286.248805] CPU: 1 PID: 10475 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 286.256298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.266223] Call Trace: [ 286.268827] dump_stack+0x1c4/0x2b4 [ 286.272793] ? dump_stack_print_info.cold.2+0x52/0x52 [ 286.278175] ? __percpu_counter_sum+0x135/0x1a0 21:38:36 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400c00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 286.283223] ? lock_downgrade+0x900/0x900 [ 286.287549] should_fail.cold.4+0xa/0x17 [ 286.291833] ? trace_hardirqs_on+0xbd/0x310 [ 286.296323] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.301745] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 286.306796] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 286.311920] ? __percpu_counter_sum+0x135/0x1a0 [ 286.316620] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.322173] ? ext4_statfs+0x714/0xed0 [ 286.326085] ? fs_reclaim_acquire+0x20/0x20 21:38:36 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400011, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 286.330693] ? lock_downgrade+0x900/0x900 [ 286.334862] ? ___might_sleep+0x1ed/0x300 [ 286.339025] ? arch_local_save_flags+0x40/0x40 [ 286.343630] ? vfs_statfs+0x287/0x2e0 [ 286.347442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.352987] __should_failslab+0x124/0x180 [ 286.357204] should_failslab+0x9/0x14 [ 286.360988] __kmalloc+0x2d4/0x760 [ 286.364516] ? ovl_fill_super+0x23ca/0x3f7b [ 286.368830] ovl_fill_super+0x23ca/0x3f7b [ 286.372970] ? ovl_show_options+0x550/0x550 [ 286.377296] ? __free_pages+0x160/0x190 [ 286.381256] ? selinux_sb_copy_data+0x602/0x740 [ 286.385912] ? selinux_capable+0x36/0x40 [ 286.389956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.395479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.401019] ? get_anon_bdev+0xc0/0xc0 [ 286.404899] ? sget+0x113/0x150 [ 286.408177] ? ovl_show_options+0x550/0x550 [ 286.412498] mount_nodev+0x6b/0x110 [ 286.416115] ovl_mount+0x2c/0x40 [ 286.419463] mount_fs+0xae/0x31d [ 286.422820] vfs_kern_mount.part.35+0xdc/0x4f0 [ 286.427404] ? may_umount+0xb0/0xb0 [ 286.431014] ? _raw_read_unlock+0x2c/0x50 [ 286.435145] ? __get_fs_type+0x97/0xc0 [ 286.439016] do_mount+0x581/0x31f0 [ 286.442542] ? kasan_check_read+0x11/0x20 [ 286.446676] ? do_raw_spin_unlock+0xa7/0x2f0 [ 286.451068] ? copy_mount_string+0x40/0x40 [ 286.455283] ? kasan_check_write+0x14/0x20 [ 286.459500] ? kasan_unpoison_shadow+0x35/0x50 [ 286.464066] ? kasan_kmalloc+0xc7/0xe0 [ 286.467938] ? kmem_cache_alloc_trace+0x31f/0x750 [ 286.472766] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.478288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.483807] ? copy_mount_options+0x288/0x380 [ 286.488288] ksys_mount+0x12d/0x140 [ 286.491895] __x64_sys_mount+0xbe/0x150 [ 286.495866] do_syscall_64+0x1b9/0x820 [ 286.499739] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 286.505103] ? syscall_return_slowpath+0x5e0/0x5e0 [ 286.510030] ? trace_hardirqs_on_caller+0x310/0x310 [ 286.515033] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 286.520033] ? recalc_sigpending_tsk+0x180/0x180 [ 286.524778] ? kasan_check_write+0x14/0x20 [ 286.528998] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.533827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.539001] RIP: 0033:0x457579 [ 286.542184] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.561068] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 286.568760] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 286.576015] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 21:38:36 executing program 1 (fault-call:5 fault-nth:1): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) 21:38:36 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x0, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:36 executing program 3 (fault-call:4 fault-nth:68): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 286.583267] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 286.590535] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 286.597787] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 286.713601] FAULT_INJECTION: forcing a failure. [ 286.713601] name failslab, interval 1, probability 0, space 0, times 0 [ 286.724261] overlayfs: filesystem on './file0' not supported as upperdir [ 286.735940] 9pnet: Insufficient options for proto=fd [ 286.745390] FAULT_INJECTION: forcing a failure. [ 286.745390] name failslab, interval 1, probability 0, space 0, times 0 21:38:36 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40002c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:36 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x0, {0x820}}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:36 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400a00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 286.773714] CPU: 1 PID: 10492 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 286.781006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.790366] Call Trace: [ 286.792970] dump_stack+0x1c4/0x2b4 [ 286.796624] ? dump_stack_print_info.cold.2+0x52/0x52 [ 286.801836] should_fail.cold.4+0xa/0x17 [ 286.805904] ? kernel_text_address+0x79/0xf0 [ 286.810328] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.815439] ? unwind_get_return_address+0x61/0xa0 [ 286.820379] ? __save_stack_trace+0x8d/0xf0 [ 286.824716] ? save_stack+0xa9/0xd0 [ 286.828349] ? save_stack+0x43/0xd0 [ 286.831976] ? kasan_kmalloc+0xc7/0xe0 [ 286.835878] ? __kmalloc+0x14e/0x760 [ 286.839604] ? ovl_fill_super+0x19f1/0x3f7b [ 286.843931] ? mount_nodev+0x6b/0x110 [ 286.847742] ? ovl_mount+0x2c/0x40 [ 286.851282] ? mount_fs+0xae/0x31d [ 286.854828] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 286.859601] ? do_mount+0x581/0x31f0 [ 286.863321] ? ksys_mount+0x12d/0x140 [ 286.867140] ? fs_reclaim_acquire+0x20/0x20 21:38:36 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400500, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 286.871474] ? lock_downgrade+0x900/0x900 [ 286.875633] ? ___might_sleep+0x1ed/0x300 [ 286.879791] ? arch_local_save_flags+0x40/0x40 [ 286.884375] ? fs_reclaim_acquire+0x20/0x20 [ 286.888709] __should_failslab+0x124/0x180 [ 286.892952] should_failslab+0x9/0x14 [ 286.896768] kmem_cache_alloc+0x2be/0x730 [ 286.900924] ? kasan_unpoison_shadow+0x35/0x50 [ 286.905510] ? kasan_kmalloc+0xc7/0xe0 [ 286.909404] getname_kernel+0x54/0x370 [ 286.913298] kern_path+0x1e/0x40 [ 286.916672] ovl_mount_dir_noesc+0x6b/0x190 [ 286.921006] ovl_fill_super+0x1d03/0x3f7b [ 286.925174] ? ovl_show_options+0x550/0x550 [ 286.929500] ? __free_pages+0x160/0x190 [ 286.933488] ? selinux_sb_copy_data+0x602/0x740 [ 286.938169] ? selinux_capable+0x36/0x40 [ 286.942243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.947789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.953331] ? get_anon_bdev+0xc0/0xc0 [ 286.957226] ? sget+0x113/0x150 [ 286.960516] ? ovl_show_options+0x550/0x550 [ 286.964846] mount_nodev+0x6b/0x110 [ 286.968481] ovl_mount+0x2c/0x40 [ 286.971855] mount_fs+0xae/0x31d [ 286.975241] vfs_kern_mount.part.35+0xdc/0x4f0 [ 286.979831] ? may_umount+0xb0/0xb0 [ 286.983462] ? _raw_read_unlock+0x2c/0x50 [ 286.987626] ? __get_fs_type+0x97/0xc0 [ 286.991521] do_mount+0x581/0x31f0 [ 286.995067] ? kasan_check_read+0x11/0x20 [ 286.999225] ? do_raw_spin_unlock+0xa7/0x2f0 [ 287.003641] ? copy_mount_string+0x40/0x40 [ 287.007880] ? kasan_check_write+0x14/0x20 [ 287.012126] ? kasan_unpoison_shadow+0x35/0x50 [ 287.016711] ? kasan_kmalloc+0xc7/0xe0 [ 287.020616] ? kmem_cache_alloc_trace+0x31f/0x750 [ 287.025472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.031023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.036562] ? copy_mount_options+0x288/0x380 [ 287.041076] ksys_mount+0x12d/0x140 [ 287.044720] __x64_sys_mount+0xbe/0x150 [ 287.048707] do_syscall_64+0x1b9/0x820 [ 287.052615] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.057990] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.062929] ? trace_hardirqs_on_caller+0x310/0x310 [ 287.067954] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 287.072978] ? recalc_sigpending_tsk+0x180/0x180 [ 287.077742] ? kasan_check_write+0x14/0x20 [ 287.081988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.086848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.092041] RIP: 0033:0x457579 [ 287.095243] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.114143] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 287.121853] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 287.129131] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 287.136410] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 287.143681] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 287.150953] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 287.158242] CPU: 0 PID: 10501 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #53 [ 287.159072] overlayfs: failed to resolve './file0': -12 [ 287.165532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.165538] Call Trace: [ 287.165560] dump_stack+0x1c4/0x2b4 [ 287.165579] ? dump_stack_print_info.cold.2+0x52/0x52 [ 287.165624] ? unwind_dump+0x190/0x190 [ 287.195595] should_fail.cold.4+0xa/0x17 [ 287.195640] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.204775] ? unwind_get_return_address+0x61/0xa0 [ 287.204795] ? __save_stack_trace+0x8d/0xf0 [ 287.204817] ? save_stack+0xa9/0xd0 [ 287.217674] ? save_stack+0x43/0xd0 [ 287.221306] ? kasan_kmalloc+0xc7/0xe0 21:38:37 executing program 3 (fault-call:4 fault-nth:69): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 287.225203] ? kasan_slab_alloc+0x12/0x20 [ 287.229362] ? kmem_cache_alloc+0x12e/0x730 [ 287.233697] ? prepare_creds+0xab/0x4d0 [ 287.237715] ? __sys_setregid+0x106/0x6e0 [ 287.241876] ? __x64_sys_setregid+0x54/0x80 [ 287.243247] FAULT_INJECTION: forcing a failure. [ 287.243247] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 287.246225] ? do_syscall_64+0x1b9/0x820 [ 287.262071] ? fs_reclaim_acquire+0x20/0x20 [ 287.266398] ? lock_downgrade+0x900/0x900 [ 287.270555] ? ___might_sleep+0x1ed/0x300 [ 287.274718] ? arch_local_save_flags+0x40/0x40 [ 287.279304] ? fs_reclaim_acquire+0x20/0x20 [ 287.283632] ? lock_downgrade+0x900/0x900 [ 287.287785] __should_failslab+0x124/0x180 [ 287.292021] should_failslab+0x9/0x14 [ 287.295825] __kmalloc_track_caller+0x2d0/0x750 [ 287.300499] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 287.305955] ? kasan_kmalloc+0xc7/0xe0 [ 287.309847] ? selinux_cred_prepare+0x49/0xb0 [ 287.314347] kmemdup+0x24/0x50 [ 287.317546] selinux_cred_prepare+0x49/0xb0 [ 287.321876] security_prepare_creds+0x60/0xc0 [ 287.326383] prepare_creds+0x3b9/0x4d0 [ 287.330272] ? abort_creds+0x2a0/0x2a0 [ 287.334166] ? __put_user_ns+0x60/0x60 [ 287.338051] ? fput+0x130/0x1a0 [ 287.341343] __sys_setregid+0x106/0x6e0 [ 287.345325] __x64_sys_setregid+0x54/0x80 [ 287.349477] do_syscall_64+0x1b9/0x820 [ 287.353368] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.358737] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.363671] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.368523] ? trace_hardirqs_on_caller+0x310/0x310 [ 287.373544] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 287.378564] ? prepare_exit_to_usermode+0x291/0x3b0 [ 287.383605] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.388462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.393658] RIP: 0033:0x457579 [ 287.396859] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.415774] RSP: 002b:00007f3e25441c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000072 [ 287.423484] RAX: ffffffffffffffda RBX: 00007f3e25441c90 RCX: 0000000000457579 [ 287.430753] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 287.438024] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 287.445295] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3e254426d4 [ 287.452561] R13: 00000000004c39ed R14: 00000000004d5970 R15: 0000000000000006 [ 287.459859] CPU: 1 PID: 10506 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 287.467143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.476511] Call Trace: [ 287.479106] dump_stack+0x1c4/0x2b4 [ 287.482746] ? dump_stack_print_info.cold.2+0x52/0x52 [ 287.487938] ? trace_hardirqs_off+0xb8/0x310 [ 287.492353] should_fail.cold.4+0xa/0x17 [ 287.496417] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.501788] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 287.506821] ? modules_open+0xa0/0xa0 [ 287.510628] ? mark_held_locks+0x130/0x130 [ 287.514868] ? lock_downgrade+0x900/0x900 [ 287.519023] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 287.524820] ? kasan_check_read+0x11/0x20 [ 287.528973] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 287.534255] ? rcu_bh_qs+0xc0/0xc0 [ 287.537798] ? unwind_dump+0x190/0x190 [ 287.541697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.547237] ? should_fail+0x22d/0xd01 [ 287.551131] ? kernel_text_address+0x79/0xf0 [ 287.555542] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.560648] ? unwind_get_return_address+0x61/0xa0 [ 287.565600] __alloc_pages_nodemask+0x34b/0xde0 [ 287.570278] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 287.575297] ? save_stack+0xa9/0xd0 [ 287.578929] ? save_stack+0x43/0xd0 [ 287.582569] ? kasan_kmalloc+0xc7/0xe0 [ 287.586483] ? ovl_fill_super+0x19f1/0x3f7b [ 287.590802] ? mount_nodev+0x6b/0x110 [ 287.594608] ? ovl_mount+0x2c/0x40 [ 287.598151] ? mount_fs+0xae/0x31d [ 287.601694] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 287.606446] ? do_mount+0x581/0x31f0 [ 287.610673] ? ksys_mount+0x12d/0x140 [ 287.614478] ? fs_reclaim_acquire+0x20/0x20 [ 287.618799] ? lock_downgrade+0x900/0x900 [ 287.622951] ? ___might_sleep+0x1ed/0x300 [ 287.627107] ? trace_hardirqs_off+0xb8/0x310 [ 287.631525] cache_grow_begin+0x91/0x8c0 [ 287.635597] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.641142] ? check_preemption_disabled+0x48/0x200 [ 287.646167] kmem_cache_alloc+0x665/0x730 [ 287.650324] getname_kernel+0x54/0x370 [ 287.654213] kern_path+0x1e/0x40 [ 287.657590] ovl_mount_dir_noesc+0x6b/0x190 [ 287.661919] ovl_fill_super+0x1d03/0x3f7b [ 287.666083] ? ovl_show_options+0x550/0x550 [ 287.670408] ? __free_pages+0x160/0x190 [ 287.674391] ? selinux_sb_copy_data+0x602/0x740 [ 287.679069] ? selinux_capable+0x36/0x40 [ 287.683157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.688697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.694238] ? get_anon_bdev+0xc0/0xc0 [ 287.698130] ? sget+0x113/0x150 [ 287.701413] ? ovl_show_options+0x550/0x550 [ 287.705738] mount_nodev+0x6b/0x110 [ 287.709365] ovl_mount+0x2c/0x40 [ 287.712731] mount_fs+0xae/0x31d [ 287.716103] vfs_kern_mount.part.35+0xdc/0x4f0 [ 287.720698] ? may_umount+0xb0/0xb0 [ 287.724328] ? _raw_read_unlock+0x2c/0x50 [ 287.728477] ? __get_fs_type+0x97/0xc0 [ 287.732366] do_mount+0x581/0x31f0 [ 287.735908] ? kasan_check_read+0x11/0x20 [ 287.740058] ? do_raw_spin_unlock+0xa7/0x2f0 [ 287.744467] ? copy_mount_string+0x40/0x40 [ 287.748701] ? kasan_check_write+0x14/0x20 [ 287.752942] ? kasan_unpoison_shadow+0x35/0x50 [ 287.757522] ? kasan_kmalloc+0xc7/0xe0 [ 287.761413] ? kmem_cache_alloc_trace+0x31f/0x750 [ 287.766262] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.771805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.777340] ? copy_mount_options+0x288/0x380 [ 287.781837] ksys_mount+0x12d/0x140 [ 287.785465] __x64_sys_mount+0xbe/0x150 [ 287.789451] do_syscall_64+0x1b9/0x820 [ 287.793343] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.798707] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.803643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.808488] ? trace_hardirqs_on_caller+0x310/0x310 [ 287.813511] ? prepare_exit_to_usermode+0x291/0x3b0 [ 287.818534] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.823385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.828571] RIP: 0033:0x457579 [ 287.831781] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.850681] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 287.858389] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 287.865655] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 21:38:37 executing program 1 (fault-call:5 fault-nth:2): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) 21:38:37 executing program 3 (fault-call:4 fault-nth:70): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 287.872921] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 287.880188] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 287.887469] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) [ 288.032053] 9pnet: Insufficient options for proto=fd [ 288.054976] FAULT_INJECTION: forcing a failure. [ 288.054976] name failslab, interval 1, probability 0, space 0, times 0 [ 288.068159] overlayfs: filesystem on './file0' not supported as upperdir [ 288.075645] overlayfs: filesystem on './file0' not supported as upperdir [ 288.090624] CPU: 1 PID: 10527 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 288.097920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.107278] Call Trace: [ 288.109885] dump_stack+0x1c4/0x2b4 [ 288.113531] ? dump_stack_print_info.cold.2+0x52/0x52 [ 288.118742] ? __percpu_counter_sum+0x135/0x1a0 [ 288.123422] ? lock_downgrade+0x900/0x900 [ 288.127596] should_fail.cold.4+0xa/0x17 [ 288.131672] ? trace_hardirqs_on+0xbd/0x310 [ 288.136010] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.141130] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 288.141153] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 21:38:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r3) [ 288.151258] ? __percpu_counter_sum+0x135/0x1a0 [ 288.151279] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.151302] ? ext4_statfs+0x714/0xed0 [ 288.165379] ? fs_reclaim_acquire+0x20/0x20 [ 288.169717] ? lock_downgrade+0x900/0x900 [ 288.173883] ? ___might_sleep+0x1ed/0x300 [ 288.178058] ? arch_local_save_flags+0x40/0x40 [ 288.182654] ? vfs_statfs+0x287/0x2e0 [ 288.186467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.192462] __should_failslab+0x124/0x180 [ 288.196707] should_failslab+0x9/0x14 [ 288.200517] __kmalloc+0x2d4/0x760 21:38:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpgrp(0xffffffffffffffff) r3 = geteuid() getgroups(0x6, &(0x7f0000001500)=[0xee01, 0x0, 0xee00, 0x0, 0xee01, 0xffffffffffffffff]) r5 = getpid() getresuid(&(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)=0x0) r7 = getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001600)=0x0) r9 = geteuid() getresgid(&(0x7f0000001640)=0x0, &(0x7f0000001680), &(0x7f00000016c0)) sendmsg$unix(r0, &(0x7f00000017c0)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000100)="a22aacadc1c1af4dd55997e59e0a4975b29ed37c1d6d21c08f567d853d0eff670b1c2b4d6d6fb46aecb5e6ae338a924167d547a5cc8cbfd3246e765caba2e090c1ff9bf8cb35964a40799bee3a2153b6f3057c7b6a18b8b96ece56da7d4300848540bec1af507826a7f126a89485e56af52ef3098f7082fa7acdd82797a79941c2d0544f6163c5a2b632fd74b40d6de4075b70f47ea9af8eebf0f82e3915af32c7a464e4b7184fe4a7948a3d8e5a8720f7f402bda062ec9f3f491525b78eb0e5b16e85158e188ea3aff739823842d646f8ebae21a662f29369ac1575c4a210bb508e9506736314755e95eb95e1", 0xed}, {&(0x7f0000000200)="9e88ee0d4433755e9bdb61eb507a1dcb82d10fabf196919d21406c71f4de2a51bf44fb7d3db3653cf1a5b897e4768000873f42b36bf279b352a4cfad1ae0b0abc989934249dfcc68bb5915387359914ba4b9c050b139cfcb057fb1d57b669e30ce88cc152cc028978e9b7ff3635423f3fc9e40a3f2cd7d89a74c6867d3f35490a3bd9e830960b8b4601911eb2402b35f098bea02ea4555ca909f30f693fb2c6f67f889383c848cd8c42ae7fe06f5b7497ec7dfc5c311c09d9bf1c6bb7a562d2a3b8b604f16e1b93f87eaebc2dc1c4f3483c55d9f30d57ae4d09763b7c5c0ae6f8e47fcb22c1f901343425359217356bec7f9", 0xf2}, {&(0x7f0000000500)="8dd10873a55a158b8bbda2c5cd1fd4201932c8ed4cbb5f8bd9d5ed34395f90c91d16657b92dff0bac11412f93474489bb7b65f1e8028a6304ec6e68ee2d713a3a9062b2f4228f8346abd56e9d1b2181415a151f8c925dc7f0fca9a6134c0134946471c366b7af8723416d7ff53afddf2593486762c9a4a1bdc53415a7a368dd7dc0efdf126801dfdaccad691d01a5d10138d0ddf25d2a676d25b60adcf0b0cf3becba56a46c74475b6441a355030b78ea9197a3906fbdb99748bee6f02f0556ed3cfcc526019212059abab4ffb424add7ccb2f6bf2cc44fe7adab36afa4c109f8f076130ae927f47c286446376cfec0fb3cff5b1a8befb5f5f027040e2975e16f2c1464541b607678e575e1937eeaca0b71cbcf86cd4942b3abe844629b2d6ec6ffeda5d78894aba13f9cde137f700f2b5bc56af91b8977e6aa6c5817f4903612a5a6657570361e80695bed23d037e76963c70d845b7ec9a44260de47fd7257c298affe6e35f07dafb0268234f410446bea5e3f89857cb73900098a80ffea17483f755c7e29d8f28452e138556f873413c19ffa2aabd65947dac5116d483864f8ac6dfb1aed2ec86267e25e9401254ebc02686fe7f7f3b9e0602e9d3f6a1e2f05e751ffaeadc774237a45a763b181c15966a5e67d1537c75444da8498f9e34175b05727cd4599f38530b7e70087e56705843687a4299b782fa228fd04d78b932657d5f94e29f52f68ccf6a69c91ad4e2a2ca86712c3fbcfc1ed7d626f9fdb1bd6055b8aebf274eeb5865f910a778c8b8a6af85c5483a666709487c923ed628d56d998ded12497e582dda340d7d317622f13d9da8aab024d53fc55cb8ff330b0c479eb016335a427858e7ebda0453f83faef1784ca243eae1b0e837a283df0a225d242175d888118c87a3f9cd1d589a582be315d6f088cedeef2cbdf55d6a9c1d47684941cba2f1d051d49623c8ec979bf0dbbea9d78b51fc50c1df59aa535b9b33dc5df27877f26fb5dd023c83d4933b24e5eb4b9534f7549678ffd5acc9eff923935c84e8ef5029401adf7864ecaf48a468e4974e7acf7294b4b84d7c1571143bfdadae42870e6dc71457e0010407634ce0b6668fbe38c7827a3e6d591e88a7b26e1de68b4d6015a8ca27d16843da2d898fc0aa7a0426c9c50bcff45db71858c007e03358c88128ee4eabf3612be5dba5624b35ab0ea9de5b9e1a16a5db4868e33882df5fb217b22d9edf94a6abd4c32904971ceac8857d36dc2d148cdb3f683d894ef0d5edfefeda7dca6e9a83d2c0dfb3d3b32e6f077b324d24791620bac4b2923a6cda5171d573adfefaf9dce03259b8408ff9b83d36f65eb915fbee69c026f0c2a208de664dffb9e42f9baf9a1a4016d5f64944eb836f4d86113b244817327aaccee9255d3d82aafe55cd200a2c12233606424e84ced59230b3fcea3c3a0f841a93693b01f6f1ba9ef960d000313bc2fb2d2e7d25156fb1e84d82e3f465d86bdaa1430600706cddf07a8576341f1210d6ef3a07c3a4635113b7709d5b3532fb0b95031a3d7ad4447cd873b327719c288122cc0f4b7c4a7e1ff86c1b5e4b5905f62ed5fe0535adc507e43179beea3369aaae1e1baf368a03c4d89158693418e1b2564339b3dee230ecd58d5594e517c24e972a3c54074657100944c2583f596ca0e6fdadc83556675ba2ab8d42ac01503be51dfe27b19acf66fd2e04e828d10ace74ea3c30951de138bd69f42d18b29e3c64e6f3bf1635365c670fa6d1f73f628cae7f5bd07226691aa46ad57d73fa47519c57b8034c6a409f5bbf693d52945c6501a8341ed5a36bb5f9a094852c15cd2ef11fbb3752b7d013484dbc6c340e99b474a520eddaf272ed6b21161e194ac4b770d63b5a97e96bb29d44756f57b26e95bfde8b3103be42ca77a320e6009e17935a10d38dd12e8c92f8ede4c8626e4ad7c3a9db7d1291a25f20fc747eaa2b0f6b86ec0dc588afec336002ba207059505035fc7e315800b1d42d1c6b85f2c4d98c2d5b6a0279eab2254a8ca6ae54edf7f6a660ac644256f14b71342a9dfea2a5a24cf5a68b23d4707e007ef3f626e4842f9a9735b0544f79640da902c8122c6926b93c6fb967714bf6c599a95c6aa1018f1252e4f19a93ffa4f6eae166b1aa1315bb1e87d703c04be331c4249a2f0534b42beec88d77fa683a9937a09c970ad5eb5eb9e66a14345c81b1e70955ac1dd77036d08508370c9bffaef8e7d6ad4be48ffeb890a35c287984298f6a2d5193f792a1953378dd41e7c180be4ea1827be875d70e635a0696eff6c661df5af584b8aafd9511c97e8bcc86f2c9ee1604246a780541cef0ecc479f0e104f0d9571606b1af8ded7e3165a067b9d636d93281303f8b3dc02394aa146844cb77a1b8eed06e8f4798e4d7bd668b98fdb3174a7d6f19c3b6ab28afc175eab78d9375f60398d4774afadb38e9dc54af7a3dde29908e324eb5476c3a571352f5651236e0f3dfbf6af3ef4e9b985e20841a2d8f742df099ba4fa6ec38f2a308e8b84321c01d4afa1268e6bd2d6a1bed8ebe07d09c804019d129157927476166689e20c96ea1d949d59aea7b87f66d1aeaa51521074b5a3c562a909b3e6d68030e54c9de160fd7920f5a8903cac6421deeff0cde2799e594e9599880e21de14380e9fba036dee0ea1d0b2c38fd724be8965ae70c6fc3b2a9cab9cd64814e9f15d3ae3523259dd9de1d262ea9e35fb1e512f72309241bce7687eae885689d183eab2e468e8ca116f01e166ec4e1d6748b0c65b1773fcf822a7f63d56912644f5e797dc61686955433c39e33beba522096e62b0c3ea1066e1fc0850f828b251c3d576a9bae377ae0c42fcde6a06dec2c406e61eb05fbba7f0c1bd4f669384ebda8ac2ac8827c6b2397f967b4e9432a3d153d135541c365c096efb8f309919de81c6c81b42db520b0dab107da6ac9a1ab6f106a6632f6d7c79386455452edd2ec32b394017fc309da6d8e3b1b2a2f3d115eeef0ba7a89292492b096318cc315a974e213993ce45b4d1082b1e7107b4b587a7b218693ab0bca3ea40475416c59f4fcd0a0af93294633e97a50c204701c4e4e0dba85e26e092dd797aeca8bd15ce3da747c24749d1bad700bbb62c5c6505e98fcfad0c80a7416edfe8170755ad0cc3aedecbfa6fcf77a7fbf912d53f5dfea41276793cb3af00d5a74928f20823343019ad7056355a7b71eacae0441e72c8cd5148e43ce2f68ba6c01eff07a4a8155710ce502a4f3cb290f54b3b8cd269ed956a65f4213ffeb85e64da59064aab914f5a3d0894c455c3a38e1e9942cf26ef29896aa5fdebe4452ff90f97315c1dcf3a0d522a14726d59732867593f0eb4bf2704ce12375adb3a295bc3527541cd346fa1632117b98d32337fb96535ef7de033733eae435bd25751f3a982b0e57ddb1c0189bebf43484549fd98f7ffc37d973dfa1e5c2b7de83838a130aec0071d8205da3d7999bf1459b3c3120b19452147ad2d9815a4b0e82b096c9a43c45e3a893df82f89a06a7ea5f34f92aba6ee7a5b86395d4f82e69afa145398df5aea295f4bdf05d8ab86913ce2b81a23b727f341855f8bee12a7e231d3e0894346cde006a37035a1ccf6f4658d8826fb3d251be0d61d6bd5d417376f5a873291dcb3275fd52d36d76c8a8541e488581634ab6ca4ffa20af0f2a52b47bfbbdf16c1f510eab4902315897589e0882cd7699e001ee1d6102c0289c01a6e1b2067cdecc3ea9f49e9b15639fe1d14a9cfc701f6a7e5ae9830e6c73d4e0596a13efeea0e5fce0fa70b9e8189a566e0026271403f4b0034cc12b7fcee1cbfc18dae52ee16ccf240c2773a36585c1b9f111c52f351b3d83360e4d5e5222c416d84cd363ad75aafb885de673be3ea75c933248b0b4b7903c220e00088b4611712903386e6c27c7dca28903456822759d981b95fb9166cbf1e301787540f9c296eb66d94b2d0dcf630f8dd21d337e462b9429fa6a5afabc3c986731d42326448633575af3e50da21df9fa4e95645939eef6b53aa07d12aa1cb725ba6738b0b8b5ae93da14a1e67ef9ccead1261264d20ad227a9c132534bdde4bfd7460087ff120a0a71bef1e362575f294704641c682bb53565bf4a056b18ff9bfedd28638b67b898418cd4ca23924f8d5497b8b9311a914bfc831a9353ee78911a18c6d6dea96d901f9a29c4d1a3a421e4cdc6f4b6622e9e50791ecdb8c194580996191239634ead47ec8452ef837e4d405ed9eaf6e84dd3e326c1a453ad33bb47caa97c631c7ccdcb74bf0c9442fc3baaebfcbfcb66110292b76ba3013bbb446ec5fc47a6f827ac2681fb033eeb4e86d81210313e5ed31d878be07f214a35e80f2c684101f6c25dcd36b03ea34f1b1b5fccdacb11a3ba2d821461ccb35b808ecf46c4cd08da332f432f4f1fa79fdaa7834520a1c487e030351687211a964ec5a9b2509088ef49dabbdd2e1154b615e81af4166fcd58eb8d7a259042a16fb935e7a445d8925ed3295e828a7c7b696ad30874a6d0b7a9b03d19a4d68b95738d703c63c20b6dac164f3d68a36ba2fe377bc372b01f75e72b3b06b97b2bb2ef05a6e20d6ac89a9814341b2f455d76ac602f6d6c35fbe383ff4a1d665702acd9078cbab433ba4461fb3cc2840bbd844e1eeda45f64ffea6343a3e2ce69700fe10428ba78cdc7bbe340f63174243bc70d632ee7d34bbd00970aeddc5b9d398775fa9be42a34d54817aaa78034008a7baaa71b5cce6b109d94280a0e82ee407ac65e1c23ea13ec3c3aa7f39cee3c28a856e484d33769396ba1f6c82ad5951a108ba1531cc33ee238b0edba7c63235784292420e2dc3196bc1c18434516d8ea4eec1e47bc3d1a5bf601af45805f33335f9b6a07ca4bfd7fc688140dc9dc953599328e253b40255e86663c8b52ba8b5484615e5e964fc794153fd3bf116fbcee4986be0ec2c3fab03180f19cf9f89cdd8211194caa4729d2f350cd79f46634b17575475f0d96cfc0629b1b40d7f2307b95fb665b23726d64d4d6adf8c0dd175eabfde038066a3543a858f4633d0c933a14b302e9f6816c8429ea81916f5041dcfc5c666cc501e584214e4551da60ad8cbd05c33bfabd152bbd95eb8ecd42d85438af66eee6054acf2d1a62f47ece8e8383770108081faade524e3d39ab08913d64649a534ad07e0f32924e1c4926d9d4065e117a652df57d410ccd74455ce345a1ba12344d4b1d328c7e79e679f5547c3a69087d1497092cffb02f315ae22be68fe029394e8f190659f9b7573d19fb3dd574da116a5be2eae6679672a1d9dba6ebd3260711e6df4f835e198f9d3f8110a55e6ed803d933c8081d0d6bc28a3a3e4c3b4700f1f01fbb30c7792cfc7ee3b01ae04950d4b367876a13d935e5ad7dc5ee226ba3bfe57ddb10ea25ea606348ba5de378a3aab689aa2ad393fb1cb837462a195ae5f66049071c3e1f9dc1b5adb7895d8cd4d9fbfcc908219962b731635966c5917df02d775a8cb9d2ad12d9ff5da2569c0a4d4b05343370bd45c3e73e9e6488a0bc81d5e766c193456eaecf43594bc7928226958e7fa73d7f2b77e660604a00faf5a59a023d94ebb34ea945e75eef48d66f02b95bbbc7b58888696836cf4298862b6827834566a6a4cb20970bd43d7465fd71b7c884a750c2e22dd3330cc876c7f6d4a83e1a9ad32112d5c53060d010f408e3437d9c6b9ca15ea6762acffdc3a52b161e3429cab8638ecaf5be9ad9b642124bee6fe64445d4430892b47ce2a8058490f912ededa79e2bef710202264c8102f2867a931a", 0x1000}, {&(0x7f0000000080)="5a1d5291411bf23b66a566bb2a1b708df3b995ba584366042c1f323c57eab81303f666232dd0bc996aa9bc5f6423617055e8adf855cc20", 0x37}, {&(0x7f0000000300)="924c3039b1928a2a38ab5a838fa274838fae8d27d4fb51562252526771963ded5a11504325b4beefac3fb6b13458830c1aafceec8e598b25731d650d3bf4b3bbc5c0d27f7a81908299200e5536bc754c8989d52aa90756f8ebb94644a18e", 0x5e}, {&(0x7f0000000380)}], 0x6, &(0x7f0000001700)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x28, 0x1, 0x1, [r1, r1, r0, r0, r1]}, @rights={0x20, 0x1, 0x1, [r1, r1, r1, r0]}, @rights={0x18, 0x1, 0x1, [r0, r1]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}], 0xc0, 0x40800}, 0x8000) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r11) [ 288.204068] ? ovl_fill_super+0x23ca/0x3f7b [ 288.208423] ovl_fill_super+0x23ca/0x3f7b [ 288.212602] ? ovl_show_options+0x550/0x550 [ 288.216938] ? __free_pages+0x160/0x190 [ 288.220926] ? selinux_sb_copy_data+0x602/0x740 [ 288.225629] ? selinux_capable+0x36/0x40 [ 288.229709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.235270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.240823] ? get_anon_bdev+0xc0/0xc0 [ 288.244722] ? sget+0x113/0x150 [ 288.248015] ? ovl_show_options+0x550/0x550 [ 288.252348] mount_nodev+0x6b/0x110 21:38:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x27, 0x0, 0x70bd27, 0x25dfdbfb, {0xb}, [@typed={0x8, 0x55, @ipv4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4010}, 0x80) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000280)={0x8, 0x3, 0x40, 0x6c, &(0x7f0000000140)=""/108, 0x9d, &(0x7f00000001c0)=""/157, 0x1000, &(0x7f0000000500)=""/4096}) setregid(0x0, r2) [ 288.255996] ovl_mount+0x2c/0x40 [ 288.259373] mount_fs+0xae/0x31d [ 288.262763] vfs_kern_mount.part.35+0xdc/0x4f0 [ 288.267374] ? may_umount+0xb0/0xb0 [ 288.271014] ? _raw_read_unlock+0x2c/0x50 [ 288.275179] ? __get_fs_type+0x97/0xc0 [ 288.279087] do_mount+0x581/0x31f0 [ 288.282657] ? kasan_check_read+0x11/0x20 [ 288.286825] ? do_raw_spin_unlock+0xa7/0x2f0 [ 288.291246] ? copy_mount_string+0x40/0x40 [ 288.295488] ? kasan_check_write+0x14/0x20 [ 288.299737] ? kasan_unpoison_shadow+0x35/0x50 [ 288.304332] ? kasan_kmalloc+0xc7/0xe0 [ 288.308241] ? kmem_cache_alloc_trace+0x31f/0x750 [ 288.313095] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 288.313123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.313142] ? copy_mount_options+0x288/0x380 [ 288.328697] ksys_mount+0x12d/0x140 [ 288.332336] __x64_sys_mount+0xbe/0x150 [ 288.336333] do_syscall_64+0x1b9/0x820 [ 288.340235] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.345621] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.350573] ? trace_hardirqs_on_caller+0x310/0x310 [ 288.355628] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 288.360655] ? recalc_sigpending_tsk+0x180/0x180 [ 288.365432] ? kasan_check_write+0x14/0x20 [ 288.369672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.374532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.374543] RIP: 0033:0x457579 [ 288.374565] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:38:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) connect$pptp(r2, &(0x7f0000000240)={0x18, 0x2, {0x1, @broadcast}}, 0x1e) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) connect$nfc_llcp(r3, &(0x7f0000000900)={0x27, 0x1, 0x2, 0x7, 0x95, 0x9, "5aee455c6f6d399721e4f26966f23965d096c62707ba6bd9b6f1ab5617fa1af05246fbb0bc3dbea36eec8389ca34fcbf31aae14665b0da7ec50a557cca19c1", 0x26}, 0xffffffffffffffda) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000100)=""/247) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwritev(r0, &(0x7f0000000880)=[{&(0x7f00000002c0)="626715005388e28d7e2f496526b1810e8cdfbfba58d5f2ae16ab4944f590d3b1788829c44c600783e3dcd08fd50659dcefb60fdf3a4632d8a42f38e7d4a604ac7b8ab577468b2a37b8b7933b3abf064ed40897280ee4ce8ec1c311e8e9b7b37c3e10be44ca0a8f8ed07dcb56c1d16b23ddfa5f0c3d59c8f0ad096587ccff755a83518be7d93ae55a47734576264f51adc7938439926868aac5e46f4311789e4d7cbde61cf954b9cd98bc2aec03f0898fcf520f65009385ade8d08dc97c73f1e5d7593e", 0xc3}, {&(0x7f0000000500)="14dc05a8100846ca420caa384b6f89281eaee515b006e332fd4f9d295d7c9d3111fa3748032342d689ca52f53b2e121b45eb702317d05445e479db246e5713a1e7526e15d00daa213c2eac343e13f286fc2a05595e4155d5a57722264c2e92905d25c643a32c3a95d42ba6c4638dc81c77bc15ca8251934c27ea29c1e63652789f7af677dcd4029516e448e8c358ae9caf3c2e8b9c29cb0de540a7d23651aa2f07bf424b605d5595031b73c50534933aea75f83d2500f3045679765ed082dda5a80f7c9c883e6ac48aa17cae67dd617e6872b5d75381edd1aed6b64214413325d8d5995a7bbf85", 0xe7}, {&(0x7f0000000600)="b1af36ad86d26648ecafc84a23ce4a77d52bc17d9f98b46a9f52378003e14387abff60f9098d9e06885cbf0a22371d88075bf5892e2c970b326edfe503a264a830e38e0e561bf61b4fb4121de522d7eb12bdded847b4fa0fd1ff34afd10df97492fab1ed238937d758a441b80b7478740413a380ae851816e8a7048bfeebb1af8b6be98456cf57af4d9c0b76c5734664720bf78336a13097035c2e0b7b9c48d8748880040464e2e833164cb1bd9d59784b5de916e1902a2d6c78f0c2da4c1c72", 0xc0}, {&(0x7f00000006c0)="8f279ddd1d6b8b9056ed28477ca39c8951959bbdce52c9ccfa064de0462f863d0bc8107d4d3eb5845ce56e71062c3125ad698bb6202a48138d40f31f82de4e6b232501b49a99aa4364763974b7d06ff300b7166037c5b7058a1b8ff128723537ffd66789617304d90380793cc6d937e63a34efe8e57acdd2e55a73e5e51c8c9488f297d75cefa1b2f05da1f0", 0x8c}, {&(0x7f0000000080)="00886310e98ed879a0150d6fb2a63d2123df6bcd61e3e0", 0x17}, {&(0x7f0000000780)="23c2f2d1cdd09865d438653c7f69ac88824d8023ad50832ca9cc33fd2c99ade8befb3b4ed8e8e886b667c98ff751c04d4c4e3e9959ad39099f7b8ca0bb1a2d8250601624fde3e093a5ecb650fd0324f6d3facb06ad8970dc9dddbb2f87cbb946987fc43f996c951f2085c3a3600eb7caebc254ed410729516d0d57d398d51b60472d38090716bd9083688a74c41a8986f2fb53b9eeef8ad44918c8e5abc672de9b2634c65514a016522cc1f6e6fa0898", 0xb0}, {&(0x7f0000000400)="e87cd5a4873ba28c5974ebb8f98e7108688643b715a47f7605fefb4344c70b1bb875401547b99c619dbdcd4ec0b709499c2731cdc7aeca6d71b76b6037e8d761a2909bc5875bc958d63ea0c4c3e358e788d2ff9e", 0x54}, {&(0x7f0000000840)="37013517dfcc92664a9ed02ecaa1f2723fed983e74cfc0a0d6887ea2d9b159", 0x1f}], 0x8, 0x30) setregid(0x0, r4) 21:38:38 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x4001e2, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:38 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@access_uid={'access'}}]}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:38 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x403000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:38 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x100, 0x0) openat(r0, &(0x7f0000000400)='./file0/file0\x00', 0x400, 0x142) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xa8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000200)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) geteuid() getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000340)=0xe8) setresuid(r5, r4, r6) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r7) write$P9_RWRITE(r3, &(0x7f0000000440)={0xb, 0x77, 0x1, 0x6}, 0xb) 21:38:38 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0xc0ffff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:38 executing program 3 (fault-call:4 fault-nth:71): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 288.401836] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 288.409529] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 288.416782] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 288.424052] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 288.431305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 288.438559] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 21:38:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x9e) creat(&(0x7f0000000400)='./file0\x00', 0xc1) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ustat(0x100, &(0x7f0000000100)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000180)={0x8, 0x917, 0x2, 0xfffffffffffffffb, 0x4, 0xfffffffffffffff8}) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x4800) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000140)={0x2, 0x0, [{0xae6, 0x0, 0x27b49779}, {0x0, 0x0, 0xb7000000000000}]}) setregid(0x0, r2) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000080)=0x2000, 0x4) [ 288.562955] FAULT_INJECTION: forcing a failure. [ 288.562955] name failslab, interval 1, probability 0, space 0, times 0 [ 288.580684] Unknown ioctl 1076389384 [ 288.588108] Unknown ioctl 1074310793 [ 288.594552] CPU: 1 PID: 10553 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 288.601857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.605949] Unknown ioctl 1076389384 [ 288.611207] Call Trace: [ 288.611238] dump_stack+0x1c4/0x2b4 [ 288.611266] ? dump_stack_print_info.cold.2+0x52/0x52 [ 288.615568] Unknown ioctl 1074310793 [ 288.617548] ? avc_has_perm_noaudit+0x424/0x630 [ 288.617568] ? lock_downgrade+0x900/0x900 [ 288.617603] should_fail.cold.4+0xa/0x17 [ 288.623270] 9pnet: Insufficient options for proto=fd [ 288.626419] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.626434] ? mark_held_locks+0x130/0x130 [ 288.626462] ? __sanitizer_cov_trace_cmp4+0x16/0x20 21:38:38 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21:38:38 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x100000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 288.635838] ovl_get_fh: 18 callbacks suppressed [ 288.635846] overlayfs: invalid origin (7900) [ 288.638970] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 288.638988] ? modules_open+0xa0/0xa0 [ 288.639011] ? fs_reclaim_acquire+0x20/0x20 [ 288.684386] ? lock_downgrade+0x900/0x900 [ 288.688551] ? ___might_sleep+0x1ed/0x300 [ 288.692722] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 288.695418] overlayfs: filesystem on './file0' not supported as upperdir [ 288.698007] ? arch_local_save_flags+0x40/0x40 [ 288.698022] ? rcu_bh_qs+0xc0/0xc0 [ 288.698043] ? unwind_dump+0x190/0x190 [ 288.716877] __should_failslab+0x124/0x180 [ 288.721135] should_failslab+0x9/0x14 [ 288.724930] kmem_cache_alloc+0x2be/0x730 [ 288.729070] ? is_bpf_text_address+0xac/0x170 [ 288.733555] alloc_vfsmnt+0xe9/0x990 [ 288.737256] ? m_stop+0x20/0x20 [ 288.740523] ? kasan_check_read+0x11/0x20 [ 288.744660] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 288.749923] ? rcu_bh_qs+0xc0/0xc0 [ 288.753449] ? unwind_dump+0x190/0x190 [ 288.757337] ? is_bpf_text_address+0xd3/0x170 [ 288.761826] ? kernel_text_address+0x79/0xf0 [ 288.766220] ? __kernel_text_address+0xd/0x40 [ 288.770702] ? unwind_get_return_address+0x61/0xa0 [ 288.775625] ? __save_stack_trace+0x8d/0xf0 [ 288.779936] ? save_stack+0xa9/0xd0 [ 288.783545] ? save_stack+0x43/0xd0 [ 288.787166] ? kasan_kmalloc+0xc7/0xe0 [ 288.791043] ? __kmalloc+0x14e/0x760 [ 288.794742] ? ovl_fill_super+0x240e/0x3f7b [ 288.799072] clone_mnt+0x124/0x13b0 [ 288.802688] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.808039] ? kern_mount_data+0xc0/0xc0 [ 288.812098] ? fs_reclaim_acquire+0x20/0x20 [ 288.816413] ? lock_downgrade+0x900/0x900 [ 288.820548] ? ___might_sleep+0x1ed/0x300 [ 288.824695] ? trace_hardirqs_on+0xbd/0x310 [ 288.829019] ? ovl_fill_super+0x240e/0x3f7b [ 288.833327] ? kasan_unpoison_shadow+0x35/0x50 [ 288.837896] ? kasan_kmalloc+0xc7/0xe0 [ 288.841783] ? __kmalloc+0x31c/0x760 [ 288.845504] clone_private_mount+0xba/0x100 [ 288.849814] ovl_fill_super+0x2731/0x3f7b [ 288.853957] ? ovl_show_options+0x550/0x550 [ 288.858266] ? __free_pages+0x160/0x190 [ 288.862245] ? selinux_sb_copy_data+0x602/0x740 [ 288.866917] ? selinux_capable+0x36/0x40 [ 288.870966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.876491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.882023] ? get_anon_bdev+0xc0/0xc0 [ 288.885925] ? sget+0x113/0x150 [ 288.889194] ? ovl_show_options+0x550/0x550 [ 288.893504] mount_nodev+0x6b/0x110 [ 288.897126] ovl_mount+0x2c/0x40 [ 288.900481] mount_fs+0xae/0x31d [ 288.903857] vfs_kern_mount.part.35+0xdc/0x4f0 [ 288.908428] ? may_umount+0xb0/0xb0 [ 288.912053] ? _raw_read_unlock+0x2c/0x50 [ 288.916198] ? __get_fs_type+0x97/0xc0 [ 288.920074] do_mount+0x581/0x31f0 [ 288.923614] ? copy_mount_string+0x40/0x40 [ 288.927840] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 288.932597] ? retint_kernel+0x2d/0x2d [ 288.936474] ? copy_mount_options+0x1e2/0x380 [ 288.940955] ? copy_mount_options+0x1f3/0x380 [ 288.945453] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 288.950280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 288.955802] ? copy_mount_options+0x288/0x380 [ 288.960284] ksys_mount+0x12d/0x140 [ 288.963896] __x64_sys_mount+0xbe/0x150 [ 288.967871] do_syscall_64+0x1b9/0x820 [ 288.971759] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.977116] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.982036] ? trace_hardirqs_on_caller+0x310/0x310 [ 288.987042] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 288.992075] ? recalc_sigpending_tsk+0x180/0x180 [ 288.996841] ? kasan_check_write+0x14/0x20 [ 289.001078] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.005935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.011125] RIP: 0033:0x457579 [ 289.014309] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.033219] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 289.040936] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 289.048207] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 289.055469] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 21:38:38 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x1000000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:38 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x403000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xcad, 0x400200) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10001, 0x2200) write$FUSE_WRITE(r0, &(0x7f00000001c0)={0x18, 0x808879d268c97ef1, 0x6, {0x126d}}, 0x18) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x180, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000100)='-&!lotrusted\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3f) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180), 0x10) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r3) [ 289.062721] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 289.069976] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 289.087914] overlayfs: failed to clone lowerpath 21:38:39 executing program 3 (fault-call:4 fault-nth:72): setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:39 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 289.203703] overlayfs: invalid origin (7900) [ 289.204253] 9pnet: Insufficient options for proto=fd [ 289.230031] overlayfs: invalid origin (7900) [ 289.239108] overlayfs: filesystem on './file0' not supported as upperdir [ 289.249280] FAULT_INJECTION: forcing a failure. 21:38:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) signalfd4(r0, &(0x7f0000000080)={0x20}, 0x8, 0x80800) setfsgid(r2) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setresuid(0x0, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r3) [ 289.249280] name failslab, interval 1, probability 0, space 0, times 0 [ 289.276753] overlayfs: invalid origin (7900) [ 289.297277] CPU: 0 PID: 10594 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 289.304599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.304608] Call Trace: [ 289.304653] dump_stack+0x1c4/0x2b4 [ 289.320228] ? dump_stack_print_info.cold.2+0x52/0x52 [ 289.325437] ? lock_downgrade+0x900/0x900 [ 289.329619] should_fail.cold.4+0xa/0x17 [ 289.333698] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.338812] ? rcu_bh_qs+0xc0/0xc0 [ 289.342362] ? unwind_dump+0x190/0x190 [ 289.346269] ? is_bpf_text_address+0xd3/0x170 21:38:39 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402643, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:39 executing program 2: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x402607, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 289.346291] ? __kernel_text_address+0xd/0x40 [ 289.356030] ? unwind_get_return_address+0x61/0xa0 [ 289.360975] ? __save_stack_trace+0x8d/0xf0 [ 289.365319] ? fs_reclaim_acquire+0x20/0x20 [ 289.369656] ? lock_downgrade+0x900/0x900 [ 289.373820] ? ___might_sleep+0x1ed/0x300 [ 289.377979] ? mount_fs+0xae/0x31d [ 289.381531] ? arch_local_save_flags+0x40/0x40 [ 289.386126] ? __x64_sys_mount+0xbe/0x150 [ 289.390289] ? do_syscall_64+0x1b9/0x820 [ 289.394366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.399748] ? kasan_check_read+0x11/0x20 21:38:39 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400007, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 289.399824] overlayfs: invalid origin (7900) [ 289.403909] __should_failslab+0x124/0x180 [ 289.403924] should_failslab+0x9/0x14 [ 289.403943] kmem_cache_alloc_trace+0x2d7/0x750 [ 289.403971] ? lock_release+0x970/0x970 [ 289.425054] ? arch_local_save_flags+0x40/0x40 [ 289.429648] ovl_encode_real_fh+0xca/0x500 [ 289.433878] ? __mnt_want_write+0x327/0x420 [ 289.438189] ? ovl_set_attr+0x550/0x550 [ 289.442154] ? may_umount_tree+0x210/0x210 [ 289.446380] ovl_verify_set_fh+0x36/0x180 [ 289.450514] ovl_fill_super+0x3026/0x3f7b [ 289.454651] ? ovl_show_options+0x550/0x550 [ 289.458971] ? __free_pages+0x160/0x190 [ 289.462947] ? selinux_sb_copy_data+0x602/0x740 [ 289.467641] ? selinux_capable+0x36/0x40 [ 289.471714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.477237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.482761] ? get_anon_bdev+0xc0/0xc0 [ 289.486640] ? sget+0x113/0x150 [ 289.489910] ? ovl_show_options+0x550/0x550 [ 289.494215] mount_nodev+0x6b/0x110 [ 289.497835] ovl_mount+0x2c/0x40 [ 289.501207] mount_fs+0xae/0x31d [ 289.504560] vfs_kern_mount.part.35+0xdc/0x4f0 [ 289.509156] ? may_umount+0xb0/0xb0 [ 289.512774] ? _raw_read_unlock+0x2c/0x50 [ 289.516907] ? __get_fs_type+0x97/0xc0 [ 289.520779] do_mount+0x581/0x31f0 [ 289.524315] ? trace_hardirqs_off+0x310/0x310 [ 289.528810] ? retint_kernel+0x1b/0x2d [ 289.532683] ? copy_mount_string+0x40/0x40 [ 289.536903] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 289.541654] ? trace_hardirqs_off+0xaf/0x310 [ 289.546047] ? retint_kernel+0x2d/0x2d [ 289.549926] ? copy_mount_options+0x1a1/0x380 [ 289.554404] ? copy_mount_options+0x1b2/0x380 [ 289.558885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.564403] ? copy_mount_options+0x288/0x380 [ 289.568881] ksys_mount+0x12d/0x140 [ 289.572493] __x64_sys_mount+0xbe/0x150 [ 289.576455] do_syscall_64+0x1b9/0x820 [ 289.580328] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.585677] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.590621] ? trace_hardirqs_on_caller+0x310/0x310 [ 289.595648] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 289.600649] ? recalc_sigpending_tsk+0x180/0x180 [ 289.605389] ? kasan_check_write+0x14/0x20 [ 289.609879] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.614719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.619899] RIP: 0033:0x457579 [ 289.623080] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.641972] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 21:38:39 executing program 4: getpeername$llc(0xffffffffffffffff, &(0x7f0000000440)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0xfffffffffffffe2b) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x40d203, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 21:38:39 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0xffffffffffffff01) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000940)=ANY=[@ANYBLOB], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000003c0)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) pipe(&(0x7f0000000280)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}]}) r0 = open(&(0x7f0000000640)='./file1\x00', 0x20000, 0xfffffffffffffffe) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="000002000000a2c9"], 0x3) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 289.649679] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 289.656930] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 289.664183] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 289.671436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 289.678701] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 289.689082] overlayfs: failed to verify origin (128/file0, ino=16552, err=-12) [ 289.696856] ------------[ cut here ]------------ [ 289.701640] kernel BUG at arch/x86/mm/physaddr.c:22! [ 289.706749] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 289.712116] CPU: 0 PID: 10594 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #53 [ 289.719384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.728767] RIP: 0010:__phys_addr+0xff/0x120 [ 289.733179] Code: 3c 02 00 75 31 4c 8b 25 ff c3 ee 07 48 89 de bf ff ff ff 1f e8 a2 7a 46 00 49 01 dc 48 81 fb ff ff ff 1f 76 a7 e8 61 79 46 00 <0f> 0b e8 6a e9 89 00 e9 7a ff ff ff e8 c0 e9 89 00 eb c8 0f 1f 40 [ 289.752089] RSP: 0018:ffff88017ec6f770 EFLAGS: 00010046 [ 289.757454] RAX: 0000000000040000 RBX: 000000007ffffff4 RCX: ffffc90007f30000 [ 289.764720] RDX: 0000000000040000 RSI: ffffffff81385c2f RDI: 0000000000000007 [ 289.771986] RBP: ffff88017ec6f788 R08: ffff8801c5528500 R09: ffffed003b5c4fe8 [ 289.779259] R10: ffffed003b5c4fe8 R11: ffff8801dae27f47 R12: 000000007ffffff4 [ 289.786527] R13: 0000000000000001 R14: ffffffff882f8c80 R15: 00000000000040a8 [ 289.793802] FS: 00007f4a24492700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 289.802041] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 289.807924] CR2: 0000000000930004 CR3: 00000001d16b8000 CR4: 00000000001406f0 [ 289.815199] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 289.822473] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 289.829733] Call Trace: [ 289.832341] ? ovl_verify_set_fh+0xba/0x180 [ 289.836661] kfree+0x7b/0x230 [ 289.839784] ovl_verify_set_fh+0xba/0x180 [ 289.843933] ovl_fill_super+0x3026/0x3f7b [ 289.848101] ? ovl_show_options+0x550/0x550 [ 289.852427] ? __free_pages+0x160/0x190 [ 289.856403] ? selinux_sb_copy_data+0x602/0x740 [ 289.861077] ? selinux_capable+0x36/0x40 [ 289.865146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.870694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.876233] ? get_anon_bdev+0xc0/0xc0 [ 289.880132] ? sget+0x113/0x150 [ 289.883433] ? ovl_show_options+0x550/0x550 [ 289.887759] mount_nodev+0x6b/0x110 [ 289.891392] ovl_mount+0x2c/0x40 [ 289.894758] mount_fs+0xae/0x31d [ 289.898134] vfs_kern_mount.part.35+0xdc/0x4f0 [ 289.902724] ? may_umount+0xb0/0xb0 [ 289.906351] ? _raw_read_unlock+0x2c/0x50 [ 289.910497] ? __get_fs_type+0x97/0xc0 [ 289.914390] do_mount+0x581/0x31f0 [ 289.917945] ? trace_hardirqs_off+0x310/0x310 [ 289.922439] ? retint_kernel+0x1b/0x2d [ 289.926327] ? copy_mount_string+0x40/0x40 [ 289.930562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 289.935328] ? trace_hardirqs_off+0xaf/0x310 [ 289.939735] ? retint_kernel+0x2d/0x2d [ 289.943633] ? copy_mount_options+0x1a1/0x380 [ 289.948123] ? copy_mount_options+0x1b2/0x380 [ 289.952626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.958163] ? copy_mount_options+0x288/0x380 [ 289.962658] ksys_mount+0x12d/0x140 [ 289.966284] __x64_sys_mount+0xbe/0x150 [ 289.970278] do_syscall_64+0x1b9/0x820 [ 289.974166] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.979531] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.984462] ? trace_hardirqs_on_caller+0x310/0x310 [ 289.989474] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 289.994494] ? recalc_sigpending_tsk+0x180/0x180 [ 289.999250] ? kasan_check_write+0x14/0x20 [ 290.003513] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.008364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.013553] RIP: 0033:0x457579 [ 290.016757] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.035667] RSP: 002b:00007f4a24491c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 290.043397] RAX: ffffffffffffffda RBX: 00007f4a24491c90 RCX: 0000000000457579 [ 290.050676] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 290.057954] RBP: 000000000072bf00 R08: 0000000020000100 R09: 0000000000000000 [ 290.065234] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4a244926d4 [ 290.072503] R13: 00000000004c292a R14: 00000000004d3d68 R15: 0000000000000003 [ 290.079787] Modules linked in: [ 290.082993] ---[ end trace 73eb221d3c3006b3 ]--- [ 290.087765] RIP: 0010:__phys_addr+0xff/0x120 [ 290.092171] Code: 3c 02 00 75 31 4c 8b 25 ff c3 ee 07 48 89 de bf ff ff ff 1f e8 a2 7a 46 00 49 01 dc 48 81 fb ff ff ff 1f 76 a7 e8 61 79 46 00 <0f> 0b e8 6a e9 89 00 e9 7a ff ff ff e8 c0 e9 89 00 eb c8 0f 1f 40 [ 290.111073] RSP: 0018:ffff88017ec6f770 EFLAGS: 00010046 [ 290.116440] RAX: 0000000000040000 RBX: 000000007ffffff4 RCX: ffffc90007f30000 [ 290.123703] RDX: 0000000000040000 RSI: ffffffff81385c2f RDI: 0000000000000007 [ 290.130969] RBP: ffff88017ec6f788 R08: ffff8801c5528500 R09: ffffed003b5c4fe8 [ 290.138238] R10: ffffed003b5c4fe8 R11: ffff8801dae27f47 R12: 000000007ffffff4 [ 290.145502] R13: 0000000000000001 R14: ffffffff882f8c80 R15: 00000000000040a8 [ 290.152776] FS: 00007f4a24492700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 290.161003] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 290.166884] CR2: 0000000000930004 CR3: 00000001d16b8000 CR4: 00000000001406f0 [ 290.174162] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 290.181424] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 290.188689] Kernel panic - not syncing: Fatal exception [ 290.194952] Kernel Offset: disabled [ 290.198574] Rebooting in 86400 seconds..