0x9, 0x21deab3fe58fcd64) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) recvmsg(r2, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 03:37:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0), 0x2c7, 0x0, 0x0, 0xfffffffffffffd07) 03:37:49 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x491, 0x80000) connect$netrom(r2, &(0x7f00000000c0)={{0x3, @default, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r3}, 0x58) [ 1793.115569] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x02\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:50 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0xf, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:50 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x8, &(0x7f0000000140)=[{0x6b8, 0x3, 0x4, 0xee51}, {0x2, 0x7, 0x6f2, 0x5}, {0x0, 0x1, 0xfff, 0x3f}, {0x5, 0x101, 0x3, 0x6}, {0x9, 0x133b2f16, 0x7f, 0x9f3c}, {0xb25f, 0x90, 0x7, 0xffff}, {0x1, 0x5f6, 0x5, 0x7fffffff}, {0x693afa93, 0x5, 0x0, 0x800}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001d80)={'irlan0\x00\x00\x00\x00\x10\x00'}) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "e87ad01cc52044ebc0b90e755dac41a9"}, 0x11, 0x2) [ 1793.480538] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:50 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x25, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) 03:37:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x03\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:50 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000080)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r3, 0x227f, &(0x7f0000000100)) 03:37:50 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) open(&(0x7f0000000100)='.\x00', 0x200, 0x22) write$uinput_user_dev(r0, &(0x7f0000000480)={'syz1\x00', {0x6, 0x8, 0x8001, 0x404000000}, 0x1f, [0x2, 0x9, 0x0, 0x8, 0x0, 0x100000001, 0x3, 0x9fa, 0x100, 0x2230000, 0x0, 0x9, 0x1000, 0x7, 0x5, 0x8, 0x4, 0x9, 0x3, 0x0, 0x8, 0x1, 0x8, 0x7, 0x32a6, 0x1, 0x2, 0x101, 0x1, 0x0, 0x100000000, 0x0, 0x7681, 0x6, 0x1, 0x1, 0x6dfd, 0x4, 0x6d1e, 0xfffffffffffffffa, 0x794d, 0x9, 0x10001, 0x58, 0x5, 0x6, 0x3, 0x8, 0x4865, 0x0, 0x7, 0xffffffffffffffe1, 0xbb4a, 0x7, 0x6, 0x0, 0x1000, 0x4, 0x1f, 0x10001, 0x6, 0x0, 0x9, 0x2], [0xff4d, 0x2, 0x8, 0x2, 0x19, 0x1000, 0xff, 0x81, 0x6, 0x8, 0x2, 0xc8, 0x9, 0x6, 0xffffffffffffffff, 0x6, 0x3, 0x10001, 0x5, 0x0, 0x8001, 0x5, 0x5, 0x12d08c9a, 0x4e, 0x7, 0x7ff, 0x1, 0x2, 0x5, 0x8, 0x7fffffff, 0xffffffff, 0x401, 0x100000001, 0x100000000, 0x1, 0x3, 0x40, 0x9, 0x1, 0x0, 0x6, 0xd54, 0xfd6a, 0x20, 0x9e0, 0x56e, 0x40, 0x2, 0x7fff, 0xac0, 0x2, 0x0, 0x8, 0x1, 0xa46, 0x4, 0xcbd3, 0x6, 0x80, 0x1, 0xfffffffffffffc48, 0xac91], [0xe30, 0x1, 0x1, 0x4, 0xfff, 0x1, 0x3, 0x7f4, 0x35, 0x101, 0x1, 0x3, 0x100000001, 0x90d, 0x401, 0x30a, 0xfffffffffffffffa, 0x30, 0x4, 0x0, 0x1, 0x0, 0x5, 0x100000001, 0x873, 0xdb50, 0x1, 0x5, 0xe9f, 0x4, 0x800, 0x4, 0x4, 0x0, 0x3, 0x0, 0x9, 0x8, 0x1, 0x9, 0x10000, 0xdd, 0x3ff, 0x81, 0x2, 0xa035, 0x8, 0x7, 0x2, 0xfffffffffffeffff, 0x1ff, 0x8, 0x3, 0x40000, 0x400, 0x100000000, 0x4, 0x100000001, 0x4, 0x69, 0x800, 0x1, 0x40, 0x3ff], [0x80000001, 0x0, 0x0, 0x2, 0x80, 0x2000000000, 0x4e95, 0x200, 0x7ff, 0x3f, 0x4af9, 0x400000000000000, 0x100000000, 0xffffffff, 0x81, 0x8, 0x94, 0x0, 0x101, 0x80000001, 0x4, 0x101, 0x0, 0x6, 0x8, 0x7fff, 0x5, 0x2, 0x6, 0x6, 0x80000000, 0x4, 0x6acf, 0x9, 0x4, 0x3, 0x2, 0x6, 0x1, 0x6, 0x0, 0x0, 0x92c, 0x5, 0x5, 0x80000001, 0x7f, 0xfffffffffffffbff, 0x4, 0x100, 0x2, 0x7fff, 0x3, 0x0, 0x5, 0x8, 0x1, 0x1, 0x80000001, 0x101, 0x2, 0x4, 0x1f, 0x1f]}, 0x45c) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18, 0x0, 0x5, {0xf46}}, 0x18) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000180)={0x2, 'veth1\x00', 0x1}, 0x18) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f00000001c0)={0x4cb, 0x3cf}) 03:37:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) syz_open_dev$evdev(0x0, 0x9, 0x21deab3fe58fcd64) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) recvmsg(r2, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 03:37:50 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, r2}, 0xc) socket$inet_tcp(0x2, 0x1, 0x0) 03:37:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) [ 1794.091599] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:51 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x46, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x04\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:51 executing program 2: r0 = msgget$private(0x0, 0x11) msgsnd(r0, &(0x7f0000000080)={0x3, "2ce0d2333f18a4de8432d2fec5482e5f971345770e8f02a58b5a4c838ce1ca882daa797f7a1700e1e803eda228fbc3680ad601547e6f8e71ea64a05c218a3c9ca490b9fe4e1de40ec1e0597a8d641b7b1bc0bb4f55d682f4cfd1edbfa3f929acfd146b56ff62a32119bb61f5aa5e38557f759a8824a701d155bd441f543b5d4ab8e332bd8eb91eb7e3c47e1a400c2a7185eacc533daf273314897e3dcfa8b0fcccaba54f3dc74bc22e7509f2efaa6c247e33d2"}, 0xbb, 0x800) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000180)={0xf267, {{0x2, 0x4e22, @remote}}, 0x1, 0x5, [{{0x2, 0x4e20, @rand_addr=0x7}}, {{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}}]}, 0x310) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000005c0)={'nat\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}, &(0x7f0000000580)=0x1f) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, r3}, 0xffffff2c) 03:37:51 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000300)={"f64a77d0791e67acea5da38ac886f86e18361ee422fb8339a73eae8d35ee80ee89c485eecfa6f7029f78c9c022472cdeee481287d4e43b5b57885892dc16ae7b2d970811f17ab0cdf34f9525711bba856011f652c7cdd42bf0afeee9dcfe34c7dbe76c9c13a88bfcee2d3b96c7835f98a774ff91905757c80ff3a8135fc85e66a75fce8c7fc2c4d815362e4bda9864b08f3ce70399d06869c41eed8c1c30e80957a8c7c3c02fa42e9dbe10c5e6366ea15940d37878906e39e79f0b23572109cda70bbf93e0b6ddc27f2ae84c3d812a0c12387878cb268789091b72b2cafa48e0894933d972d634e1bf3b059197bdcc8c2e77cddf91e1e91007ff316f0da3fcb950c81b180726ebeaf8c403f830818a31b16d73137dca71e1e94a28925dcd1040851ed5a829f382276e9e1b329611ee81d920e7de7274020e4e63b110a21919659389075c0adb8f447f9abe3ded388af0d381224cc97d83d8ce20136364137740eb838ca7829fb0555cd5bd2fa12ba380698a359c50f67afd60811359b989bd11b8a4870a8afcba3fb55f1e1b1b776b816f41edb1391e0397f34a00ad0d4965eb9630306168677bb871b9b4a41c61f0aab4f6436eefdb2a015d650c5ce11b5c640e10289d264f0681936a8701819da3e7922d7cdc7adc7c2edda3dc098eaa40c6c3ccb39a9bbcd2cf4e83f1e446a378540f338fccd4e0779bcd71329642dba3e79f467a727087ace0c18ba570bb0bf800017e0ced18b5fb62752c2c7ca3f62e508df489b173b7b7fab090bf49650230b7990a06dac6957c80ab785562f709660ce7bf0152ec61e87ae551098e9b4145a11ab97068f944f45c6ab9958d6d6cea813a4a529b6a312a6e3572aadbe95c828f760967afa305d957930a62f31d21192d44ef78054347f819752a4235a0e568ab5acb2c5beec65712c80df1fa32c9f398187752df2ceaecf6e7887072c9c8cfc6fd8d83f72f3d936b675fa291a25128cb92219257177ad8192e98fbd4df41b304d80ea2b9f57e1716743c7ee7cae0044a4760bafc9f3eb591650ceeb6a1f35acf03aad04d6b042697ed3c100e142eaccffdd6f74ffc780f1559dd3618ccb17dfd2873bef203dfc19380cdaefc91c5d8a00cc012eca4f6777a8c5e7869fdcd024089066c55d7fb40c11622428a44ade3ba00cce379b1fa773cbcb00aed1fc3959584b49e9334d571ef7a16c1163197fb956936d1778fe42fec216eb2c50ef79d9befae5ed066db1213b85e0408a9f99c08ae4cb190a2252d47f5af3df8050ca2f34d2ccdea7a4656467d273be44fb94bfb35612837377e0ad7ac874bdf33bcbac61a3bc31c5dafc2ba17faecd4864108ba4989340597df92ef40258e43bc46d19155c8bde34d9178389b41f2b55e9d536ca860182cb5afbdcc759257995f3661738b3412f41ba2d6a9dc66bafc0006def1"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x6, 0x100}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r2, 0x0, 0x30}, 0xc) ioctl(r1, 0xc, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) ppoll(&(0x7f00000002c0)=[{r3}], 0xa0, 0x0, 0x0, 0x0) 03:37:51 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fremovexattr(r0, &(0x7f0000000500)=@known='security.apparmor\x00') r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000980)='/dev/snd/pcmC#D#c\x00', 0x1, 0x4000) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f00000009c0)={0x8, 0xa76, 0x40, 0x18, 0x1, 0x1000}) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000580)) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f00000004c0)=0x63) ioctl$DRM_IOCTL_ADD_BUFS(r4, 0xc0206416, &(0x7f0000000100)={0xbb0, 0x3, 0x0, 0xfeb, 0x2, 0xe6c0}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x2000, 0x0) fstat(r6, &(0x7f0000000600)) socket$caif_seqpacket(0x25, 0x5, 0x1000000000004) write$smack_current(r6, &(0x7f0000000480)='tunl0\x00', 0x6) ioctl$VIDIOC_RESERVED(r6, 0x5601, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r4, &(0x7f00000005c0)={0x10000000}) setsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000540), 0x4) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r6, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4004002}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c010000", @ANYRES16=r8, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x94}, 0x44000) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f00000006c0)={0x0, 0x0, 0x8, 0x0, [], [{0x20, 0x4, 0x6, 0x3, 0x293, 0xc551}, {0x1, 0x2f4afb61, 0x9, 0x0, 0x1, 0x7f}], [[], [], [], [], [], [], [], []]}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012bbd7000fcdbdf2501000000000000000b000000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) connect$caif(r0, &(0x7f0000000a00)=@rfm={0x25, 0x8000, "800daafc029ad61e7e98fec3fb320fe1"}, 0x18) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, r5}, 0x58) 03:37:51 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x300, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) [ 1794.483285] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8000, 0x400) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x2, 0x2, [0x7, 0x7]}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e24, 0x2, @empty, 0x3f}}, 0x5, 0x2, 0x7fff, 0x4, 0x90}, &(0x7f00000000c0)=0x98) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r3}], 0xa0, 0x0, 0x0, 0x0) 03:37:51 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000480)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@empty}}, &(0x7f0000000580)=0xe8) recvfrom(r1, &(0x7f0000000240)=""/77, 0x4d, 0x2000, &(0x7f00000005c0)=@ll={0x11, 0x6, r3, 0x1, 0x4, 0x6, @broadcast}, 0x80) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IOC_PR_RELEASE(r6, 0x401070ca, &(0x7f0000000400)={0x401, 0x4}) write(r6, &(0x7f0000000340), 0x41395527) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) r7 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000640)='iso9660\x00', &(0x7f0000000680)='./file0\x00', 0x1, 0x0, &(0x7f00000006c0), 0x8, &(0x7f0000000700)={[{@unhide='unhide'}, {@overriderock='overriderockperm'}, {@map_normal='map=normal'}, {@sbsector={'sbsector', 0x3d, 0xa2}}, {@mode={'mode', 0x3d, 0x3ff}}, {@check_strict='check=strict'}, {@nocompress='nocompress'}], [{@euid_gt={'euid>', r4}}]}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r8+30000000}, 0x0) r9 = userfaultfd(0x0) ioctl$UFFDIO_API(r9, 0xc018aa3f, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1, 0x80000008031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r9, 0x8010aa01, &(0x7f00000002c0)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000003c0)={0x7a0a1ef, 0x5}) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r10, 0x1, 0x30}, &(0x7f00000001c0)=0xc) [ 1794.862640] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:51 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r0 = socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000080)={@default, @default, 0x2, 0x56}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x05\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @empty}}, 0xe8d, 0x20, 0x6, 0x7268000000000, 0x20}, &(0x7f0000000100)=0x98) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000001c0)={0x1, 0x8, 0x52}) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={r3, 0x6}, 0x8) 03:37:51 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x3a7, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:51 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000100)={0x1f, r2}, 0x959c072d42b796e6) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f00000000c0)={0x101ff, 0x0, &(0x7f0000ff4000/0xb000)=nil}) 03:37:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@deltfilter={0x2c, 0x2d, 0x110, 0x70bd28, 0x25dfdbfb, {0x0, r2, {0x5, 0x4}, {0xe, 0x9}, {0xfff7, 0x5}}, [@TCA_CHAIN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004800}, 0x1) r3 = socket$unix(0x1, 0x1, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40, 0x0) ppoll(&(0x7f00000002c0)=[{r3}], 0xa0, 0x0, 0x0, 0x0) 03:37:52 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_names\x00') ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x4b}) 03:37:52 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x7ffffff9, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1795.213016] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x06\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:52 executing program 2: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f0000000100)="83b70d44cb2ec59166d6336c13ad343eb68ae6"}, 0x10) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2000, 0x0) syz_open_pts(r4, 0x800) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, r3}, 0x58) 03:37:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x1, 0x0) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000080)=0x1) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) [ 1795.563127] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:52 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r4, r3, 0x0, 0x20000000001) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r5}, 0x58) 03:37:52 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:52 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0xffffff1f, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:52 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000080)={{0x2, 0x4e23, @loopback}, {0x307, @local}, 0x18, {0x2, 0x4e22, @remote}, 'teql0\x00'}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000002c0)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000100)={0x1f, r2}, 0xfffffffffffffef7) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) 03:37:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) 03:37:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\b\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:52 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r4, r3, 0x0, 0x20000000001) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r5}, 0x58) 03:37:52 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r4, r3, 0x0, 0x20000000001) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r5}, 0x58) 03:37:52 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40, 0x100) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x4}, 0x68) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001d80)={'gre0\x00', r3}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r4}, 0x58) 03:37:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$void(r0, 0x5451) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) 03:37:53 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) recvmmsg(r0, &(0x7f0000004640)=[{{&(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000240)=""/207, 0xcf}, {&(0x7f0000000340)=""/43, 0x2b}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/36, 0x24}, {&(0x7f0000001dc0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/236, 0xec}, {&(0x7f00000014c0)=""/39, 0x27}, {&(0x7f0000001500)=""/218, 0xda}, {&(0x7f0000001600)=""/151, 0x97}, {&(0x7f00000016c0)=""/224, 0xe0}], 0xa, &(0x7f0000001880)=""/194, 0xc2}, 0xfffffffffffffeff}, {{&(0x7f0000001980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a00)=""/247, 0xf7}], 0x1, &(0x7f0000001b40)=""/18, 0x12}, 0xa677}, {{&(0x7f0000001b80)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001c00)=""/194, 0xc2}, {&(0x7f0000001d00)=""/33, 0x21}], 0x2, &(0x7f0000002dc0)=""/148, 0x94}, 0x3}, {{0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002e80)=""/171, 0xab}], 0x1}, 0xec42}, {{&(0x7f0000002f80)=@tipc=@name, 0x80, &(0x7f0000003040)=[{&(0x7f0000003000)}], 0x1, &(0x7f0000003080)=""/9, 0x9}, 0x41}, {{0x0, 0x0, &(0x7f0000003340)=[{&(0x7f00000030c0)=""/164, 0xa4}, {&(0x7f0000003180)=""/222, 0xde}, {&(0x7f0000003280)=""/142, 0x8e}], 0x3, &(0x7f0000003380)=""/4096, 0x1000}, 0xe35}, {{0x0, 0x0, &(0x7f0000004540)=[{&(0x7f0000004380)=""/34, 0x22}, {&(0x7f00000043c0)=""/176, 0xb0}, {&(0x7f0000004480)=""/132, 0x84}], 0x3, &(0x7f0000004580)=""/157, 0x9d}, 0xffffffff}], 0x7, 0x20, &(0x7f0000004800)={0x77359400}) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) recvfrom$inet(r1, &(0x7f00000000c0)=""/124, 0x7c, 0x10000, &(0x7f0000000140)={0x2, 0x4e20, @remote}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000004840)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000004880)={'ip6_vti0\x00', r3}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r4}, 0x58) 03:37:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql`\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1796.137174] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:53 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001d80)={'tunl0\x00'}) 03:37:53 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) bind$packet(r0, &(0x7f0000000180)={0x11, 0x2, r1, 0x1, 0x6}, 0x14) r2 = socket(0x1e, 0x4, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000480)={0x1, 0x1, 0x4, 0xbe, 0xa, [{0x200, 0x8, 0x7c00000000, 0x0, 0x0, 0x900}, {0x10001, 0x5, 0x9, 0x0, 0x0, 0x10d}, {0x18000000, 0x3, 0x7fffffff, 0x0, 0x0, 0x1008}, {0xffffffffffffffff, 0x800, 0x2, 0x0, 0x0, 0x200}, {0x7fff, 0xf419, 0x100000001, 0x0, 0x0, 0x8}, {0xfff, 0x0, 0x1, 0x0, 0x0, 0x2700}, {0x4, 0x9bba, 0x4, 0x0, 0x0, 0xa}, {0xfffffffffffffffe, 0x40, 0x700000000000, 0x0, 0x0, 0x4}, {0x1000, 0x8, 0x4, 0x0, 0x0, 0x80}, {0x4, 0x4, 0xfffffffffffffffd, 0x0, 0x0, 0x1000}]}) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f00000001c0)={0x2, 0x200, 0x6, 0x3, 0x0, 0xfffffffffffffffe}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:53 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0xffff8880483c0578, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:53 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x301) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) ioctl(r1, 0xbbd2, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$unix(0x1, 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000100)={0x4, 0x1}) ppoll(&(0x7f00000002c0)=[{r2}], 0xa0, 0x0, 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x9, 0x40) ioctl$KVM_SET_TSC_KHZ(r3, 0xaea2, 0x0) 03:37:53 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) 03:37:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00 \x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000480)="f5db1f023c1a3f3188a070a0dfa2298ef11c081f0fd9600ecb7d173ff4c9ce915bac828620903b523f0dcb0abcaad7b8555dfb3b3e14d1cf25ba7f34344e32723ecf59b64eef66972e5ab32ce905f9233c6a99cc27b8848c0dd305dee2985824f4ec6f2faa19df82429bae880207e20851d11701f4a3cedc9b6660ff9346f1cd5ad9d5bf10051f3e3bc1714be54e4f314ace98c261f71448c45cdf233e4eff9bd45a81032333f3ee67faa4117778e66b9e89d1937d10c10804ac08bd25afc974e85aa74d7724da83881e617274b021de91dd84122a558cdc48f80c99ef728ff55166964c4ec89e8b9232522e323661309bc63c66a9f40340672b99c69fb8608bc65f005b8dac0abacfcc77a701fcf4717aa19eebfdea3c1e5aa879605bdac9a0cdefddb4df90f7b98d8746ecc4848f30001ef0fcbdabd7682c0efd52dd2e907755236c036b7f2fc0e28e5423c3ef2e696954cee3321fb3977bab9b915a2f5c73943b3550f6") socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f0000000000), 0xa0, 0x0, 0x0, 0xffffffffffffff2c) 03:37:53 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) exit(0x0) sendfile(r3, r2, 0x0, 0x20000000001) 03:37:53 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x10000, 0x0) write$P9_RWRITE(r2, &(0x7f0000000140)={0xb, 0x77, 0x2, 0x7}, 0xb) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x400000, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f00000000c0)=0x8, 0x4) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r4}, 0x58) [ 1797.116196] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:54 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0xffff8880483c08f8, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:54 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) exit(0x0) sendfile(r3, r2, 0x0, 0x20000000001) 03:37:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x63a73869, 0x400) getsockopt$inet6_buf(r3, 0x29, 0x0, &(0x7f00000000c0)=""/162, &(0x7f00000001c0)=0xa2) 03:37:54 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) exit(0x0) sendfile(r3, r2, 0x0, 0x20000000001) [ 1797.525465] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:54 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f00000001c0)="e5ddfbfecc24818d8ce1af2d4f1612c587fae904830681c9e6dce61ec7900e3fdb77d30f65ad649687d464f6a5581ee4d63bcbc4572a4a8b232773482ca74d3643a149f0f53b015f84d585fac8b7dc685ad3c241caa8a681f7ab4db5e784f4f34d709d7ef15985f9be732eded644f0139239eddfeb0cd5f4b6a7fa0e303d411e05eebff9e2d580915c670a3a7fedeac5e1a965ab28dc8e12d74d23a2b1d9702b43912005d6d02f15704f5911d995130f3532960911cac8d75fc1e780fc8e5bdbd47f85fe9576c5d6ddcbfdd4bf6198d5822d4e7dc4834f8dbc6ecf38f4935744ccc09d80d0c6c04fe0c7eb46f72379", 0xef, 0x3}, {&(0x7f00000002c0)="bf144a2a526665dd66f1cc60bb11fb7d9fe86cdaba6685db378f5e05d5921e5c0cbbbc6df972c31e8ac3f05840dc75da2aa4ec43d2080a617f3577ff524978fc2fed764889cab8d8f49c7b7eb21962bcccf5cfab90cb3f2c9b2e485c7c383b6a23935a080c231130a7c4cfa74984f765c9f1013f3f72b07a2b2d10d2ef4f298a1243e8a5703acbeb59ad", 0x8a, 0x8}, {&(0x7f0000000100)="287e6fb15c285f8567000c37a35376c5f035de69e877607c557068da87de480a3d3a559e346b688a9246c941bfd45a9e8d5d0dc404fd5681f2f702b0f46c83328b719826f03062997623fcc7ad360de949c401191e7ce0f42d18296ea04f532eaa7de90b45058cbe706492664f", 0x6d, 0x41}], 0x10000, &(0x7f00000004c0)={[{@lockproto_nolock='lockproto=lock_nolock'}, {@spectator='spectator'}, {@statfs_quantum={'statfs_quantum', 0x3d, 0x4}}, {@barrier='barrier'}, {@meta='meta'}], [{@smackfshat={'smackfshat', 0x3d, 'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '#${$'}}, {@fowner_gt={'fowner>', r3}}]}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 03:37:54 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:37:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x4) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.impure\x00') ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x5}) 03:37:54 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) 03:37:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00%\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:54 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) 03:37:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0x2d4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000005c0)=@req={0x28, &(0x7f0000000580)={'team_slave_1\x00', @ifru_addrs=@can={0x1d, r1}}}) r2 = socket$unix(0x1, 0x1, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000180)={0x14, 0x11, 0x1, {0x0, 0x4, 0x8}}, 0x14) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x408001, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x80000001}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000000c0)={r4, 0xb4a, 0x30, 0x2, 0x100000000}, &(0x7f0000000100)=0x18) ppoll(&(0x7f00000002c0)=[{r2}], 0xa0, 0x0, 0x0, 0x0) [ 1797.886554] gfs2: not a GFS2 filesystem 03:37:54 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) 03:37:54 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x2801, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f00000000c0)=0x3) socket$pppoe(0x18, 0x1, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 03:37:54 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) [ 1798.096710] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f00000002c0)={0x9, 0x7, 0x1, {0xc, @sdr={0x3631564e, 0x9}}}) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001d80)={'tunl0\x00', r3}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x200800, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r4}, 0x58) 03:37:55 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) flock(r2, 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:55 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r2, 0x0, 0x20000000001) 03:37:55 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x290901, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xd4, "967ddd6506f8a18bbc1f75b8010285973c20ecf03a451d443caf8e78999ba4863859aa7454ba6a067d914c001beb8ec287bd2589eca0bcb19c12b8baa4c5890caca6f448fcb9413a6b1ce6ea5303126c9753eff2dc0ff3007928531324c9a081d468427eb7d6e22d98847ef79ef51cdce88dd1cf68d55488765c0d677a86e1d679a56979b41d6f7df97ac4e7e686009421a7b61e1bf3a0ef676781f43006f72d5a512b7b97e2a11754ee87864bae9ba2ef816230093ce0bdf80a9fa3de248582389702e83053d2dfea634618987e72b7a109f976"}, &(0x7f00000000c0)=0xdc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0xf0, 0x20}, &(0x7f0000000140)=0xc) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f00000003c0)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0xa43411d490053f37) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r4}, 0x58) 03:37:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x13f, 0x3}}, 0x20) 03:37:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00%\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:55 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x280000) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2, 0x14, 0x9, 0x7, 0x11, 0x0, 0x70bd2d, 0x25dfdbfd, [@sadb_ident={0x2, 0x0, 0x0, 0x0, 0x9}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e20, 0x1, @empty, 0x846f}, @in6={0xa, 0x4e22, 0x800, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23, @rand_addr=0x4}}]}, 0x88}}, 0x40000) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000002c0)=0x68) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r3}, 0x58) 03:37:55 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r2, 0x0, 0x20000000001) [ 1799.083636] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:56 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r2, 0x0, 0x20000000001) 03:37:56 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="52000306dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:37:56 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14, 0x80000) connect$packet(r1, &(0x7f0000000240)={0x11, 0x0, r4, 0x1, 0x100, 0x6, @local}, 0x14) connect(r3, &(0x7f0000000180)=@caif=@rfm={0x25, 0xe, "3efc30c66ca5e2208c79648cdc34937d"}, 0x80) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:56 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r2, 0xffffffffffffffff, 0x0, 0x20000000001) [ 1799.377004] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:56 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), &(0x7f0000000100)=0x40) r1 = socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000180)=0xcc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0x6, 0x929}, &(0x7f0000000340)=0x8) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) epoll_create1(0x80000) 03:37:56 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:56 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r2, 0xffffffffffffffff, 0x0, 0x20000000001) 03:37:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl(r0, 0x8, &(0x7f0000000000)="a1c8ebce68e85d596d5ab20c07056609392ef208deb2cc9ee9540dc1e729c3a7ab718e19d88269a8245079a6848fdf57bada5626c5cdd230efbc126a46239a4a0cb271732edc62f7ead57208bb370e0d69ffb0f990a6dd72a4b162817ffa99a44572411ca23e2595d605d3923caae5dd2d892ea618") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) 03:37:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x02\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:56 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000080)={0x245, 0x0, 0x1, 0x3ff}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000100)={r3, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1f) 03:37:56 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r2, 0xffffffffffffffff, 0x0, 0x20000000001) 03:37:56 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000000)=@can, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/254, 0xfe}, {&(0x7f0000000500)=""/193, 0xc1}, {&(0x7f0000000080)=""/8, 0x8}], 0x4, &(0x7f0000000600)=""/70, 0x46}, 0x2000) prctl$PR_SET_THP_DISABLE(0x29, 0x1) prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='\xed\xab\xb7\xe6\x80\x1e\x80\x1f\xd7\xc7d\xc5I/\xf5\xfb\xf0\x830\x04L\x17\x05k`\"{\xd4zc\x0f_\x1c\xc7\xaa:=\x01\xfd\xb0\x19\xb3\x026.\x1d^:\xeb\xdb\xa6\'\xdc\xda=\xb8\x91.\x84\x05\xcc\xf1\xd8O\x1a\xc0\xd2i\xea*\xba\x80\x0f\xeaQ\x92\x8c\xcf\x99v\r\xe9B<\xbb0\xf2\t\x14\xc5\xfc\xd6n\xfb\\hA\xf9\t\xda\xcc\xfe\xbc\x89\xce\xe3I\xd9\x97\xd3\xa7\xdd\x0f_\xedI\xf9\xc3\x7f|\xdc\x97\xcb}\xce\x0f[\xa4\xc3\x14\xdcl\xc7\x9b\x93\x05)E4\xc3}\x04\xfa\xd5-\xaa\xdc\f\xfb\x86L\xd5$\xca\xf6\xe9\xe3b\x91\xd7\xf7\x80\xdco\xd4Yy)\xb4\xac\xd9\x12w\xc95\x97r\xf8\xd4\xb6\\\xbfT\x93l\x06\xeb\xe4\x99\xe7z\xfctS\x00\x94\xdcL\x1b\x93M(\xeea\x7fo\xf8o\xd89\xfb\x85{\xda\xb74m\x06\x13\x00\x8c\xc52\xa8v\xd6\xa5\xc6\\\xe4\x16d\xfb\xd73_\xe9\xb7\x81\xc67\xa0\xb2\xa6&\v\xc38\xcd\xaa\xaf\xc9\xf5\xa9[\x19\xf7k\xd2_\xdf(5\xd6\x18\xda_h\x11\xaa\xf7<\xf1f\x1a\x9c\xab\xfft}\xa0\xe5T<\x0e\xed\xcd\x01\xa5\x1f\xf6\xfd\xf3\xf5\xbd\xfaM\xf80\xe4\xff\x1d\xebtc\x85\xc3\x17|\x81\x05\bA1\xd4\x81\xa3a\xbbg') ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) 03:37:56 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) [ 1800.055903] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:57 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1800.355267] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0xfffffffffffffffd, 0x0) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000000), 0x2) 03:37:57 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1800.606942] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:57 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) bind$isdn_base(r0, &(0x7f0000000080)={0x22, 0x200, 0xa59, 0x4, 0x1}, 0x6) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x03\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:57 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:57 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r0 = socket(0x1e, 0x4, 0x0) socket(0x17, 0x7, 0x6262) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = epoll_create(0x401) r4 = getpgid(0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000080)={0x2, r4}) clock_gettime(0x2, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) bind$netrom(r0, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast]}, 0x48) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1800.942802] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:57 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:57 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) 03:37:58 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1801.272957] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x04\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40002, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000040)) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) 03:37:58 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1801.433134] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:58 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)=0x1, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$unix(0x1, 0x1, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) ppoll(&(0x7f0000000180)=[{r2, 0x2000}, {r1, 0x40}], 0x2, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x180000000000, 0x4, 0xa, 0x19, "87bceacc9def873a5d4bae3f9422db373e7c3bb8d07ba31382212bf59c68a5edfff730e5dcd40f4127d18f691c6affad0c4e30882a6ffe09ca974deaa0aba8aa", "018fcfc12d5e3ba0f90cdc85b505a84e15c27d83cf46fdc991eacc85558bd19d", [0xfa2a]}) 03:37:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r2, r2}, &(0x7f0000000600)=""/243, 0x3e0, &(0x7f0000000080)={&(0x7f0000000180)={'crct10dif-generic\x00\x00\x00\x0f\x00'}}) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) [ 1801.649531] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:58 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x21, 0x807, 0x0) r0 = socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x9, 0x20, 0x6, 0x5}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r3, 0x2}, &(0x7f0000000240)=0x8) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080)={0x8, 0x6, 0x7fff, 0x8}, 0x6) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:58 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:58 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r0 = socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000480)=@v2={0x5, 0x0, 0x10, 0x81, 0x1000, "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"}, 0x100a, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000180)=0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='security\x00'}, 0x10) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000180)=0x5) dup3(r2, r1, 0x80000) ppoll(&(0x7f0000000040)=[{r1}], 0x1, 0x0, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) 03:37:58 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000000)={'raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00k\x9a\x0e\x91\x00'}, &(0x7f0000000180)=0x54) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) 03:37:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x05\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:37:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x62, 0xc4ad, 0x3, 0x100000000}) r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) [ 1802.126361] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:59 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:59 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1802.432767] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x80800) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000040)) ioctl$VIDIOC_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @raw_data=[0x5, 0x2, 0x13d, 0x3d, 0x8, 0xffffffffffffffff, 0x9, 0x4, 0x3, 0x7, 0xd2b1, 0x1, 0x800, 0x9, 0x17, 0x3, 0x944, 0x1, 0x1, 0x7fffffff, 0x7, 0x9, 0xb50, 0xfffffffffffffeff, 0x8, 0x200, 0x9, 0x2, 0x8, 0x6, 0x9, 0x80000001]}) ppoll(&(0x7f00000002c0)=[{r1, 0xfffffffffffffffc}], 0x1, 0x0, 0x0, 0x0) 03:37:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x06\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1802.606604] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:59 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:59 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r0 = socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000100}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x24, r3, 0x800, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x200}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000084}, 0x80) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)=0x8) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$unix(0x1, 0x1, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0xa0200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x117, 0x1000}}, 0x20) getsockname$packet(r1, &(0x7f0000000180), &(0x7f00000001c0)=0x14) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000000c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @rand_addr="81f33c216ecebcce377c3b78955ab352", 0x1000}, r2}}, 0x30) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000200)={@remote}, &(0x7f0000000240)=0x14) ppoll(&(0x7f0000000100)=[{r1, 0x60}], 0x1, 0x0, 0x0, 0x0) [ 1802.886578] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:37:59 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xb4, r1, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffff66}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x8000}, 0x20004000) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:59 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000140)=0xa75b, &(0x7f0000000100)=0x4) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r2, r1, 0x0, 0x20000000001) 03:37:59 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:37:59 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x50480, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:00 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1803.150753] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:00 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:00 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:00 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1803.440268] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\b\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:00 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1803.702970] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:00 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) fstat(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)=0x0) r6 = getuid() r7 = getgid() r8 = gettid() getresuid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)=0x0) r10 = getegid() sendmsg$unix(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000240)="5cc122b9d8409f559edd32d80adc96a2fdd8c8471096e100c526079adb03c23c025d853cd9375dc7c48c4bceb246bac6c59450467c51e9b0aff3792f4d08108afcbc412a138b9a8d4346fb36bd025ee9a7b391b715c152db02cfa04cc6af82aad9e3a67e750de0cbbbef5b20fa4aad0ed6b526000d08d230abcfbea22fdc93c80c7d16b72972431799e960a77b2b19506c8701624e1deb34d4f172865783ddcc921c6e4d0fc8370fd2c9f5adcbad45fea476e4766036e79e5634803581b61b8c86a1fbd3cd6443219069cb0c667ee80a28103643ee6bb5fb0864ae686a74530acfe2809aad8c8ee5428d2d0146ff711c4ef3116921", 0xf5}, {&(0x7f0000000080)="f776dfb4614984f98ff3f8b224462846e3f1a5eead305d73c42c9b0e", 0x1c}, {&(0x7f0000000480)="c98dc1eae1c716b6ec8eb0e85d046fc92973d79178a782a687057db843b72ae298d7b32776f77defa37917724b1876704463705456b166dd9965fbd924f8ba5b0e87b47e4106129707cfe9529506d1bafdcbf5c9e04762707bc2857a53208b405dd5be7f8cabe9707b94e2c000f59862bbd93eb8413b05270b18e864efa2a8760c1b2966a5d71f45b9572df6f21f25c9d85acee8cca66bc2eed7", 0x9a}, {&(0x7f0000000540)="7fe3c2233b21d7fd225a836059724bee96390341beae2f85f55af0f3cdae6aab7d0605e9e362533a0aa7983d3a0b771849a56fb3554dc4dd03f7892b910409e3d66d433ff88b322faac0dd4bcf3091e5e62243e4ea55cc947e7cec57de9e8ae6a2e53b341750809aaed9162a2f754f34704c0de14d56ca47c7f5dac880c1d09e3383e01b3cb889feac8d61f53ec2df863ef024d25267ecfa35f89ff073b45d52d9d0ab10d86e7a35cd8c5c395a88b5b1659710f9ecba8d881e9db494e0973162", 0xc0}, {&(0x7f0000000600)="7f24d290a5e30a9e73d848c2538b7e5305ea218c31d365b0350fe5283c52de4911af536e05494b9023c85a12787b3c35b953176023a73608ec6ce9e50cb47201cba7fa1baf7b29159bd27e9db6cd5fae7d129741d247cf6959167f7259f76969ae107c505f618823fc70e366931dc11e9fd24309cf6623f804c53b6ec53635da43a4c8d41c61e1c41c48005118ac0e7c1509ed39feddefbf82c2b3a6f11bcec09a196b8a4d4a990873f8d971574be606cb9de35de61896e33f3b65b83da025471546fbbe35bb1bffaaab015b7d2ac26922a8", 0xd2}, {&(0x7f0000000700)="fd1eaab0e94f2b014e030c1c48321c4d43b9f22fe36b66829902178e027e5c28652a002166f69621f2ff609dbbd79b549ed5894345c8f535d1f5114556b64b38278991a4f0908b797e6e172ab8129784afc209294d823041b2c223ac8203aa206c27e5f61fa17e0b32d74abd6ed15966353e3ed7d6bf7febde6e6fccc070db6311eca4d8214cd1be420ebc843b9124edbbb74afd3bd68067f1592542edc8bd8b6488943ce5d4d3083c94ce39c838e9e1eeabdd5032bb2e8debff0e34128d947b8723cf9b3b89c0d0fb6e31b736e0ea5b", 0xd0}], 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="180000f5ffffff000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1], 0xd8, 0x4000000}, 0x80) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) chroot(&(0x7f0000000a80)='./file0\x00') write(r12, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r13+30000000}, 0x0) vmsplice(r11, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000000)={0x75, 0xffffffff, "22f001f73f21f2501f01c005188d69b27b6043e23717da380800f6ec6824f71645a75b05dce84ef7946edb7d468e57f884c9cabf25b1a74667f70c0a0e01b5a4b40b2472b91ad33c5df5d9255752de1b3006d4e72bd21b3e99bd0502f47bcabc3cb82ea8b1940a427939b683e8"}, 0x101080) 03:38:00 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xb4, r1, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffff66}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x8000}, 0x20004000) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:00 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:00 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18`\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r2, 0x0, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x10000}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8001) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000280)={0x0, 0x8, 0x0, 0xb762, 0xf5b2}, &(0x7f0000000300)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000340)=@sack_info={r4, 0x7, 0x3f}, 0xc) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000180)="58bb87ef6382ea03e4ac78a53e991c914339552b714dda34c10b92a643d83d2cb9826c89c4a2c113be9d0cd3882550c0c45453b99512664cc0ff84f706acf73f5a54c788521fcb0604f7ddb1746356805a7af11d7b6bdfa899428d02b6a2ba5f6994a7f2fad9186ae9ce7e8535a29dfcc0b7992339176e83db79f8a67fd655b2d132df43582e4d3aaa3d0e6164bb8c98cf7946292e28f0486d86c793ef56b50b9891a45ab59cb3844c32052ef9a765995b60ae4cb624692dfa9805b2fa5cec4c36c32772e641f56e9ffe5e3583e7866b8dff997d7bc18478b38d751f1f78d998fd75e09f8ad5960997cad153de865356b7f121b536511e6335", 0xf9, 0xfffffffffffffffa) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000080)='syz'}, 0x30) r7 = getpgid(0xffffffffffffffff) setpgid(r6, r7) keyctl$revoke(0x3, r5) 03:38:00 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1804.053788] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:01 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1804.273001] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1804.435791] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:01 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000040)={{0xb19, 0x5, 0x3, 0xffffffff, 0x101, 0xb5f}, 0xeac, 0x3, 0x5}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0x1, 0x0, 0x0, 0x0) 03:38:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x02`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1804.613095] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:01 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r3, 0x0, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r5, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f000079a000)="16", 0x1}]) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pselect6(0x40, &(0x7f0000000080)={0xf31d, 0x9, 0x4241fece, 0x7, 0x7, 0xffffffffffffff80, 0x7ff, 0x6}, &(0x7f0000000100)={0x3, 0x6, 0x5, 0x0, 0x5, 0x7, 0x7, 0x27c}, &(0x7f0000000180)={0x3c6, 0x1, 0x8, 0x5, 0x3f, 0x39a, 0x3e55, 0x9}, &(0x7f00000001c0), &(0x7f0000000280)={&(0x7f0000000240)={0x5}, 0x8}) 03:38:01 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d0a0b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:01 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xb4, r1, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffff66}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x8000}, 0x20004000) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:01 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1804.922946] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xc92c, &(0x7f0000000200)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x107000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r2, &(0x7f0000000380)={0x78, 0x0, 0x8, {0x820, 0x7, 0x0, {0x5, 0x5, 0xff, 0x1, 0x4, 0x9, 0x7fffffff, 0x2, 0xddddea4, 0x1, 0x5, r3, r4, 0x100, 0x1}}}, 0x78) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000040)) 03:38:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x03`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:01 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x20080, 0x0) ppoll(&(0x7f0000000200)=[{r2, 0x208}, {r2, 0x8000}, {r1, 0x400}, {r0}], 0x4, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffffffff, 0x48480) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x4e7, @rand_addr="bb61b391dbfc7bfcd39aaafa909e3f68", 0x4}, @in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e24, 0x80000001, @mcast2, 0x3}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x58) [ 1805.207523] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:02 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:02 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000300)="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", 0x1000, 0xfffffffffffffff9) keyctl$assume_authority(0x10, r2) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000100)={0xe000000, 0x101, 0x5, 0x1, 0x0, 0xff, 0x4, 0x4, 0xffff, 0x9, 0x7, 0x4}) ioctl$DRM_IOCTL_AUTH_MAGIC(r3, 0x40046411, &(0x7f0000000040)=0x8001) [ 1805.498671] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x04`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1805.722384] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:02 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000240)="985ab978b438bd537e6537273aa3f1618e9100cc904066840b4ee7d977534f5c2b2c876c50e0e42c0063fc621034d2a30aa93ec69def6ea0d3133c6831a1e5bc90954ef3cb2db51527a9b2bbda7e4923480b609291eb22d5bab8b7b0b1157039691f92d165cd76bf899caef24f876f7e96e8442d6d0c2aedd57977249fa2ace9c73615f645e304e08c0d1350f84c8d2d18e6653cf4a1e4f6454aea893d48fe544f0dab5d1ecb53c0ccb93d4d73b95c953bdc13a6c595", &(0x7f0000000480)=""/238}, 0x18) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000180)}], 0x1, 0x3) 03:38:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20082, 0x0) write$FUSE_BMAP(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffffe, 0xffffffffffffc966, {0x1}}, 0x18) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") tee(r0, r0, 0x1000000, 0x1) socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f0000000000), 0x2141, 0x0, 0x0, 0x0) 03:38:02 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:02 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:02 executing program 2: r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000180)=0x10, 0x0) ioctl$void(r0, 0xc0045c79) clock_adjtime(0x0, &(0x7f0000000080)={0x80000000, 0x5, 0x7fffffff, 0x302, 0x5, 0x64e, 0x0, 0x8000, 0x0, 0xff, 0x7, 0x1c000000000000, 0x2f8683e4, 0x40, 0x4, 0x7ff, 0x8, 0x7, 0x5, 0xe323, 0x9, 0x5, 0x0, 0x7, 0x3, 0x80000001}) memfd_create(&(0x7f0000000040)='b\n\x00', 0x8000004) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x80800, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x69, "f767a74949afdda67fa58114b435d250d3504743d5509318faed3b4d397ed39e4e5e13a7f012f1ac935ddf3b170af8ebcbf5bd430ef02fbe9ed7e795413ad285fccfdda4ed3dbfb19bd43b3174060a521c8f4d17a3c4201ebcc867d74303fc959fb75b91350bed8677"}, &(0x7f0000000340)=0x71) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0x7ff, 0x5, 0xdfd5754199b3808f, 0x101, 0xffffffffffff8000, 0xffffffffffffff80, 0xffffffff, 0x2, r2}, &(0x7f00000003c0)=0x20) syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x2, 0x2000) syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x0, 0x2) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0xa93d55db2d0da7a3, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) 03:38:02 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socketpair(0xd97304107d75e0b4, 0x80802, 0xffffffffffffffe1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x7, {0xf3f, 0x7, 0x101, 0x8, 0x2, 0x3}, 0x7, 0xc278}, 0xe) r3 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000400)=0xe8) getpeername$packet(r2, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002c80)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000002d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000002dc0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002ec0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000043c0)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f00000044c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000004500)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000004600)=0xe8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000004640)={0x0, @empty, @loopback}, &(0x7f0000004680)=0xc) accept$packet(r2, &(0x7f00000046c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004700)=0x14) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000004a40)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000004a00)={&(0x7f0000004740)={0x290, r3, 0x12, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0xbc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xab}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r6}, {0x130, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}]}}, {{0x8, 0x1, r10}, {0x78, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6fee4cc0}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}]}}]}, 0x290}, 0x1, 0x0, 0x0, 0x84}, 0x0) r12 = socket$unix(0x1, 0x1, 0x0) r13 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x200) ioctl$TCSETAW(r13, 0x5407, &(0x7f00000000c0)={0x8, 0x2, 0x1ff, 0x8001, 0x15, 0x4, 0x80000000, 0xffffffff, 0x4, 0x6}) ioctl$TCSETS(r13, 0x5402, &(0x7f0000000100)={0x3, 0xffffffff, 0x2, 0xffffffff80000001, 0x3, 0x7f, 0x5, 0x780e, 0x3f, 0x4, 0x1, 0x4fa}) ppoll(&(0x7f00000002c0)=[{r12}], 0xa0, 0x0, 0x0, 0x0) 03:38:02 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x3, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1806.083075] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x05`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x80000001, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x180, r4, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7ff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x9}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0xc}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x88}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x2}}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x100000001}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffff00000000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xa9cd}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100}]}]}, 0x180}}, 0x801) setfsuid(r3) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_GET_MAP(r5, 0xc0286404, &(0x7f0000000100)={&(0x7f0000ffa000/0x4000)=nil, 0x9, 0x4, 0x11, &(0x7f0000ffa000/0x4000)=nil, 0x4e5b}) [ 1806.242710] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:03 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000180)={0x9, 0x108, 0xfa00, {r3, 0xd6, "954380", "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"}}, 0x110) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) setsockopt$inet_dccp_buf(r2, 0x21, 0xc, &(0x7f0000000300)="982768265d7372afbc0ef686fa0e613922fe1418e1c547bf51a071c026a471991f80f526dafee92c5f2c62c924e88353ecb05c933d61d60c895ab3fbb97d408b26d7d14ddfc456e701ffb01ed84ffb5c31534bc64a6e955cdba7cb461c807dd5945c4aa8d852b2661036a189faeeae26ed1e1eb1ad5cc22680e8ca07767e9acb9703daaf0ad8d0fd8629e66dbd861ea37f3e579fa2d835f36d1a585134ded17855f164d93c9a222492eb34e31d2038b3a439894ad7b4fadc16efc40de954fff8beee1300494add20bb60ddd82a7b7582ad0d3de27a32b98d", 0xd8) [ 1806.563166] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:03 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x06`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:03 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340c0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff9, 0x101000) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f0000000080)=0x14) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f00000000c0)=r3) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) 03:38:03 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:03 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) 03:38:03 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:04 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) 03:38:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x3, {0x7, 0x1c, 0x4, 0x800, 0x3, 0x3, 0x0, 0x45}}, 0x50) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)={0x1, 0x0, [0x0]}) ppoll(&(0x7f00000002c0)=[{r2}], 0xa0, 0x0, 0x0, 0x0) 03:38:04 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1807.223054] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:04 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:04 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1807.502899] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:04 executing program 5: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x4aea, 0x7, 0x54e5}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000001c0)={r2, 0x3ff, 0x5}, 0x8) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) write(r0, &(0x7f00000002c0)="cec431a4f7e2750308431351d7da065379328274e91fc4dad2fdf0927c00ed838395521b418c7ee919e354a4f4f7b56e319e6348bc7f98404b053b4d95424259cc579282261bf7db7f7d611c6545c4b2d4132c769a72ea97", 0x58) socket(0x1e, 0x4, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x41ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f00000000c0)) ptrace(0x10, r5) ptrace$setregset(0x4205, r5, 0x800000000000001, &(0x7f0000000240)={0x0}) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\b`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:04 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) pipe2(&(0x7f0000000000), 0x80000) 03:38:04 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:04 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r3}, 0x14) 03:38:04 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x10) 03:38:04 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x205, 0x0) ppoll(&(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000040)={0x2, 0x1, 0x10, 0x1d, 0xa, 0x2, 0x1, 0x151}) write$binfmt_elf64(r1, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x1c00000000000, 0x0, 0x6, 0x4, 0x1, 0x3, 0x3, 0x2, 0x22c, 0x40, 0x280, 0x1000, 0xffff, 0x38, 0x1, 0x7ff, 0x1, 0x7f}, [{0x0, 0x6, 0x9000000000000, 0x8, 0x0, 0x1f, 0x20, 0x100000000}], "49483508a5b784df78dd335b53f0e00c2e5d02332b67ac4491c37a8864e600eb189556adba1695740ad6ff5ee8", [[], [], [], [], [], [], [], [], [], []]}, 0xaa5) [ 1807.825315] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:04 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x40000) epoll_pwait(r0, &(0x7f0000000040)=[{}, {}], 0x2, 0x1000, &(0x7f0000000080)={0x100000000}, 0x8) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f00000000c0)) 03:38:04 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b4674a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:04 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000000001) [ 1808.117592] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:05 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000000001) 03:38:05 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0x101) close(r0) 03:38:05 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:05 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socketpair(0x9, 0x5, 0x100, &(0x7f0000000100)) socket(0x1e, 0x4, 0x0) setsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f0000000240)="cdbb1f2375c7c10bbd5270c50acac26dd972e5b11db924686503eb12b729038ffc6aa04ff8a6c2f7c6a7b84c21937ba3743f752b64d7573f0458dc3cc9fffe5cc695c38e48d419b093d3f0996ab8dbd8d0a25a50ea15945ea06d17b7c0fc0186f89e151fdcd5a5849f07e137a831a5c8b311011c6b47517efc2294480a574c1c15a77658e00072eab66d339f6c6df4920affb8a1676c2a3c105d0df0a685d783be604d65d1dda1de61860683b5307e980e5dc1bbc889952d85b9b059bd18db80526cd2c981d2e384", 0xc8) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000080)=0x1) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000180)={[0x0, 0x1, 0xd000, 0x7000], 0x9, 0x2, 0xf282}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[``\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:05 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000000001) 03:38:05 executing program 2: close(0xffffffffffffffff) 03:38:05 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1808.663404] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1808.873368] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r1, &(0x7f0000000040), 0x3ff) r3 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r3}], 0xa0, 0x0, 0x0, 0x0) 03:38:05 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(0x0, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:05 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)=0x1) userfaultfd(0x800) close(r0) memfd_create(&(0x7f0000000000)='vmnet0\x00', 0x7) 03:38:05 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a0ab656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:05 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(0x0, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x0e\xc0\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:05 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='procposix_acl_access^[/\x00') close(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x20080) [ 1809.172978] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:06 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) prctl$PR_GET_SECUREBITS(0x1b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000080)=0x1) 03:38:06 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a25b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:06 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(0x0, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:06 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20900, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r1, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=""/57, 0x39, 0xffffffffffffffff}}, 0x10) close(r0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000140)={0xbd, 0x3}) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000100)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) getresuid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000580)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)=0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010001000000000002000600", @ANYRES32=r2, @ANYBLOB="02000200", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000700", @ANYRES32=r5, @ANYBLOB="02000400", @ANYRES32=r6, @ANYBLOB="04000100000000000800037f", @ANYRES32=r7, @ANYBLOB="10000500000000002000070000000000"], 0x54, 0x0) 03:38:06 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040), &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1809.454407] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80081, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000040)={0x7, 0x33, 0x2}, 0x7) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) 03:38:06 executing program 2: socketpair(0x7, 0x80004, 0x7fff, &(0x7f0000000000)={0xffffffffffffffff}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) 03:38:06 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:06 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040), &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:06 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040), &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x03\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:06 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) [ 1809.873224] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:06 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) write$tun(r0, &(0x7f0000000180)={@val={0x0, 0x9300}, @val={0x1, 0x3, 0x0, 0x7, 0x2f, 0x1}, @ipv4={{0x8, 0x4, 0x8, 0xe5b, 0x64, 0x64, 0x10001, 0x3, 0x7f, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x16}, {[@rr={0x7, 0xb, 0x74e837d2, [@remote, @rand_addr=0x81]}]}}, @icmp=@echo_reply={0x0, 0x0, 0x0, 0x64, 0x962c, "9d1f32e599568262e509207dd0879391b363081a8b681d6abea3918044013fe50cada2a213f83ae4e466e613753b98ff25aa0cbf3d36e81019b7f0c8"}}}, 0x72) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000240)={0x8, @vbi={0x101, 0x8, 0x7, 0x0, [0xfff, 0x6], [0x200, 0xaf1a]}}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:06 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:06 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, 0x0) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4000, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000080)={0xfb80000, 0x8, 0x2, [], &(0x7f0000000040)={0x9b0907, 0xffffffff, [], @ptr=0x5}}) r2 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r2}], 0xa0, 0x0, 0x0, 0x0) 03:38:06 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@md5={0x1, "fc38daf38d984c20362cd7ef1be3626f"}, 0x11, 0x1) 03:38:06 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x4000) sendmsg$tipc(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)="1c8df0f77498c5970d892ce112ce368505c48d8b55bb592d9e4dcdc126d2ca92bd1777b0285c0a8bd3d960c53f32391f3d8df74f1a8bad1c330c5124166d56e90ee686cc35b6f1909e540bb9f0fc053b926bfeaa7e5ca8ab38b25ae6a9cda2adb71b5381b955c241e32ee35c2c7d30876a0dd0602c4e21b1f9d94c142c806de0e4678a90455d927e21363bbe1460b007c02e42e3a93a6987e967d9b5adfdf0c1532c455cc60704790002578835b6", 0xae, 0x4000000}, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) socketpair(0x9, 0x8000a, 0x55, &(0x7f0000000000)) 03:38:07 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, 0x0) sendfile(r1, r0, 0x0, 0x20000000001) [ 1810.193123] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:07 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:07 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) 03:38:07 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, 0x0) sendfile(r1, r0, 0x0, 0x20000000001) [ 1810.537279] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:07 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) read(r0, &(0x7f0000000000)=""/114, 0x72) 03:38:07 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000000001) 03:38:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x04\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:07 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) 03:38:07 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000000001) 03:38:07 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1d, 0x4, 0x0) socket(0x1e, 0x4, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ffd000/0x1000)=nil, 0x3ff, 0x4, 0xfa, &(0x7f0000ffb000/0x4000)=nil, 0x9}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:07 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x90000, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000080)={0xfffffffffffffff8, 0x1}) close(r0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) 03:38:07 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000000001) 03:38:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000040)) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r2}], 0xa0, 0x0, 0x0, 0x0) 03:38:07 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) [ 1811.031720] can: request_module (can-proto-0) failed. 03:38:07 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000001) [ 1811.097756] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:08 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:08 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pread64(r0, &(0x7f0000000000)=""/163, 0xa3, 0x0) close(r0) [ 1811.468588] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x05\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:08 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000001) 03:38:08 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x103000, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) 03:38:08 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1811.762632] can: request_module (can-proto-0) failed. 03:38:08 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r1 = socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) ppoll(&(0x7f0000000080)=[{r0, 0x420}, {r1, 0x1000}, {r0}], 0x3, &(0x7f0000000100), &(0x7f0000000180)={0x1000}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @raw_data=[0x101, 0x7ff, 0x8, 0x1b, 0x7f, 0x8000, 0xa33a, 0x3ff, 0x9, 0x401, 0x3, 0x4, 0x10001, 0x2, 0x2, 0x4, 0x40, 0x3748, 0x6, 0x3, 0x7f, 0x8, 0x7f, 0x2241, 0x6, 0x2b, 0x200, 0x0, 0x1, 0x199, 0x7fff, 0x100000000]}) r2 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r2}], 0xa0, 0x0, 0x0, 0x0) 03:38:08 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x20000000001) 03:38:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x20100) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f00000000c0)={0x3}) r2 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x406, r2) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000200)={0x400, 0x72b9}, 0x2) ioctl$int_out(r0, 0x5462, &(0x7f0000000040)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0x0) close(r3) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x7fffffff, 0x30}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000180)={r4, 0x1}, &(0x7f00000001c0)=0x8) 03:38:08 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1811.812939] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:08 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x0) 03:38:08 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) [ 1812.035554] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:08 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x06\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:09 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x0) 03:38:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x4000) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = fcntl$getown(r0, 0x9) getpriority(0x1, r2) r3 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r3}], 0xa0, 0x0, 0x0, 0x0) r4 = gettid() ptrace$pokeuser(0x6, r4, 0x8, 0x4) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0x16e, {{0xa, 0x4e21, 0xfff, @loopback, 0x4}}}, 0x88) syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000000)=0x10000, &(0x7f0000000040)=0x2) 03:38:09 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/65, 0x41}, {&(0x7f00000000c0)=""/56, 0x38}, {&(0x7f0000000100)=""/108, 0x6c}, {&(0x7f0000000180)=""/177, 0xb1}, {&(0x7f0000000240)=""/183, 0xb7}], 0x5) close(r0) fchmod(r1, 0x1) [ 1812.332901] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:09 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) fadvise64(r1, 0x0, 0x7, 0x2) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1, 0x0) 03:38:09 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x0) 03:38:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x1f}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={r2, 0xc0, &(0x7f0000000180)=[@in6={0xa, 0x4e24, 0x8, @local, 0x2}, @in6={0xa, 0x4e23, 0x8, @empty}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e20, 0xaf29, @empty, 0x8000000000000000}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e22, @rand_addr=0x20}, @in6={0xa, 0x4e23, 0x3, @remote, 0x7}]}, &(0x7f0000000100)=0x10) socket$unix(0x1, 0x8000400001, 0x0) ppoll(&(0x7f00000002c0), 0x168, 0x0, 0x0, 0x0) 03:38:09 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8910a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:09 executing program 2: close(0xffffffffffffffff) 03:38:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\f\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:09 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x8, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'tunl0\x00'}}, 0x1e) 03:38:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) close(r1) socket(0x40000000015, 0x805, 0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r3}], 0xa0, 0x0, 0x0, 0x0) 03:38:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r1, &(0x7f0000000040), 0x3ff) r3 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r3}], 0xa0, 0x0, 0x0, 0x0) 03:38:10 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8912526cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) [ 1813.167088] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:10 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) [ 1813.372428] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:10 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:10 executing program 5: r0 = accept4$netrom(0xffffffffffffff9c, &(0x7f00000002c0)={{0x3, @netrom}, [@bcast, @rose, @remote, @default, @default, @netrom, @remote, @bcast]}, &(0x7f0000000340)=0x48, 0x80800) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000003c0)={'teql0\x00'}) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x20000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000c00}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r2, 0x10, 0x70bd2a, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8055}, 0x4080) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:10 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xfffffffffffffff8, 0x80000) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000040)={0x18, 0x1, 0x0, {0xffffffffffff68ae}}, 0x18) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000080)={0x0}) r3 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x200000c, 0x40050, r1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000004c0)={0x94, 0x0, &(0x7f0000000300)=[@exit_looper, @transaction={0x40406300, {0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x40, 0x48, &(0x7f0000000100)=[@flat={0x77682a85, 0xb, r2}, @ptr={0x70742a85, 0x0, &(0x7f00000000c0), 0x1, 0x3, 0x8}], &(0x7f0000000140)=[0x38, 0x20, 0x30, 0x78, 0x0, 0x38, 0x58, 0x28, 0x0]}}, @decrefs={0x40046307, 0x2}, @transaction={0x40406300, {0x1, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x68, 0x10, &(0x7f0000000240)=[@flat={0x73622a85, 0xb, r3}, @ptr={0x70742a85, 0x0, &(0x7f00000001c0), 0x1, 0x2, 0x9}, @ptr={0x70742a85, 0x1, &(0x7f0000000200), 0x1, 0x2, 0x3}], &(0x7f00000002c0)=[0x28, 0x18]}}], 0xda, 0x0, &(0x7f00000003c0)="5ac8c10c3f2ed9fbdf911ca91f5230bfc78fda3f76652e1c199048f6a2926d05bd8f5fa1c0596b60692333b35c2b08196153738b9b3ec80887bd8a04ed5259e72038f9a61b0e40c0a4e7c5a35c16aed6b10fbe3ab387f5f64b4115eb3efcf16ca24355bf9967ff6cd4524d2f314ff3aa296d464e0baf80da6ad8c17d3091b3daa5a51fc9f03101e9b74ff84a19dbcdd173313e7093636bb337365344a9f205e51875d93063be704bda96cde3354a883c099396d7a07947d05853b24e35d12eed9fdf0eab065768f7319f4a463c5bd65318e2dcb1a73840464272"}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000580)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000680)=0xe8) fstat(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000940)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000740)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000840)=0xe8) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='fuse\x00', 0x400, &(0x7f0000000880)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@uid_lt={'uid<', r6}}]}}) close(r0) 03:38:10 executing program 3 (fault-call:5 fault-nth:0): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:10 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a46cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x11\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1813.604407] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1813.652010] FAULT_INJECTION: forcing a failure. [ 1813.652010] name failslab, interval 1, probability 0, space 0, times 0 [ 1813.689713] CPU: 1 PID: 11275 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 03:38:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xffffffffffff2dee, 0x20040) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000080)=""/83) socketpair(0xb, 0x3, 0xdad5, &(0x7f0000000000)) [ 1813.696928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1813.706280] Call Trace: [ 1813.708872] dump_stack+0x1db/0x2d0 [ 1813.712505] ? dump_stack_print_info.cold+0x20/0x20 [ 1813.717531] ? mark_held_locks+0x100/0x100 [ 1813.721771] should_fail.cold+0xa/0x15 [ 1813.725676] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1813.730860] ? ___might_sleep+0x1e7/0x310 [ 1813.735026] ? arch_local_save_flags+0x50/0x50 [ 1813.739711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1813.745248] __should_failslab+0x121/0x190 [ 1813.749481] should_failslab+0x9/0x14 [ 1813.753280] kmem_cache_alloc_trace+0x2d1/0x760 [ 1813.757953] ? __fget+0x472/0x710 [ 1813.761416] alloc_pipe_info+0x152/0x580 [ 1813.765480] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1813.770770] ? pipe_read+0x940/0x940 [ 1813.774515] ? __fget+0x499/0x710 [ 1813.777975] splice_direct_to_actor+0x795/0x9d0 [ 1813.782646] ? iterate_fd+0x4b0/0x4b0 [ 1813.786530] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1813.791372] ? __f_unlock_pos+0x19/0x20 [ 1813.795436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:38:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000340)="0010b602b33188a070000000000000000000000000a0391bef8c63a1ae0cd5197d9ab2d59c91d510a67205e558a1508235c18003b589757f52bc69591ed88d75fa8b21b5275133deb8") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x52a5edd9eb59a651, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r2, 0x15ca}], 0x20000086, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000040)=""/195, 0xc3) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x3, 0x1, 0x60, 0x7f, 0xffff}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000280)={r3, 0x4}, &(0x7f0000000300)=0x8) [ 1813.800981] ? do_splice_to+0x190/0x190 [ 1813.804962] ? rw_verify_area+0x118/0x360 [ 1813.809111] do_splice_direct+0x2c7/0x420 [ 1813.813266] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1813.818220] ? rw_verify_area+0x118/0x360 [ 1813.822373] do_sendfile+0x61a/0xe60 [ 1813.826092] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1813.830762] ? fput+0x128/0x1a0 [ 1813.834046] ? do_syscall_64+0x8c/0x800 [ 1813.838036] ? do_syscall_64+0x8c/0x800 [ 1813.838056] __x64_sys_sendfile64+0x1f8/0x240 [ 1813.838071] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1813.838085] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1813.855851] do_syscall_64+0x1a3/0x800 [ 1813.855869] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1813.855882] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1813.855898] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1813.869765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1813.869776] RIP: 0033:0x458099 [ 1813.869788] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:38:10 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000280)={r2, 0x1a}) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x6) close(r0) 03:38:10 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='dummy0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r2}], 0xa0, 0x0, 0x0, 0x0) [ 1813.869797] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1813.901960] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1813.901968] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1813.901976] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1813.901984] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1813.901992] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:10 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x200000) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) [ 1814.047319] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:10 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:11 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0xc0100, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000180)={{0x800, 0x22, 0x45, 0x8, 0x28, 0x9}, 0xfa, 0x9, 0x8, 0x5, 0x3, "2819bcd87738b38ab26624b3130f725cfca6d40dd292e1d99f2e624d7d8bef19010120a909c5351cf64e3f6743868ae6dc428d60a355384f5cbcc07ad63fb5e3fc1eacea583bf60bc08019f37d6883b286bec062ef823a7babbc45d77e6c3aa29fb15d17e81e335550811c47f53563cffa18b526e23c658c4647eee4b05c3021"}) close(r0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4d, 0x0) lgetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@known='trusted.overlay.nlink\x00', &(0x7f00000002c0)=""/39, 0x27) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x8001, @null, @rose={'rose', 0x0}, 0x5, [@null, @default, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) [ 1814.349465] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:11 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x3, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:11 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) lookup_dcookie(0x8, &(0x7f0000000000), 0x0) r1 = dup2(r0, r0) r2 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) write$P9_RGETATTR(r1, &(0x7f0000000080)={0xa0, 0x19, 0x2, {0x104, {0x88, 0x4}, 0x80, r2, r3, 0x100, 0x100, 0x1, 0xd27, 0x0, 0x55, 0x2ff, 0x800, 0x5, 0x1, 0x100000000, 0xc3f, 0x96, 0x8, 0x8001}}, 0xa0) close(r0) 03:38:11 executing program 3 (fault-call:5 fault-nth:1): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:11 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) bind$unix(r1, &(0x7f0000000000)=@abs={0xb3d30ea677211536, 0x0, 0x4e22}, 0x6e) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/26, 0x1a}], 0x1) 03:38:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x14\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1815.040202] FAULT_INJECTION: forcing a failure. [ 1815.040202] name failslab, interval 1, probability 0, space 0, times 0 [ 1815.078447] CPU: 0 PID: 11337 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1815.085685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1815.095295] Call Trace: [ 1815.097885] dump_stack+0x1db/0x2d0 [ 1815.101512] ? dump_stack_print_info.cold+0x20/0x20 [ 1815.106535] ? percpu_ref_put_many+0x129/0x270 [ 1815.111118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1815.116945] should_fail.cold+0xa/0x15 [ 1815.120831] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1815.125936] ? ___might_sleep+0x1e7/0x310 [ 1815.130086] ? arch_local_save_flags+0x50/0x50 [ 1815.134671] __should_failslab+0x121/0x190 [ 1815.138905] should_failslab+0x9/0x14 [ 1815.142700] __kmalloc+0x2dc/0x740 [ 1815.146233] ? kmem_cache_alloc_trace+0x354/0x760 [ 1815.151084] ? __fget+0x472/0x710 [ 1815.154539] ? alloc_pipe_info+0x286/0x580 [ 1815.158778] alloc_pipe_info+0x286/0x580 [ 1815.162838] ? pipe_read+0x940/0x940 [ 1815.166556] ? __fget+0x499/0x710 [ 1815.170006] splice_direct_to_actor+0x795/0x9d0 [ 1815.174671] ? iterate_fd+0x4b0/0x4b0 [ 1815.178474] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1815.183314] ? __f_unlock_pos+0x19/0x20 [ 1815.187291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1815.192827] ? do_splice_to+0x190/0x190 [ 1815.196800] ? rw_verify_area+0x118/0x360 [ 1815.201042] do_splice_direct+0x2c7/0x420 [ 1815.205196] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1815.210067] ? rw_verify_area+0x118/0x360 [ 1815.214445] do_sendfile+0x61a/0xe60 [ 1815.218167] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1815.222748] ? fput+0x128/0x1a0 [ 1815.226115] ? do_syscall_64+0x8c/0x800 [ 1815.230084] ? do_syscall_64+0x8c/0x800 [ 1815.234067] __x64_sys_sendfile64+0x1f8/0x240 [ 1815.238561] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1815.243137] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1815.247887] do_syscall_64+0x1a3/0x800 [ 1815.251997] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1815.256908] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1815.261912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1815.266870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1815.272061] RIP: 0033:0x458099 03:38:12 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10880, 0x51) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xf1, "002fb4f1fcde2597b082552512d6cf4be0297b876d389b09fa706abe5f88d6118b0b56058723f8e758bd84901e58ae27f110a4c49d201cf1c5a29e125eecd0f04bf08902d38af7e0f01837f9c24f7ba89fbaeadcbc6e47f021e0456bd5d5b15d6439c194f9eb0f3cd3a5944fff95545fe245e570efdf7d63942dcd5b6661e5463733b8bf272bab8c35ef4313c50e435734d04dd5d16f40d1e1d969d0eb69532854ecb93cabef7d094f4277500198cd0c4e1a778c5df6c5ea64a6090091867f3b615af7614414b4f06e584e774a74123e23b7a259dbdb513567336fc1c1a30478e0e231d442f6a3deb614f8ce3df9a54426"}, &(0x7f0000000140)=0xf9) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0xda, 0x3}, 0x8) [ 1815.275344] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1815.295130] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1815.302817] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1815.310072] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1815.317426] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1815.324880] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1815.332134] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:12 executing program 3 (fault-call:5 fault-nth:2): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1815.362933] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`%\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:12 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:12 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) [ 1815.498489] FAULT_INJECTION: forcing a failure. [ 1815.498489] name failslab, interval 1, probability 0, space 0, times 0 [ 1815.576038] CPU: 0 PID: 11355 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1815.583287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1815.592746] Call Trace: [ 1815.595426] dump_stack+0x1db/0x2d0 [ 1815.599065] ? dump_stack_print_info.cold+0x20/0x20 [ 1815.604084] ? percpu_ref_put_many+0x129/0x270 [ 1815.608673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1815.614348] should_fail.cold+0xa/0x15 [ 1815.618254] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1815.623368] ? ___might_sleep+0x1e7/0x310 [ 1815.627521] ? arch_local_save_flags+0x50/0x50 [ 1815.632130] __should_failslab+0x121/0x190 [ 1815.636368] should_failslab+0x9/0x14 [ 1815.640297] __kmalloc+0x2dc/0x740 [ 1815.643849] ? kmem_cache_alloc_trace+0x354/0x760 [ 1815.648710] ? __fget+0x472/0x710 [ 1815.652164] ? alloc_pipe_info+0x286/0x580 [ 1815.656399] alloc_pipe_info+0x286/0x580 [ 1815.660552] ? pipe_read+0x940/0x940 [ 1815.664282] ? __fget+0x499/0x710 [ 1815.667738] splice_direct_to_actor+0x795/0x9d0 [ 1815.672406] ? iterate_fd+0x4b0/0x4b0 [ 1815.676205] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1815.681048] ? __f_unlock_pos+0x19/0x20 [ 1815.685032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1815.690572] ? do_splice_to+0x190/0x190 [ 1815.694665] ? rw_verify_area+0x118/0x360 [ 1815.698816] do_splice_direct+0x2c7/0x420 [ 1815.702971] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1815.707825] ? rw_verify_area+0x118/0x360 [ 1815.711982] do_sendfile+0x61a/0xe60 [ 1815.715714] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1815.720301] ? fput+0x128/0x1a0 [ 1815.723582] ? do_syscall_64+0x8c/0x800 [ 1815.727558] ? do_syscall_64+0x8c/0x800 [ 1815.731536] __x64_sys_sendfile64+0x1f8/0x240 [ 1815.736046] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1815.740630] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1815.745393] do_syscall_64+0x1a3/0x800 [ 1815.749373] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1815.754302] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1815.759323] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1815.764179] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1815.769366] RIP: 0033:0x458099 03:38:12 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x181000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)={0x15e8541a, 0x723, 0x6, 0x0, 0x0, [], [], [], 0x4, 0x401}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) close(r1) [ 1815.772558] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1815.791454] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1815.799158] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1815.806416] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1815.813667] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1815.820926] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1815.820936] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1815.936291] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:12 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000240)=""/238) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000180)={0xaae4, 0x1f2, 0x9, {0x0, 0x989680}, 0x5, 0x5}) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x2000)=nil, 0x2000) shmdt(r4) 03:38:12 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r0}], 0xa0, 0x0, 0x0, 0x0) 03:38:12 executing program 3 (fault-call:5 fault-nth:3): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:12 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:12 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) [ 1816.121760] FAULT_INJECTION: forcing a failure. [ 1816.121760] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1816.168560] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1816.197601] CPU: 0 PID: 11389 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1816.204949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1816.214305] Call Trace: 03:38:13 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1816.216900] dump_stack+0x1db/0x2d0 [ 1816.220531] ? dump_stack_print_info.cold+0x20/0x20 [ 1816.225547] ? kernel_text_address+0x73/0xf0 [ 1816.229958] should_fail.cold+0xa/0x15 [ 1816.233857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1816.238960] ? arch_local_save_flags+0x50/0x50 [ 1816.243649] ? lock_release+0xc40/0xc40 [ 1816.247631] should_fail_alloc_page+0x50/0x60 [ 1816.252117] __alloc_pages_nodemask+0x323/0xdc0 [ 1816.256791] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1816.261818] ? __kmalloc_node+0x3d/0x70 [ 1816.265795] ? rcu_read_lock_sched_held+0x110/0x130 [ 1816.270809] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1816.276358] alloc_pages_current+0x107/0x210 [ 1816.280771] push_pipe+0x3fc/0x7a0 [ 1816.284327] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1816.289252] ? __kernel_text_address+0xd/0x40 [ 1816.293752] ? iov_iter_revert+0xaa0/0xaa0 [ 1816.293779] ? save_stack+0xa9/0xd0 [ 1816.293792] ? save_stack+0x45/0xd0 [ 1816.293804] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1816.293815] ? kasan_kmalloc+0x9/0x10 [ 1816.293828] ? __kmalloc+0x15c/0x740 [ 1816.317954] ? alloc_pipe_info+0x286/0x580 [ 1816.322198] ? splice_direct_to_actor+0x795/0x9d0 [ 1816.327046] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1816.332146] ? iov_iter_pipe+0xba/0x2f0 [ 1816.336124] default_file_splice_read+0x1b1/0xac0 [ 1816.341090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1816.346722] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1816.352002] ? iter_file_splice_write+0xfc0/0xfc0 [ 1816.356847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1816.362385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1816.367943] ? check_preemption_disabled+0x48/0x290 [ 1816.372980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1816.378522] ? fsnotify+0x4f5/0xed0 [ 1816.382150] ? debug_mutex_init+0x2d/0x60 [ 1816.386300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1816.391836] ? __fsnotify_parent+0xe2/0x450 [ 1816.396160] ? fsnotify_first_mark+0x350/0x350 [ 1816.400739] ? init_wait_entry+0x1c0/0x1c0 [ 1816.404983] ? __fget+0x472/0x710 [ 1816.408442] ? alloc_pipe_info+0x286/0x580 [ 1816.412688] ? security_file_permission+0x94/0x320 03:38:13 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x1, 0x7) prctl$PR_SET_PDEATHSIG(0x1, 0x20) close(r0) 03:38:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r2 = add_key(&(0x7f0000000080)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)="17c285b24949b3449da65ca8227a7a4415bd74ae72f41d7d256d6d61244eac6478e86000896f8d17b5e06b30e644fef9bea89c10bd1569291306c2265a5bc902cccf19a03930eab49265d986cb13f94a3c3e63f7b557e8017e2bd0b2f4d49d02988f08a4e9366266c7dac72fd18d46", 0x6f, 0xfffffffffffffffd) keyctl$negate(0xd, r1, 0xb5, r2) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = socket$unix(0x1, 0x1, 0x0) r4 = semget$private(0x0, 0x7, 0x2) semctl$GETALL(r4, 0x0, 0xd, &(0x7f0000000100)=""/55) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x6) ppoll(&(0x7f00000002c0)=[{r3}], 0xa0, 0x0, 0x0, 0x0) [ 1816.417629] ? rw_verify_area+0x118/0x360 [ 1816.421785] ? iter_file_splice_write+0xfc0/0xfc0 [ 1816.426627] do_splice_to+0x12a/0x190 [ 1816.430535] splice_direct_to_actor+0x31b/0x9d0 [ 1816.435204] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1816.440092] ? do_splice_to+0x190/0x190 [ 1816.444070] ? rw_verify_area+0x118/0x360 [ 1816.448315] do_splice_direct+0x2c7/0x420 [ 1816.452569] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1816.457507] ? rw_verify_area+0x118/0x360 [ 1816.461737] do_sendfile+0x61a/0xe60 [ 1816.465440] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1816.470014] ? fput+0x128/0x1a0 [ 1816.473288] ? do_syscall_64+0x8c/0x800 [ 1816.477259] ? do_syscall_64+0x8c/0x800 [ 1816.481244] __x64_sys_sendfile64+0x1f8/0x240 [ 1816.485920] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1816.490492] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1816.495239] do_syscall_64+0x1a3/0x800 [ 1816.499113] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1816.504022] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1816.509033] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1816.513870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1816.519044] RIP: 0033:0x458099 [ 1816.522232] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1816.541138] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1816.548840] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1816.556108] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1816.563377] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1816.570665] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1816.577924] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`Z\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:13 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), 0x4) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000100)=""/49) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:13 executing program 3 (fault-call:5 fault-nth:4): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1816.697828] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x40) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040), 0x4) ioctl(r0, 0x7, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r2}], 0xa0, 0x0, 0x0, 0x0) 03:38:13 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000044}, 0xc, &(0x7f00000003c0)={&(0x7f00000000c0)={0x2f8, r2, 0x301, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}]}]}, @TIPC_NLA_LINK={0xd0, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x89}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd93}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5998000}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xfc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3ff}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'syzkaller1\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1000, @mcast1, 0x9}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x1, @mcast2, 0xf39}}}}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x15170ecb}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x2f8}, 0x1, 0x0, 0x0, 0x8000}, 0x48000) [ 1816.783603] FAULT_INJECTION: forcing a failure. [ 1816.783603] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1816.845080] CPU: 1 PID: 11419 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1816.852316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1816.861668] Call Trace: [ 1816.864266] dump_stack+0x1db/0x2d0 [ 1816.867901] ? dump_stack_print_info.cold+0x20/0x20 [ 1816.872943] ? kernel_text_address+0x73/0xf0 [ 1816.877381] should_fail.cold+0xa/0x15 [ 1816.881272] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1816.886383] ? arch_local_save_flags+0x50/0x50 [ 1816.890979] ? lock_release+0xc40/0xc40 [ 1816.894953] ? rcu_pm_notify+0xd0/0xd0 [ 1816.894980] should_fail_alloc_page+0x50/0x60 [ 1816.894992] __alloc_pages_nodemask+0x323/0xdc0 [ 1816.895010] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1816.903368] ? __kmalloc_node+0x3d/0x70 [ 1816.903386] ? rcu_read_lock_sched_held+0x110/0x130 [ 1816.903412] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1816.903432] alloc_pages_current+0x107/0x210 [ 1816.903451] push_pipe+0x3fc/0x7a0 [ 1816.903473] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1816.903489] ? __kernel_text_address+0xd/0x40 03:38:13 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db32a95d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) [ 1816.944924] ? iov_iter_revert+0xaa0/0xaa0 [ 1816.949171] ? save_stack+0xa9/0xd0 [ 1816.952803] ? save_stack+0x45/0xd0 [ 1816.956439] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1816.961545] ? kasan_kmalloc+0x9/0x10 [ 1816.965336] ? __kmalloc+0x15c/0x740 [ 1816.965350] ? alloc_pipe_info+0x286/0x580 [ 1816.965362] ? splice_direct_to_actor+0x795/0x9d0 [ 1816.965375] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1816.965390] ? iov_iter_pipe+0xba/0x2f0 [ 1816.965408] default_file_splice_read+0x1b1/0xac0 03:38:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x1000}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)={0x5}, 0x8) [ 1816.965423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1816.965445] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1816.965457] ? iter_file_splice_write+0xfc0/0xfc0 [ 1816.965473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1816.973494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1817.018757] ? check_preemption_disabled+0x48/0x290 [ 1817.023783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1817.029321] ? fsnotify+0x4f5/0xed0 [ 1817.032954] ? debug_mutex_init+0x2d/0x60 [ 1817.037107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1817.042642] ? __fsnotify_parent+0xe2/0x450 [ 1817.046985] ? fsnotify_first_mark+0x350/0x350 [ 1817.051557] ? init_wait_entry+0x1c0/0x1c0 [ 1817.055788] ? alloc_pipe_info+0x286/0x580 [ 1817.060036] ? security_file_permission+0x94/0x320 [ 1817.064957] ? rw_verify_area+0x118/0x360 [ 1817.069094] ? iter_file_splice_write+0xfc0/0xfc0 [ 1817.073958] do_splice_to+0x12a/0x190 [ 1817.077760] splice_direct_to_actor+0x31b/0x9d0 [ 1817.082432] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1817.087261] ? do_splice_to+0x190/0x190 [ 1817.091241] ? rw_verify_area+0x118/0x360 [ 1817.095390] do_splice_direct+0x2c7/0x420 [ 1817.099527] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1817.104363] ? rw_verify_area+0x118/0x360 [ 1817.108492] do_sendfile+0x61a/0xe60 [ 1817.112207] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1817.116816] ? fput+0x128/0x1a0 [ 1817.120103] ? do_syscall_64+0x8c/0x800 [ 1817.124065] ? do_syscall_64+0x8c/0x800 [ 1817.128037] __x64_sys_sendfile64+0x1f8/0x240 [ 1817.132523] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1817.137103] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1817.141865] do_syscall_64+0x1a3/0x800 [ 1817.145741] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1817.150670] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1817.155690] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1817.160535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1817.165728] RIP: 0033:0x458099 [ 1817.168912] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1817.187986] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 03:38:14 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffd, 0x2800) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x5, 0x30}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000001c0)={r1, 0x2c, &(0x7f0000000180)=[@in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e22, 0x5, @remote, 0x10001}]}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}}}, 0xffffffffffffff29) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r2) [ 1817.195687] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1817.202961] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1817.210212] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1817.217751] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1817.225008] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:14 executing program 3 (fault-call:5 fault-nth:5): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1817.293369] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:14 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:14 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5326, 0x100) close(r0) [ 1817.418401] FAULT_INJECTION: forcing a failure. [ 1817.418401] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1817.457971] CPU: 1 PID: 11453 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1817.465227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1817.465234] Call Trace: [ 1817.465252] dump_stack+0x1db/0x2d0 [ 1817.465271] ? dump_stack_print_info.cold+0x20/0x20 [ 1817.465288] ? kernel_text_address+0x73/0xf0 [ 1817.465309] should_fail.cold+0xa/0x15 [ 1817.465327] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1817.465346] ? arch_local_save_flags+0x50/0x50 [ 1817.499357] ? lock_release+0xc40/0xc40 [ 1817.499375] ? rcu_pm_notify+0xd0/0xd0 [ 1817.499401] should_fail_alloc_page+0x50/0x60 [ 1817.499415] __alloc_pages_nodemask+0x323/0xdc0 [ 1817.499433] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1817.525991] ? __kmalloc_node+0x3d/0x70 [ 1817.529971] ? rcu_read_lock_sched_held+0x110/0x130 [ 1817.534988] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1817.540528] alloc_pages_current+0x107/0x210 [ 1817.544940] push_pipe+0x3fc/0x7a0 [ 1817.548492] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1817.553421] ? __kernel_text_address+0xd/0x40 [ 1817.557936] ? iov_iter_revert+0xaa0/0xaa0 [ 1817.562179] ? save_stack+0xa9/0xd0 [ 1817.565801] ? save_stack+0x45/0xd0 [ 1817.569421] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1817.574518] ? kasan_kmalloc+0x9/0x10 [ 1817.578343] ? __kmalloc+0x15c/0x740 [ 1817.582051] ? alloc_pipe_info+0x286/0x580 [ 1817.586288] ? splice_direct_to_actor+0x795/0x9d0 [ 1817.591122] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1817.596158] ? iov_iter_pipe+0xba/0x2f0 [ 1817.600138] default_file_splice_read+0x1b1/0xac0 [ 1817.604994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1817.610540] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1817.615817] ? iter_file_splice_write+0xfc0/0xfc0 [ 1817.615835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1817.615848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1817.615860] ? check_preemption_disabled+0x48/0x290 [ 1817.615888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1817.626235] ? fsnotify+0x4f5/0xed0 [ 1817.626249] ? debug_mutex_init+0x2d/0x60 [ 1817.626268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1817.626281] ? __fsnotify_parent+0xe2/0x450 [ 1817.626294] ? fsnotify_first_mark+0x350/0x350 [ 1817.626308] ? init_wait_entry+0x1c0/0x1c0 03:38:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x5, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x201, 0x0) getpeername$ax25(r2, &(0x7f0000000040)={{0x3, @netrom}, [@netrom, @default, @rose, @remote, @null, @remote, @rose, @rose]}, &(0x7f00000000c0)=0x48) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000300)) connect$packet(r2, &(0x7f0000000200)={0x11, 0xf5, r3, 0x1, 0xcb, 0x6, @random="0b014ad8d486"}, 0x14) [ 1817.669194] ? __fget+0x472/0x710 [ 1817.669214] ? alloc_pipe_info+0x286/0x580 [ 1817.669241] ? security_file_permission+0x94/0x320 [ 1817.669260] ? rw_verify_area+0x118/0x360 [ 1817.669274] ? iter_file_splice_write+0xfc0/0xfc0 [ 1817.669289] do_splice_to+0x12a/0x190 03:38:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`B\x04\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1817.669306] splice_direct_to_actor+0x31b/0x9d0 [ 1817.669320] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1817.669339] ? do_splice_to+0x190/0x190 [ 1817.669356] ? rw_verify_area+0x118/0x360 [ 1817.669372] do_splice_direct+0x2c7/0x420 [ 1817.669390] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1817.669413] ? rw_verify_area+0x118/0x360 [ 1817.669429] do_sendfile+0x61a/0xe60 [ 1817.669454] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1817.669469] ? fput+0x128/0x1a0 [ 1817.669483] ? do_syscall_64+0x8c/0x800 [ 1817.669496] ? do_syscall_64+0x8c/0x800 [ 1817.669515] __x64_sys_sendfile64+0x1f8/0x240 [ 1817.669531] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1817.669545] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1817.669567] do_syscall_64+0x1a3/0x800 [ 1817.669584] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1817.669600] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1817.669627] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1817.669649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1817.669660] RIP: 0033:0x458099 [ 1817.669673] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1817.669681] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1817.669694] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1817.669702] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1817.669710] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1817.669718] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1817.669726] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1817.768191] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:14 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:14 executing program 3 (fault-call:5 fault-nth:6): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:14 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) 03:38:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'ip6gre0\x00', {0x2, 0x4e20, @multicast2}}) r1 = socket$unix(0x1, 0x400001, 0x0) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000100)=@netrom) ppoll(&(0x7f00000002c0)=[{r0, 0x800000000000}], 0xa0, 0x0, 0x0, 0xfffffffffffffd7f) getsockname$unix(r1, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) [ 1818.014300] FAULT_INJECTION: forcing a failure. [ 1818.014300] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1818.077164] CPU: 1 PID: 11482 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1818.084527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1818.093881] Call Trace: [ 1818.096474] dump_stack+0x1db/0x2d0 [ 1818.100108] ? dump_stack_print_info.cold+0x20/0x20 [ 1818.105133] ? kernel_text_address+0x73/0xf0 [ 1818.109564] should_fail.cold+0xa/0x15 [ 1818.113457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1818.118562] ? arch_local_save_flags+0x50/0x50 [ 1818.123141] ? lock_release+0xc40/0xc40 [ 1818.127112] ? rcu_pm_notify+0xd0/0xd0 [ 1818.131006] should_fail_alloc_page+0x50/0x60 [ 1818.135497] __alloc_pages_nodemask+0x323/0xdc0 [ 1818.140172] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1818.145200] ? __kmalloc_node+0x3d/0x70 [ 1818.149178] ? rcu_read_lock_sched_held+0x110/0x130 [ 1818.154192] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1818.159731] alloc_pages_current+0x107/0x210 [ 1818.164142] push_pipe+0x3fc/0x7a0 [ 1818.167692] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1818.172617] ? __kernel_text_address+0xd/0x40 [ 1818.177116] ? iov_iter_revert+0xaa0/0xaa0 [ 1818.181358] ? save_stack+0xa9/0xd0 [ 1818.184981] ? save_stack+0x45/0xd0 [ 1818.188606] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1818.193707] ? kasan_kmalloc+0x9/0x10 [ 1818.197500] ? __kmalloc+0x15c/0x740 [ 1818.201210] ? alloc_pipe_info+0x286/0x580 [ 1818.205440] ? splice_direct_to_actor+0x795/0x9d0 [ 1818.210279] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1818.215295] ? iov_iter_pipe+0xba/0x2f0 [ 1818.219275] default_file_splice_read+0x1b1/0xac0 [ 1818.224202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.229742] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1818.235015] ? iter_file_splice_write+0xfc0/0xfc0 [ 1818.239861] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.245398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.250937] ? check_preemption_disabled+0x48/0x290 [ 1818.255949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.261468] ? fsnotify+0x4f5/0xed0 [ 1818.265078] ? debug_mutex_init+0x2d/0x60 [ 1818.269210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.274847] ? __fsnotify_parent+0xe2/0x450 [ 1818.279154] ? fsnotify_first_mark+0x350/0x350 [ 1818.283733] ? init_wait_entry+0x1c0/0x1c0 [ 1818.288049] ? __fget+0x472/0x710 [ 1818.291486] ? alloc_pipe_info+0x286/0x580 [ 1818.295799] ? security_file_permission+0x94/0x320 [ 1818.302950] ? rw_verify_area+0x118/0x360 [ 1818.307089] ? iter_file_splice_write+0xfc0/0xfc0 [ 1818.311914] do_splice_to+0x12a/0x190 [ 1818.315707] splice_direct_to_actor+0x31b/0x9d0 [ 1818.320368] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1818.325207] ? do_splice_to+0x190/0x190 [ 1818.329183] ? rw_verify_area+0x118/0x360 [ 1818.333343] do_splice_direct+0x2c7/0x420 [ 1818.337479] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1818.342328] ? rw_verify_area+0x118/0x360 [ 1818.346468] do_sendfile+0x61a/0xe60 [ 1818.350171] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1818.354735] ? fput+0x128/0x1a0 [ 1818.358001] ? do_syscall_64+0x8c/0x800 [ 1818.361963] ? do_syscall_64+0x8c/0x800 [ 1818.365932] __x64_sys_sendfile64+0x1f8/0x240 [ 1818.370410] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1818.374989] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1818.379744] do_syscall_64+0x1a3/0x800 [ 1818.383634] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1818.388651] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1818.393666] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1818.398532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1818.403838] RIP: 0033:0x458099 [ 1818.407120] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:38:15 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x6, 0xffffffffffffff9c, 0x1}) close(r0) 03:38:15 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1818.426001] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1818.433698] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1818.440944] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1818.448192] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1818.455457] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1818.462715] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:15 executing program 3 (fault-call:5 fault-nth:7): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:15 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x500000000408201, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) uname(&(0x7f0000000100)=""/152) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000080)=0x3, 0x2) close(r0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) 03:38:15 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1818.621202] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:15 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x18000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x125, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x4}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x47a09155dfb442d5) [ 1818.710911] FAULT_INJECTION: forcing a failure. [ 1818.710911] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:38:15 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x1, 0x6, 0x6, 0x9, 0x800, 0x2}}, 0x8) close(r0) [ 1818.769182] CPU: 0 PID: 11512 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1818.776821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1818.786181] Call Trace: [ 1818.788821] dump_stack+0x1db/0x2d0 [ 1818.792466] ? dump_stack_print_info.cold+0x20/0x20 [ 1818.797498] ? kernel_text_address+0x73/0xf0 [ 1818.802087] should_fail.cold+0xa/0x15 [ 1818.806011] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1818.811131] ? arch_local_save_flags+0x50/0x50 [ 1818.815736] ? lock_release+0xc40/0xc40 [ 1818.819805] ? rcu_pm_notify+0xd0/0xd0 [ 1818.823718] should_fail_alloc_page+0x50/0x60 [ 1818.828251] __alloc_pages_nodemask+0x323/0xdc0 [ 1818.832931] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1818.837962] ? __kmalloc_node+0x3d/0x70 [ 1818.841940] ? rcu_read_lock_sched_held+0x110/0x130 [ 1818.847084] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1818.852628] alloc_pages_current+0x107/0x210 [ 1818.857048] push_pipe+0x3fc/0x7a0 [ 1818.860594] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1818.865519] ? __kernel_text_address+0xd/0x40 [ 1818.870019] ? iov_iter_revert+0xaa0/0xaa0 [ 1818.874267] ? save_stack+0xa9/0xd0 [ 1818.877890] ? save_stack+0x45/0xd0 [ 1818.881510] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1818.886605] ? kasan_kmalloc+0x9/0x10 [ 1818.890402] ? __kmalloc+0x15c/0x740 [ 1818.894112] ? alloc_pipe_info+0x286/0x580 [ 1818.898338] ? splice_direct_to_actor+0x795/0x9d0 [ 1818.903172] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1818.908204] ? iov_iter_pipe+0xba/0x2f0 [ 1818.912176] default_file_splice_read+0x1b1/0xac0 [ 1818.912192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.912214] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1818.912226] ? iter_file_splice_write+0xfc0/0xfc0 [ 1818.912242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.922591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.922607] ? check_preemption_disabled+0x48/0x290 [ 1818.922627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.922639] ? fsnotify+0x4f5/0xed0 [ 1818.922651] ? debug_mutex_init+0x2d/0x60 [ 1818.922667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.943799] ? __fsnotify_parent+0xe2/0x450 [ 1818.943817] ? fsnotify_first_mark+0x350/0x350 [ 1818.943830] ? init_wait_entry+0x1c0/0x1c0 [ 1818.943842] ? __fget+0x472/0x710 [ 1818.943860] ? alloc_pipe_info+0x286/0x580 [ 1818.954421] ? security_file_permission+0x94/0x320 [ 1818.954440] ? rw_verify_area+0x118/0x360 [ 1818.954453] ? iter_file_splice_write+0xfc0/0xfc0 [ 1819.002482] do_splice_to+0x12a/0x190 [ 1819.006294] splice_direct_to_actor+0x31b/0x9d0 [ 1819.010959] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1819.015793] ? do_splice_to+0x190/0x190 [ 1819.019749] ? rw_verify_area+0x118/0x360 [ 1819.023974] do_splice_direct+0x2c7/0x420 [ 1819.028119] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1819.032947] ? rw_verify_area+0x118/0x360 [ 1819.037097] do_sendfile+0x61a/0xe60 [ 1819.040800] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1819.045451] ? fput+0x128/0x1a0 [ 1819.048710] ? do_syscall_64+0x8c/0x800 [ 1819.052669] ? do_syscall_64+0x8c/0x800 [ 1819.056636] __x64_sys_sendfile64+0x1f8/0x240 [ 1819.061120] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1819.065681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1819.070418] do_syscall_64+0x1a3/0x800 [ 1819.074286] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1819.079195] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1819.084191] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1819.089027] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1819.094196] RIP: 0033:0x458099 [ 1819.097504] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1819.116392] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1819.124086] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1819.131357] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1819.138628] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1819.145879] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1819.153128] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:16 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000080)=0x3ff) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x800000000009, 0x0, 0x0, 0x80000001}, 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:16 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) socket$pppoe(0x18, 0x1, 0x0) 03:38:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80040, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000340)=0x7) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="010001004cff"], &(0x7f0000000240)=0xa) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000280)={r3, 0x3, 0x0, 0x2, 0x10000}, &(0x7f0000000300)=0x18) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5013fc7e", @ANYRES16=r4, @ANYBLOB="00042abd7000000000000a0000002400090008000200070000000800010000000100080002000500000008000100ff010000180001000800030009000000080003000100000004000200"], 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 03:38:16 executing program 3 (fault-call:5 fault-nth:8): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x03\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1819.233151] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:16 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:16 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x4, 0x0, 0x10003, 0x4}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000380)={0x0, r2}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000000)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f00000001c0)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x44, 0x0, &(0x7f0000000300)=[@reply={0x40406301, {0x2, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000200)=[@flat={0x73682a85, 0x101, r3, 0x1}, @flat={0x77682a85, 0xa, r4, 0x3}, @fda={0x66646185, 0x4, 0x2, 0x20}], &(0x7f0000000280)=[0x48, 0x0, 0x68]}}], 0xc6, 0x0, &(0x7f0000000080)="68417588ec158637c45194e81f9b1d1fbb63d875f8189a964128bf1b0fb37861b44ffb12f58364707b573e3e6153943d8da14083cd2d78af7388f9d76276e241443ef949a7f95835ace4e0bc6a568521f03e238b4e1a56ef867a025c25be69eff5e6fb33fae31a1350c6ee948d86f9f6d02b779a9b964f5018fa080a2bb45505f01197b0ccb974f437d9b4ca1b81457e3a7d8efe05c9abd38ac5b75b95ead9460a04df6a79d539ece3f1d4aba303576f09e9e1e02c3ff4c4bcd2f214802b69edf86250fd9702"}) close(r0) [ 1819.365443] FAULT_INJECTION: forcing a failure. [ 1819.365443] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1819.387471] Unknown ioctl 20998 [ 1819.388794] CPU: 0 PID: 11539 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1819.398127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1819.407495] Call Trace: [ 1819.407517] dump_stack+0x1db/0x2d0 [ 1819.407534] ? dump_stack_print_info.cold+0x20/0x20 [ 1819.407549] ? kernel_text_address+0x73/0xf0 [ 1819.413759] should_fail.cold+0xa/0x15 [ 1819.413776] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1819.413794] ? arch_local_save_flags+0x50/0x50 [ 1819.413807] ? lock_release+0xc40/0xc40 [ 1819.421428] Unknown ioctl 20998 [ 1819.423293] ? rcu_pm_notify+0xd0/0xd0 [ 1819.423319] should_fail_alloc_page+0x50/0x60 [ 1819.423334] __alloc_pages_nodemask+0x323/0xdc0 [ 1819.444179] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1819.444206] ? __kmalloc_node+0x3d/0x70 [ 1819.444223] ? rcu_read_lock_sched_held+0x110/0x130 [ 1819.452608] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1819.452629] alloc_pages_current+0x107/0x210 [ 1819.452647] push_pipe+0x3fc/0x7a0 [ 1819.452669] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1819.452682] ? __kernel_text_address+0xd/0x40 [ 1819.466431] ? iov_iter_revert+0xaa0/0xaa0 [ 1819.466457] ? save_stack+0xa9/0xd0 [ 1819.466470] ? save_stack+0x45/0xd0 [ 1819.466484] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1819.477222] ? kasan_kmalloc+0x9/0x10 [ 1819.477233] ? __kmalloc+0x15c/0x740 [ 1819.477246] ? alloc_pipe_info+0x286/0x580 [ 1819.477258] ? splice_direct_to_actor+0x795/0x9d0 [ 1819.477271] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1819.477286] ? iov_iter_pipe+0xba/0x2f0 [ 1819.477302] default_file_splice_read+0x1b1/0xac0 [ 1819.477316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.485248] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1819.485264] ? iter_file_splice_write+0xfc0/0xfc0 [ 1819.485279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:38:16 executing program 3 (fault-call:5 fault-nth:9): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1819.485290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.485304] ? check_preemption_disabled+0x48/0x290 [ 1819.494980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.494999] ? fsnotify+0x4f5/0xed0 [ 1819.495011] ? debug_mutex_init+0x2d/0x60 [ 1819.495028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.495039] ? __fsnotify_parent+0xe2/0x450 [ 1819.495054] ? fsnotify_first_mark+0x350/0x350 [ 1819.502877] ? init_wait_entry+0x1c0/0x1c0 [ 1819.502889] ? __fget+0x472/0x710 [ 1819.502906] ? alloc_pipe_info+0x286/0x580 03:38:16 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000280)) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000240)=0x4, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)=ANY=[], &(0x7f0000000100), 0x1400) writev(r2, &(0x7f0000000640)=[{&(0x7f0000000380)="3889abc10736ac7cc081d143b04c7971450a8895d0507ffa10ab239b73ba8a2d9c361caf0cc82386635f572283ad097196ccf62bbda27b8ad492f9b3f68e072469f0c7442601cc35ae4c03a01aa59a3f2ac743cf84846d3adcd6439d960d4a59022b2bd50ef43cfbf568eebbf9b3", 0x6e}, {&(0x7f00000000c0)="bd28a2f1ac9d8ddce668618b905f4233c74b2a323fdccdc1435d08a4bfacc124107e7490bf6e07c7e5ac1e2673c0f692f9198e9e6d83e7", 0x37}, {&(0x7f0000000400)="ee23a3c8f058370d93ba75ee4e22b4df430b77062ddb9eee1586cefa7757afc098e54c3af52c58e607c08346d18e40ac479ca3aaee4584634afca61ccc6aafb60c4cfcbfaf6249c7c9656383e79575f94adc00ed593a8d6923ef874483dd4f38720e0a99087ee2cb1c7fa63c0d", 0x6d}, {&(0x7f0000000480)}, {&(0x7f00000004c0)="9cef255bccfbfbaa73050a18da06124d0eabd0f84def71cfb4c566fb00d48d65cf396dde44138aa537386506b930fc65ad8ea413dc6b910015596788410008c163d37f182a37e1b7b5c196faa7fbdc5403d931d4b06fbda9be25802c8d36a877ae300a859d723e", 0x67}, {&(0x7f0000000540)="0669fe4c89caa2d1c9e72992adb7ea88bb2b3772d8", 0x15}, {&(0x7f0000000580)="25ff470e7f803901372d1bc95cd1d2e45def53facd1b7c0cb3a5a831c6dbfa6b64b8aaf58a98a5fdd8e03d93338c421b2e574c11f15cde4ce1eec816a77625e8ee964303b61e04a16f113a7fa5f3594192f513e910d0de395ff15388f1b33435cb8c327f4f1cb61d8a7d3a41da58c325020f3d236607b8e82b3323028cf3d514e48d4a2c5d5de9e7add4951e8fa2532a15a815ed95773bfe491e3cb87c91ec96a58356139bf6dd22de954ec8b94ce18be7c4ac9f367561", 0xb7}], 0x7) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000300), &(0x7f0000000340)=0x4) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2801, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r3 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r3}], 0xa0, 0x0, 0x0, 0x0) [ 1819.502929] ? security_file_permission+0x94/0x320 [ 1819.502947] ? rw_verify_area+0x118/0x360 [ 1819.511649] ? iter_file_splice_write+0xfc0/0xfc0 [ 1819.511665] do_splice_to+0x12a/0x190 [ 1819.511682] splice_direct_to_actor+0x31b/0x9d0 [ 1819.511696] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1819.511716] ? do_splice_to+0x190/0x190 [ 1819.511737] ? rw_verify_area+0x118/0x360 [ 1819.511752] do_splice_direct+0x2c7/0x420 [ 1819.519229] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1819.519254] ? rw_verify_area+0x118/0x360 [ 1819.519271] do_sendfile+0x61a/0xe60 [ 1819.519294] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1819.519309] ? fput+0x128/0x1a0 [ 1819.528340] ? do_syscall_64+0x8c/0x800 [ 1819.528354] ? do_syscall_64+0x8c/0x800 [ 1819.528373] __x64_sys_sendfile64+0x1f8/0x240 [ 1819.528389] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1819.528402] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1819.528422] do_syscall_64+0x1a3/0x800 [ 1819.537367] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1819.537383] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1819.537403] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:38:16 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x101101, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) io_setup(0x8001, &(0x7f0000000040)) close(0xffffffffffffffff) [ 1819.537425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1819.537437] RIP: 0033:0x458099 [ 1819.547776] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1819.547784] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1819.547798] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1819.547806] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1819.547814] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1819.547822] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1819.547830] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1819.845483] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1819.888341] FAULT_INJECTION: forcing a failure. [ 1819.888341] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1819.909137] CPU: 0 PID: 11570 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1819.916361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1819.925724] Call Trace: [ 1819.928317] dump_stack+0x1db/0x2d0 [ 1819.931961] ? dump_stack_print_info.cold+0x20/0x20 03:38:16 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1819.936988] ? kernel_text_address+0x73/0xf0 [ 1819.941405] should_fail.cold+0xa/0x15 [ 1819.945302] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1819.950415] ? arch_local_save_flags+0x50/0x50 [ 1819.954996] ? lock_release+0xc40/0xc40 [ 1819.958974] ? rcu_pm_notify+0xd0/0xd0 [ 1819.962878] should_fail_alloc_page+0x50/0x60 [ 1819.967376] __alloc_pages_nodemask+0x323/0xdc0 [ 1819.972051] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1819.977081] ? __kmalloc_node+0x3d/0x70 [ 1819.981066] ? rcu_read_lock_sched_held+0x110/0x130 [ 1819.986082] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1819.991626] alloc_pages_current+0x107/0x210 [ 1819.996044] push_pipe+0x3fc/0x7a0 [ 1819.999596] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1820.004528] ? __kernel_text_address+0xd/0x40 [ 1820.009037] ? iov_iter_revert+0xaa0/0xaa0 [ 1820.013284] ? save_stack+0xa9/0xd0 [ 1820.016918] ? save_stack+0x45/0xd0 [ 1820.020549] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1820.025655] ? kasan_kmalloc+0x9/0x10 [ 1820.029458] ? __kmalloc+0x15c/0x740 [ 1820.033190] ? alloc_pipe_info+0x286/0x580 [ 1820.037425] ? splice_direct_to_actor+0x795/0x9d0 [ 1820.042275] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1820.047292] ? iov_iter_pipe+0xba/0x2f0 [ 1820.051272] default_file_splice_read+0x1b1/0xac0 [ 1820.056126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.061675] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1820.066965] ? iter_file_splice_write+0xfc0/0xfc0 [ 1820.071810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.077960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.083497] ? check_preemption_disabled+0x48/0x290 [ 1820.088520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.094061] ? fsnotify+0x4f5/0xed0 [ 1820.097698] ? debug_mutex_init+0x2d/0x60 [ 1820.101853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.107482] ? __fsnotify_parent+0xe2/0x450 [ 1820.111807] ? fsnotify_first_mark+0x350/0x350 [ 1820.116390] ? init_wait_entry+0x1c0/0x1c0 [ 1820.120624] ? __fget+0x472/0x710 [ 1820.124082] ? alloc_pipe_info+0x286/0x580 [ 1820.128335] ? security_file_permission+0x94/0x320 [ 1820.133271] ? rw_verify_area+0x118/0x360 [ 1820.137421] ? iter_file_splice_write+0xfc0/0xfc0 [ 1820.142358] do_splice_to+0x12a/0x190 [ 1820.146179] splice_direct_to_actor+0x31b/0x9d0 [ 1820.150853] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1820.155730] ? do_splice_to+0x190/0x190 [ 1820.159724] ? rw_verify_area+0x118/0x360 [ 1820.163881] do_splice_direct+0x2c7/0x420 [ 1820.168036] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1820.172891] ? rw_verify_area+0x118/0x360 [ 1820.177049] do_sendfile+0x61a/0xe60 [ 1820.180784] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1820.185367] ? fput+0x128/0x1a0 [ 1820.188648] ? do_syscall_64+0x8c/0x800 [ 1820.192625] ? do_syscall_64+0x8c/0x800 [ 1820.196602] __x64_sys_sendfile64+0x1f8/0x240 [ 1820.201105] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1820.205697] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1820.210468] do_syscall_64+0x1a3/0x800 [ 1820.214359] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1820.219294] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1820.224318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1820.229171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1820.234359] RIP: 0033:0x458099 [ 1820.237551] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1820.256450] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1820.264245] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1820.271636] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1820.279019] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:38:17 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000080)=0x8, 0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$alg(0x26, 0x5, 0x0) [ 1820.286285] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1820.293550] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:17 executing program 3 (fault-call:5 fault-nth:10): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x14000, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000040)={0x2}, 0x4) 03:38:17 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000040)) close(r0) 03:38:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x04\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1820.454182] FAULT_INJECTION: forcing a failure. [ 1820.454182] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1820.466264] CPU: 1 PID: 11590 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1820.473449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1820.473455] Call Trace: [ 1820.473476] dump_stack+0x1db/0x2d0 [ 1820.473495] ? dump_stack_print_info.cold+0x20/0x20 [ 1820.473511] ? kernel_text_address+0x73/0xf0 [ 1820.473536] should_fail.cold+0xa/0x15 [ 1820.473555] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1820.473575] ? arch_local_save_flags+0x50/0x50 [ 1820.473587] ? lock_release+0xc40/0xc40 [ 1820.473604] ? rcu_pm_notify+0xd0/0xd0 [ 1820.473629] should_fail_alloc_page+0x50/0x60 [ 1820.473642] __alloc_pages_nodemask+0x323/0xdc0 [ 1820.473673] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1820.473697] ? __kmalloc_node+0x3d/0x70 [ 1820.485628] ? rcu_read_lock_sched_held+0x110/0x130 [ 1820.485643] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1820.485670] alloc_pages_current+0x107/0x210 [ 1820.498783] push_pipe+0x3fc/0x7a0 [ 1820.498810] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1820.498824] ? __kernel_text_address+0xd/0x40 [ 1820.498842] ? iov_iter_revert+0xaa0/0xaa0 [ 1820.517151] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1820.520284] ? save_stack+0xa9/0xd0 [ 1820.520300] ? save_stack+0x45/0xd0 [ 1820.520313] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1820.520326] ? kasan_kmalloc+0x9/0x10 [ 1820.534461] ? __kmalloc+0x15c/0x740 [ 1820.534478] ? alloc_pipe_info+0x286/0x580 [ 1820.534493] ? splice_direct_to_actor+0x795/0x9d0 [ 1820.534520] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1820.534535] ? iov_iter_pipe+0xba/0x2f0 [ 1820.534553] default_file_splice_read+0x1b1/0xac0 [ 1820.534568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.534592] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1820.534605] ? iter_file_splice_write+0xfc0/0xfc0 [ 1820.534620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.549101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.549120] ? check_preemption_disabled+0x48/0x290 [ 1820.549143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.549156] ? fsnotify+0x4f5/0xed0 [ 1820.549169] ? debug_mutex_init+0x2d/0x60 [ 1820.580622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.580639] ? __fsnotify_parent+0xe2/0x450 [ 1820.580661] ? fsnotify_first_mark+0x350/0x350 [ 1820.605883] ? init_wait_entry+0x1c0/0x1c0 [ 1820.605896] ? __fget+0x472/0x710 [ 1820.605915] ? alloc_pipe_info+0x286/0x580 [ 1820.605944] ? security_file_permission+0x94/0x320 [ 1820.605963] ? rw_verify_area+0x118/0x360 [ 1820.605978] ? iter_file_splice_write+0xfc0/0xfc0 [ 1820.605994] do_splice_to+0x12a/0x190 [ 1820.606012] splice_direct_to_actor+0x31b/0x9d0 [ 1820.606025] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1820.606042] ? do_splice_to+0x190/0x190 [ 1820.630625] ? rw_verify_area+0x118/0x360 [ 1820.630653] do_splice_direct+0x2c7/0x420 [ 1820.630672] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1820.630693] ? rw_verify_area+0x118/0x360 [ 1820.670417] do_sendfile+0x61a/0xe60 [ 1820.696122] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1820.696144] ? fput+0x128/0x1a0 [ 1820.696162] ? do_syscall_64+0x8c/0x800 03:38:17 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1820.696178] ? do_syscall_64+0x8c/0x800 [ 1820.696199] __x64_sys_sendfile64+0x1f8/0x240 [ 1820.696218] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1820.696234] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1820.696258] do_syscall_64+0x1a3/0x800 [ 1820.696277] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1820.718566] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1820.718591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1820.718619] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1820.718639] RIP: 0033:0x458099 03:38:17 executing program 3 (fault-call:5 fault-nth:11): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1820.718653] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1820.730923] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1820.739906] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1820.739916] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1820.739925] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1820.739935] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1820.739944] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:17 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x800, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) [ 1820.991708] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:17 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1821.049453] FAULT_INJECTION: forcing a failure. [ 1821.049453] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1821.070027] CPU: 1 PID: 11619 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1821.077310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1821.086667] Call Trace: [ 1821.089265] dump_stack+0x1db/0x2d0 [ 1821.092902] ? dump_stack_print_info.cold+0x20/0x20 [ 1821.097921] ? kernel_text_address+0x73/0xf0 [ 1821.102337] should_fail.cold+0xa/0x15 [ 1821.106234] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1821.111345] ? arch_local_save_flags+0x50/0x50 [ 1821.115930] ? lock_release+0xc40/0xc40 [ 1821.119905] ? rcu_pm_notify+0xd0/0xd0 [ 1821.123804] should_fail_alloc_page+0x50/0x60 [ 1821.128297] __alloc_pages_nodemask+0x323/0xdc0 [ 1821.132970] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1821.137994] ? __kmalloc_node+0x3d/0x70 [ 1821.141973] ? rcu_read_lock_sched_held+0x110/0x130 [ 1821.146983] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1821.152526] alloc_pages_current+0x107/0x210 [ 1821.156940] push_pipe+0x3fc/0x7a0 [ 1821.160490] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1821.165590] ? __kernel_text_address+0xd/0x40 [ 1821.170107] ? iov_iter_revert+0xaa0/0xaa0 [ 1821.174361] ? save_stack+0xa9/0xd0 [ 1821.177998] ? save_stack+0x45/0xd0 [ 1821.181639] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1821.186747] ? kasan_kmalloc+0x9/0x10 [ 1821.190549] ? __kmalloc+0x15c/0x740 [ 1821.194276] ? alloc_pipe_info+0x286/0x580 03:38:18 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) signalfd4(r0, &(0x7f0000000000)={0x7}, 0x8, 0x0) [ 1821.198507] ? splice_direct_to_actor+0x795/0x9d0 [ 1821.203348] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1821.208372] ? iov_iter_pipe+0xba/0x2f0 [ 1821.212704] default_file_splice_read+0x1b1/0xac0 [ 1821.217658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.223243] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1821.228524] ? iter_file_splice_write+0xfc0/0xfc0 [ 1821.233383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.238934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.244477] ? check_preemption_disabled+0x48/0x290 [ 1821.244501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.244514] ? fsnotify+0x4f5/0xed0 [ 1821.244527] ? debug_mutex_init+0x2d/0x60 [ 1821.255068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.255084] ? __fsnotify_parent+0xe2/0x450 [ 1821.255100] ? fsnotify_first_mark+0x350/0x350 [ 1821.255112] ? init_wait_entry+0x1c0/0x1c0 [ 1821.255123] ? __fget+0x472/0x710 [ 1821.255139] ? alloc_pipe_info+0x286/0x580 [ 1821.255161] ? security_file_permission+0x94/0x320 [ 1821.255178] ? rw_verify_area+0x118/0x360 03:38:18 executing program 2: close(0xffffffffffffffff) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) [ 1821.255190] ? iter_file_splice_write+0xfc0/0xfc0 [ 1821.255202] do_splice_to+0x12a/0x190 [ 1821.255216] splice_direct_to_actor+0x31b/0x9d0 [ 1821.303116] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1821.303135] ? do_splice_to+0x190/0x190 [ 1821.303153] ? rw_verify_area+0x118/0x360 [ 1821.303167] do_splice_direct+0x2c7/0x420 [ 1821.303184] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1821.311640] ? rw_verify_area+0x118/0x360 [ 1821.328699] do_sendfile+0x61a/0xe60 [ 1821.328727] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1821.328745] ? fput+0x128/0x1a0 [ 1821.328758] ? do_syscall_64+0x8c/0x800 [ 1821.328770] ? do_syscall_64+0x8c/0x800 [ 1821.341440] __x64_sys_sendfile64+0x1f8/0x240 [ 1821.341459] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1821.341476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1821.341495] do_syscall_64+0x1a3/0x800 [ 1821.341510] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1821.379782] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1821.384787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1821.389620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1821.394807] RIP: 0033:0x458099 [ 1821.397987] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1821.416887] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1821.424582] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1821.431847] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1821.439126] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:38:18 executing program 3 (fault-call:5 fault-nth:12): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1821.446401] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1821.458139] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1821.553167] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1821.628936] FAULT_INJECTION: forcing a failure. [ 1821.628936] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:38:18 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r0 = socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000002c0), &(0x7f00000003c0)=0x4) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) r4 = socket(0x4, 0x3, 0x2e) getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000240)=0x78) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:38:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$unix(0x1, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f00000000c0)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0x3da9bc83, 0x4}, {0x5, 0x10001}], r2}, 0x18, 0x1) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r3, 0xc0045520, &(0x7f0000000040)=0x3) 03:38:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x05\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:18 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r1, 0x4008ae93, &(0x7f0000000040)=0x5000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000080)=0x2) r2 = msgget(0x3, 0x10) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000180), &(0x7f00000001c0)=0x4) msgctl$IPC_RMID(r2, 0x0) close(r1) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)) 03:38:18 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db36995d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) [ 1821.669824] CPU: 1 PID: 11641 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1821.677061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1821.686406] Call Trace: [ 1821.686428] dump_stack+0x1db/0x2d0 [ 1821.686445] ? dump_stack_print_info.cold+0x20/0x20 [ 1821.686461] ? kernel_text_address+0x73/0xf0 [ 1821.686481] should_fail.cold+0xa/0x15 [ 1821.686499] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1821.686518] ? arch_local_save_flags+0x50/0x50 [ 1821.686529] ? lock_release+0xc40/0xc40 [ 1821.686542] ? rcu_pm_notify+0xd0/0xd0 [ 1821.686570] should_fail_alloc_page+0x50/0x60 [ 1821.727956] __alloc_pages_nodemask+0x323/0xdc0 [ 1821.732657] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1821.737741] ? __kmalloc_node+0x3d/0x70 [ 1821.741805] ? rcu_read_lock_sched_held+0x110/0x130 [ 1821.746871] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1821.752458] alloc_pages_current+0x107/0x210 [ 1821.756920] push_pipe+0x3fc/0x7a0 [ 1821.760504] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1821.765501] ? __kernel_text_address+0xd/0x40 [ 1821.770011] ? iov_iter_revert+0xaa0/0xaa0 [ 1821.774284] ? save_stack+0xa9/0xd0 [ 1821.777998] ? save_stack+0x45/0xd0 [ 1821.781678] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1821.786945] ? kasan_kmalloc+0x9/0x10 [ 1821.790786] ? __kmalloc+0x15c/0x740 [ 1821.794665] ? alloc_pipe_info+0x286/0x580 [ 1821.799029] ? splice_direct_to_actor+0x795/0x9d0 [ 1821.804137] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1821.809332] ? iov_iter_pipe+0xba/0x2f0 [ 1821.813388] default_file_splice_read+0x1b1/0xac0 [ 1821.818391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.824005] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1821.829319] ? iter_file_splice_write+0xfc0/0xfc0 [ 1821.834232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.839776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.845328] ? check_preemption_disabled+0x48/0x290 [ 1821.850373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.855913] ? fsnotify+0x4f5/0xed0 [ 1821.859542] ? debug_mutex_init+0x2d/0x60 [ 1821.863707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:38:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_GET_SECCOMP(0x15) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x1, 0x4) ppoll(&(0x7f00000002c0)=[{r1}], 0xa0, 0x0, 0x0, 0x0) r2 = socket(0xd, 0x80000, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@dev={0xac, 0x14, 0x14, 0xa}, 0x4e21, 0x6, 0x4e20, 0x94, 0xa, 0x20, 0x80, 0x7f, r3, r4}, {0x10000, 0x3ff, 0x4, 0x3, 0x3, 0x1, 0xfffffffffffffffc, 0x78}, {0x9, 0x7ff, 0x58e0000000000000, 0x80}, 0x101, 0x6e6bb0, 0x1, 0x0, 0x3}, {{@in6=@mcast1, 0x4d5, 0x33}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x3504, 0x7, 0x0, 0x7fff, 0x5, 0x0, 0x3f}}, 0xe8) [ 1821.869246] ? __fsnotify_parent+0xe2/0x450 [ 1821.873582] ? fsnotify_first_mark+0x350/0x350 [ 1821.878179] ? init_wait_entry+0x1c0/0x1c0 [ 1821.882415] ? __fget+0x472/0x710 [ 1821.885867] ? alloc_pipe_info+0x286/0x580 [ 1821.890112] ? security_file_permission+0x94/0x320 [ 1821.895045] ? rw_verify_area+0x118/0x360 [ 1821.899190] ? iter_file_splice_write+0xfc0/0xfc0 [ 1821.904034] do_splice_to+0x12a/0x190 [ 1821.907835] splice_direct_to_actor+0x31b/0x9d0 [ 1821.912510] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1821.917389] ? do_splice_to+0x190/0x190 [ 1821.921367] ? rw_verify_area+0x118/0x360 [ 1821.925508] do_splice_direct+0x2c7/0x420 [ 1821.925524] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1821.925553] ? rw_verify_area+0x118/0x360 [ 1821.925570] do_sendfile+0x61a/0xe60 [ 1821.925595] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1821.925612] ? fput+0x128/0x1a0 [ 1821.925625] ? do_syscall_64+0x8c/0x800 [ 1821.925637] ? do_syscall_64+0x8c/0x800 [ 1821.938743] __x64_sys_sendfile64+0x1f8/0x240 [ 1821.938761] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1821.938779] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1821.938800] do_syscall_64+0x1a3/0x800 [ 1821.947075] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1821.954315] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1821.954336] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1821.954357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1821.954369] RIP: 0033:0x458099 [ 1821.999059] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1822.018052] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1822.025868] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1822.033228] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1822.040619] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1822.047891] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1822.055163] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:19 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x800, 0x0) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x0, 0x40000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x91, "c8d56159251303983d1bf7119a73bc4e57d55415c96d2b7fc7e56d0ec09b1f30288820fccd925bb57c8d7e8fe3da2acfbfceb692c53856378f3d238d9193cf5241fb92576ee65fa3e49e39e01a7553580a73e019b5ca0d8af2c84efdc4af56749c1f6205cbe28a86ba0c2467be34b31e6c8129df0f51f9c19d0232a06fea2b2ff490d0170b57b85ac77da9e3627dfce377"}, &(0x7f0000000100)=0x99) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000003f80)={@local, @local, 0x0}, &(0x7f0000003fc0)=0xc) bind$bt_hci(r1, &(0x7f0000004000)={0x1f, r3, 0x2}, 0xc) r4 = accept$inet(r1, &(0x7f0000000280)={0x2, 0x0, @remote}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000240)=0xc1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000340)={r5, 0x6}, &(0x7f0000000380)=0x8) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000600)={'filter\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) close(r0) 03:38:19 executing program 1 (fault-call:15 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) [ 1822.159604] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:19 executing program 3 (fault-call:5 fault-nth:13): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:19 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:19 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$binfmt_aout(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="070102ff920200006e03000008000000cc010000010000000000000000000000a2345357fb71672bc5be66eb7b280a74bb445f9eeefa4e2da4691eea5453fadc63f43805576d987ea8227c714c09da1fdb19eeab52ea623e51bd33dcd76549c7095a9bff7ca1980be3d69d4703bca2eef5d7d610b392ec4c945e2b853323c5797597495928a0eb1ae9827b81088793862c5dab5e57d8fac6e28e59fb9e6b7b7a2bbc993e0a4c567c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f49079687252b73c44414bdbc1d1125a2d3cd3935b88335740919cb6c967f72cc4afc2b19e1709439b2e96d9ce4826451ded32b025e46a82abd3a7e6708c6788022b612da4f5cdaa743ecaa3db53f94d930b5a19e955b9e90676a57f72e64526276f87551cc06c9ac41e8aeaf80"], 0x7a8) close(r0) [ 1822.355352] FAULT_INJECTION: forcing a failure. [ 1822.355352] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:38:19 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) r0 = socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) write(r0, &(0x7f0000000180)="8c08cfec87ac2b59ca021be4edf4db305048830ef1f998e0a0470302523d3dc0e29de96cff8a3dde825f9a429e464e56db90b1c6428dc76ce3ee81dbc16ff436d601", 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x2, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000640)="4099a3d5ed3f0c5839878390ff369014cbf433abde6999528beff55d4a7493e29f6fb92635fe7dd552686456459cedacba9d73451bbce40bda14eb774b0eae9024320cb4d2ea74f0b8048b07c975ccad9b1def3f5fb3de1587dec562a3a24e831d30392072a322b67383df6224ee8510126b19beb0e96789ee3f5e9fecb5807a7e068d3227273a396d873aca1211609bab57c6775cf1a64f99b04beea0c33224e9064d89149802d74a3fe13b34aec376851b41f27d17871fd83163fab64541c438fb09d5766d9060f4e19dbde20cc1d94414b282ad95311a64379ffad64aefdab27c726a8c1bdd5d4b7b599e4c8702b5cdcd26cdcdb10694cc37e73cb05effec21e2df1f5fc531f89bd0aacb0b95017093f543ba8ebe0be9198b03e8615a564082376e834bd7ebd2dd6e0cd5d1c07dd1c4758979a4e8abb096615dcf4599c6286bbb48c5b0c73ae0bfb98238d3d8b35ddf51f10e5e223c051180a08538221d6b194acea52147d50e368c0fe37b079625f76117739e326c7adde52acd54ee4f27553a775342917896b7149f9d3cb03ebf43ab31995ac12446b337ae75ff204c155e50f87c0325", 0x1a6}], 0x293, 0x0) [ 1822.399146] overlayfs: failed to resolve './file1': -2 [ 1822.402169] CPU: 1 PID: 11687 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1822.411707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1822.421060] Call Trace: [ 1822.423653] dump_stack+0x1db/0x2d0 [ 1822.427285] ? dump_stack_print_info.cold+0x20/0x20 [ 1822.434561] ? kernel_text_address+0x73/0xf0 [ 1822.438978] should_fail.cold+0xa/0x15 [ 1822.442870] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1822.447977] ? arch_local_save_flags+0x50/0x50 [ 1822.452648] ? lock_release+0xc40/0xc40 [ 1822.456623] ? rcu_pm_notify+0xd0/0xd0 [ 1822.460531] should_fail_alloc_page+0x50/0x60 [ 1822.465049] __alloc_pages_nodemask+0x323/0xdc0 [ 1822.469726] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1822.474797] ? __kmalloc_node+0x3d/0x70 [ 1822.478778] ? rcu_read_lock_sched_held+0x110/0x130 [ 1822.483795] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1822.489431] alloc_pages_current+0x107/0x210 [ 1822.492434] FAULT_INJECTION: forcing a failure. [ 1822.492434] name failslab, interval 1, probability 0, space 0, times 0 [ 1822.493864] push_pipe+0x3fc/0x7a0 [ 1822.493890] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1822.493905] ? __kernel_text_address+0xd/0x40 [ 1822.493926] ? iov_iter_revert+0xaa0/0xaa0 [ 1822.493947] ? save_stack+0xa9/0xd0 [ 1822.525895] ? save_stack+0x45/0xd0 [ 1822.529523] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1822.534727] ? kasan_kmalloc+0x9/0x10 [ 1822.538526] ? __kmalloc+0x15c/0x740 [ 1822.542236] ? alloc_pipe_info+0x286/0x580 [ 1822.546473] ? splice_direct_to_actor+0x795/0x9d0 [ 1822.551317] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1822.556341] ? iov_iter_pipe+0xba/0x2f0 [ 1822.560317] default_file_splice_read+0x1b1/0xac0 [ 1822.565162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.570716] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1822.575992] ? iter_file_splice_write+0xfc0/0xfc0 [ 1822.580834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.586369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.591916] ? check_preemption_disabled+0x48/0x290 [ 1822.596938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.602471] ? fsnotify+0x4f5/0xed0 [ 1822.606099] ? debug_mutex_init+0x2d/0x60 [ 1822.610253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.615793] ? __fsnotify_parent+0xe2/0x450 [ 1822.620134] ? fsnotify_first_mark+0x350/0x350 [ 1822.624728] ? init_wait_entry+0x1c0/0x1c0 [ 1822.624739] ? __fget+0x472/0x710 [ 1822.624755] ? alloc_pipe_info+0x286/0x580 [ 1822.624796] ? security_file_permission+0x94/0x320 [ 1822.624814] ? rw_verify_area+0x118/0x360 [ 1822.624828] ? iter_file_splice_write+0xfc0/0xfc0 [ 1822.624841] do_splice_to+0x12a/0x190 [ 1822.624856] splice_direct_to_actor+0x31b/0x9d0 [ 1822.659034] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1822.663887] ? do_splice_to+0x190/0x190 [ 1822.667861] ? rw_verify_area+0x118/0x360 [ 1822.672004] do_splice_direct+0x2c7/0x420 [ 1822.676156] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1822.681008] ? rw_verify_area+0x118/0x360 [ 1822.685162] do_sendfile+0x61a/0xe60 [ 1822.688885] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1822.693555] ? fput+0x128/0x1a0 [ 1822.696855] ? do_syscall_64+0x8c/0x800 [ 1822.700825] ? do_syscall_64+0x8c/0x800 [ 1822.704801] __x64_sys_sendfile64+0x1f8/0x240 [ 1822.709298] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1822.713982] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1822.718835] do_syscall_64+0x1a3/0x800 [ 1822.722724] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1822.727758] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1822.732783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1822.737743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1822.742929] RIP: 0033:0x458099 [ 1822.746117] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1822.765014] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1822.772717] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1822.779986] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1822.787254] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:38:19 executing program 3 (fault-call:5 fault-nth:14): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1822.794606] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1822.801870] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1822.810242] CPU: 0 PID: 11677 Comm: syz-executor1 Not tainted 5.0.0-rc3+ #38 [ 1822.817444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1822.826813] Call Trace: [ 1822.829402] dump_stack+0x1db/0x2d0 [ 1822.833043] ? dump_stack_print_info.cold+0x20/0x20 [ 1822.838058] ? print_usage_bug+0xd0/0xd0 [ 1822.842253] should_fail.cold+0xa/0x15 [ 1822.846144] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1822.851255] ? ___might_sleep+0x1e7/0x310 [ 1822.855401] ? arch_local_save_flags+0x50/0x50 [ 1822.860151] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1822.865704] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1822.871156] __should_failslab+0x121/0x190 [ 1822.875398] should_failslab+0x9/0x14 [ 1822.879197] kmem_cache_alloc+0x2be/0x710 [ 1822.883346] getname_flags+0xd6/0x5b0 [ 1822.887142] getname+0x1a/0x20 [ 1822.890327] do_sys_open+0x3a5/0x7c0 [ 1822.894042] ? filp_open+0x80/0x80 [ 1822.897595] ? __ia32_sys_read+0xb0/0xb0 [ 1822.901649] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1822.907006] ? trace_hardirqs_off_caller+0x300/0x300 [ 1822.907024] __x64_sys_openat+0x9d/0x100 [ 1822.907039] do_syscall_64+0x1a3/0x800 [ 1822.916287] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1822.916319] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1822.916338] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1822.934935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1822.940104] RIP: 0033:0x458099 [ 1822.943279] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1822.962169] RSP: 002b:00007fbf4e252c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1822.969958] RAX: ffffffffffffffda RBX: 00007fbf4e252c90 RCX: 0000000000458099 [ 1822.977210] RDX: 0000000000000526 RSI: 0000000020000200 RDI: ffffffffffffff9c [ 1822.984468] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1822.991733] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf4e2536d4 03:38:19 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x6, 0x101002) write$ppp(r0, &(0x7f00000003c0)="b705e7e704a4d488864980530557eecd9e2e585bb7c5f402d6944381f12c75cd9b7e629f54e00dc6c862d37a34c76869aa325462443a9a6e636496c2d63b9f55ae44f4ffd34042adda48b9a691e62d74e5b622c5dc90e510628035b3a3ad282e", 0x60) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1000, 0x0) r2 = socket(0x1e, 0x4, 0x0) socket(0x1f, 0x400004, 0x200000000) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000180)={0x9, [0x2, 0x10000, 0x4d17, 0xffffffff, 0x8000, 0x84d, 0x7, 0xff, 0xfffffffffffffffe]}, 0x16) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000100)={0x80000000, 0x40000000000000, 0x4, 0xe4, &(0x7f0000000240)=""/228, 0x1000, &(0x7f0000000480)=""/4096, 0x1a, &(0x7f0000000080)=""/26}) [ 1822.998979] R13: 00000000004c40e8 R14: 00000000004d7318 R15: 0000000000000004 03:38:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x06\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:20 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100, 0x0) close(r0) [ 1823.102783] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1823.135386] FAULT_INJECTION: forcing a failure. [ 1823.135386] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:38:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) [ 1823.220945] CPU: 1 PID: 11714 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1823.228155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1823.237506] Call Trace: [ 1823.240098] dump_stack+0x1db/0x2d0 [ 1823.243738] ? dump_stack_print_info.cold+0x20/0x20 [ 1823.248782] ? kernel_text_address+0x73/0xf0 [ 1823.253209] should_fail.cold+0xa/0x15 [ 1823.257110] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1823.262226] ? arch_local_save_flags+0x50/0x50 [ 1823.266942] ? lock_release+0xc40/0xc40 [ 1823.270920] ? rcu_pm_notify+0xd0/0xd0 [ 1823.274819] should_fail_alloc_page+0x50/0x60 [ 1823.279312] __alloc_pages_nodemask+0x323/0xdc0 [ 1823.283986] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1823.289016] ? __kmalloc_node+0x3d/0x70 [ 1823.292994] ? rcu_read_lock_sched_held+0x110/0x130 [ 1823.298012] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1823.303556] alloc_pages_current+0x107/0x210 [ 1823.307973] push_pipe+0x3fc/0x7a0 [ 1823.311526] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1823.316468] ? __kernel_text_address+0xd/0x40 [ 1823.320972] ? iov_iter_revert+0xaa0/0xaa0 [ 1823.325231] ? save_stack+0xa9/0xd0 [ 1823.328861] ? save_stack+0x45/0xd0 [ 1823.332487] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1823.337586] ? kasan_kmalloc+0x9/0x10 [ 1823.341384] ? __kmalloc+0x15c/0x740 [ 1823.345096] ? alloc_pipe_info+0x286/0x580 [ 1823.349330] ? splice_direct_to_actor+0x795/0x9d0 [ 1823.354168] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1823.354183] ? iov_iter_pipe+0xba/0x2f0 [ 1823.354210] default_file_splice_read+0x1b1/0xac0 03:38:20 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20000, 0x0) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x70, r2, 0x0, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r3}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xfffffffffffffff9}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfffffffffffffff9}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xb355}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) close(r0) 03:38:20 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1823.363277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.363301] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1823.363316] ? iter_file_splice_write+0xfc0/0xfc0 [ 1823.363330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.363341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.363355] ? check_preemption_disabled+0x48/0x290 [ 1823.363376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.363389] ? fsnotify+0x4f5/0xed0 [ 1823.363401] ? debug_mutex_init+0x2d/0x60 [ 1823.363416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.363437] ? __fsnotify_parent+0xe2/0x450 [ 1823.379210] ? fsnotify_first_mark+0x350/0x350 [ 1823.379226] ? init_wait_entry+0x1c0/0x1c0 [ 1823.389759] ? __fget+0x472/0x710 [ 1823.389778] ? alloc_pipe_info+0x286/0x580 [ 1823.389804] ? security_file_permission+0x94/0x320 [ 1823.400335] ? rw_verify_area+0x118/0x360 [ 1823.400349] ? iter_file_splice_write+0xfc0/0xfc0 [ 1823.400363] do_splice_to+0x12a/0x190 [ 1823.400378] splice_direct_to_actor+0x31b/0x9d0 [ 1823.439891] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1823.439912] ? do_splice_to+0x190/0x190 [ 1823.439930] ? rw_verify_area+0x118/0x360 [ 1823.439946] do_splice_direct+0x2c7/0x420 [ 1823.448987] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1823.449013] ? rw_verify_area+0x118/0x360 [ 1823.449028] do_sendfile+0x61a/0xe60 [ 1823.449051] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1823.457939] overlayfs: failed to resolve './file1': -2 [ 1823.462566] ? fput+0x128/0x1a0 [ 1823.462581] ? do_syscall_64+0x8c/0x800 [ 1823.462594] ? do_syscall_64+0x8c/0x800 [ 1823.462612] __x64_sys_sendfile64+0x1f8/0x240 [ 1823.462628] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1823.462643] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1823.462662] do_syscall_64+0x1a3/0x800 [ 1823.479719] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1823.479736] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1823.479756] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1823.479780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1823.502299] RIP: 0033:0x458099 [ 1823.502313] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1823.502321] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1823.502335] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1823.502343] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1823.502351] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1823.502359] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1823.502367] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:20 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20080, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000040)={0xfff, 0x4, [0x81]}) close(r0) 03:38:20 executing program 3 (fault-call:5 fault-nth:15): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1823.741884] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1823.749944] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:20 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:20 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000240)="1440d903b1f6f42761afdf7761a03d17051053b9182ff3479af7f2b28c429ebebc64eb909a10cae109eab850873db70af84ebd7d521334581d92e6fe13b056c7f39d1f536d8b0a24bee3d593bdad688d7ceeefc560d97d54fcc8f066811d67f8cd6ce97289670a14bc989fe6022a54417524dd50072ea2b51d347c7f1ed36e71c686ce346340cfe9f1c7485043033940a6d63588c665b8c91a5d022b322b049cb94c9de3c7", 0xa5}], 0x1, 0x4) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) fchmod(r1, 0x6) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1823.808291] FAULT_INJECTION: forcing a failure. [ 1823.808291] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:38:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x2) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) [ 1823.912274] CPU: 1 PID: 11748 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1823.919569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1823.928919] Call Trace: [ 1823.931513] dump_stack+0x1db/0x2d0 [ 1823.935153] ? dump_stack_print_info.cold+0x20/0x20 [ 1823.940179] ? kernel_text_address+0x73/0xf0 [ 1823.944600] should_fail.cold+0xa/0x15 [ 1823.948601] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1823.953715] ? arch_local_save_flags+0x50/0x50 [ 1823.958302] ? lock_release+0xc40/0xc40 03:38:20 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x1d0, r2, 0x120, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffffffffffffff38}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3d}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xbe9}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x40}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7f}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8cf}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x4000040}, 0x8000) close(r0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10000, 0x0) ioctl$KDADDIO(r3, 0x4b34, 0x9) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') [ 1823.962312] ? rcu_pm_notify+0xd0/0xd0 [ 1823.966216] should_fail_alloc_page+0x50/0x60 [ 1823.970747] __alloc_pages_nodemask+0x323/0xdc0 [ 1823.975428] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1823.980462] ? __kmalloc_node+0x3d/0x70 [ 1823.984468] ? rcu_read_lock_sched_held+0x110/0x130 [ 1823.989484] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1823.995025] alloc_pages_current+0x107/0x210 [ 1823.999462] push_pipe+0x3fc/0x7a0 [ 1824.003025] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1824.003040] ? __kernel_text_address+0xd/0x40 [ 1824.003057] ? iov_iter_revert+0xaa0/0xaa0 [ 1824.016744] ? save_stack+0xa9/0xd0 [ 1824.020475] ? save_stack+0x45/0xd0 [ 1824.020489] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1824.020501] ? kasan_kmalloc+0x9/0x10 [ 1824.020513] ? __kmalloc+0x15c/0x740 [ 1824.020526] ? alloc_pipe_info+0x286/0x580 [ 1824.036719] ? splice_direct_to_actor+0x795/0x9d0 [ 1824.036733] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1824.036750] ? iov_iter_pipe+0xba/0x2f0 [ 1824.045813] default_file_splice_read+0x1b1/0xac0 [ 1824.045828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.045851] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1824.045864] ? iter_file_splice_write+0xfc0/0xfc0 [ 1824.045877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.045887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.045903] ? check_preemption_disabled+0x48/0x290 [ 1824.091364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.091383] ? fsnotify+0x4f5/0xed0 [ 1824.091397] ? debug_mutex_init+0x2d/0x60 [ 1824.104706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.104719] ? __fsnotify_parent+0xe2/0x450 [ 1824.104735] ? fsnotify_first_mark+0x350/0x350 [ 1824.104745] ? init_wait_entry+0x1c0/0x1c0 [ 1824.104754] ? __fget+0x472/0x710 [ 1824.104766] ? alloc_pipe_info+0x286/0x580 [ 1824.104785] ? security_file_permission+0x94/0x320 [ 1824.104800] ? rw_verify_area+0x118/0x360 [ 1824.104812] ? iter_file_splice_write+0xfc0/0xfc0 [ 1824.104826] do_splice_to+0x12a/0x190 [ 1824.104843] splice_direct_to_actor+0x31b/0x9d0 [ 1824.104856] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1824.104876] ? do_splice_to+0x190/0x190 03:38:21 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x50040) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 1824.162328] ? rw_verify_area+0x118/0x360 [ 1824.166474] do_splice_direct+0x2c7/0x420 [ 1824.170622] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1824.175482] ? rw_verify_area+0x118/0x360 [ 1824.179631] do_sendfile+0x61a/0xe60 [ 1824.183356] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1824.187944] ? fput+0x128/0x1a0 [ 1824.191254] ? do_syscall_64+0x8c/0x800 [ 1824.195266] ? do_syscall_64+0x8c/0x800 [ 1824.199259] __x64_sys_sendfile64+0x1f8/0x240 [ 1824.203781] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1824.208393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1824.213165] do_syscall_64+0x1a3/0x800 [ 1824.217054] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1824.222010] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1824.227021] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1824.231863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1824.237135] RIP: 0033:0x458099 [ 1824.240307] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1824.259197] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1824.266880] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1824.274136] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1824.281401] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1824.288783] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1824.296050] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\b\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:21 executing program 3 (fault-call:5 fault-nth:16): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1824.397724] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:21 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37595d4efc1fba6ffd97508a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) [ 1824.471839] FAULT_INJECTION: forcing a failure. [ 1824.471839] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1824.518934] CPU: 1 PID: 11788 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1824.526232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1824.535586] Call Trace: [ 1824.538179] dump_stack+0x1db/0x2d0 [ 1824.541812] ? dump_stack_print_info.cold+0x20/0x20 [ 1824.546830] ? kernel_text_address+0x73/0xf0 [ 1824.551245] should_fail.cold+0xa/0x15 [ 1824.555146] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1824.560272] ? arch_local_save_flags+0x50/0x50 [ 1824.564852] ? lock_release+0xc40/0xc40 [ 1824.568829] ? rcu_pm_notify+0xd0/0xd0 [ 1824.572749] should_fail_alloc_page+0x50/0x60 [ 1824.577241] __alloc_pages_nodemask+0x323/0xdc0 [ 1824.581912] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1824.586936] ? __kmalloc_node+0x3d/0x70 [ 1824.590921] ? rcu_read_lock_sched_held+0x110/0x130 [ 1824.595933] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1824.601474] alloc_pages_current+0x107/0x210 [ 1824.605881] push_pipe+0x3fc/0x7a0 [ 1824.609447] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1824.614461] ? __kernel_text_address+0xd/0x40 [ 1824.618960] ? iov_iter_revert+0xaa0/0xaa0 [ 1824.623204] ? save_stack+0xa9/0xd0 [ 1824.626828] ? save_stack+0x45/0xd0 [ 1824.630449] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1824.635547] ? kasan_kmalloc+0x9/0x10 [ 1824.639365] ? __kmalloc+0x15c/0x740 [ 1824.643074] ? alloc_pipe_info+0x286/0x580 [ 1824.647309] ? splice_direct_to_actor+0x795/0x9d0 [ 1824.652155] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1824.657167] ? iov_iter_pipe+0xba/0x2f0 [ 1824.661148] default_file_splice_read+0x1b1/0xac0 [ 1824.665986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.671528] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1824.676805] ? iter_file_splice_write+0xfc0/0xfc0 [ 1824.681648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.687183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.692720] ? check_preemption_disabled+0x48/0x290 [ 1824.697742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.703277] ? fsnotify+0x4f5/0xed0 [ 1824.706906] ? debug_mutex_init+0x2d/0x60 [ 1824.711056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.711071] ? __fsnotify_parent+0xe2/0x450 [ 1824.711093] ? fsnotify_first_mark+0x350/0x350 [ 1824.711105] ? init_wait_entry+0x1c0/0x1c0 [ 1824.711118] ? __fget+0x472/0x710 [ 1824.729736] ? alloc_pipe_info+0x286/0x580 [ 1824.729763] ? security_file_permission+0x94/0x320 [ 1824.729782] ? rw_verify_area+0x118/0x360 [ 1824.729796] ? iter_file_splice_write+0xfc0/0xfc0 [ 1824.751323] do_splice_to+0x12a/0x190 [ 1824.755139] splice_direct_to_actor+0x31b/0x9d0 [ 1824.759806] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1824.764656] ? do_splice_to+0x190/0x190 [ 1824.768732] ? rw_verify_area+0x118/0x360 [ 1824.772887] do_splice_direct+0x2c7/0x420 [ 1824.777036] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1824.781896] ? rw_verify_area+0x118/0x360 [ 1824.786049] do_sendfile+0x61a/0xe60 [ 1824.789778] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1824.794490] ? fput+0x128/0x1a0 [ 1824.797771] ? do_syscall_64+0x8c/0x800 [ 1824.801746] ? do_syscall_64+0x8c/0x800 [ 1824.805726] __x64_sys_sendfile64+0x1f8/0x240 [ 1824.810225] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1824.814818] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1824.819580] do_syscall_64+0x1a3/0x800 [ 1824.823471] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1824.828511] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1824.833533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1824.838384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1824.843568] RIP: 0033:0x458099 [ 1824.846766] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:38:21 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:38:21 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) socket(0x1e, 0x4, 0x0) r0 = socket(0x1e, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) write(r0, &(0x7f0000000180)="8c08cfec87ac2b59ca021be4edf4db305048830ef1f998e0a0470302523d3dc0e29de96cff8a3dde825f9a429e464e56db90b1c6428dc76ce3ee81dbc16ff436d601", 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x2, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000640)="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", 0x1a6}], 0x293, 0x0) 03:38:21 executing program 3 (fault-call:5 fault-nth:17): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1824.865651] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1824.873438] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1824.880718] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1824.888094] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1824.895359] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1824.902633] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1824.945498] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1824.987303] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02`\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:21 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x301, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2081d4beae1e42a1}, 0x4000) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x40002) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f0000000040)=0x2, 0x4) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r3) 03:38:21 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1825.087395] FAULT_INJECTION: forcing a failure. [ 1825.087395] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1825.138698] CPU: 1 PID: 11811 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1825.146020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1825.155370] Call Trace: [ 1825.157976] dump_stack+0x1db/0x2d0 [ 1825.161630] ? dump_stack_print_info.cold+0x20/0x20 [ 1825.166652] ? kernel_text_address+0x73/0xf0 [ 1825.171092] should_fail.cold+0xa/0x15 [ 1825.174982] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1825.175003] ? arch_local_save_flags+0x50/0x50 [ 1825.175016] ? lock_release+0xc40/0xc40 [ 1825.184689] ? rcu_pm_notify+0xd0/0xd0 [ 1825.184715] should_fail_alloc_page+0x50/0x60 [ 1825.184728] __alloc_pages_nodemask+0x323/0xdc0 [ 1825.184749] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1825.184775] ? __kmalloc_node+0x3d/0x70 [ 1825.184793] ? rcu_read_lock_sched_held+0x110/0x130 [ 1825.184809] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1825.221001] overlayfs: './file0' not a directory [ 1825.221421] alloc_pages_current+0x107/0x210 [ 1825.230554] push_pipe+0x3fc/0x7a0 [ 1825.234097] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1825.239023] ? __kernel_text_address+0xd/0x40 [ 1825.243541] ? iov_iter_revert+0xaa0/0xaa0 [ 1825.243577] ? save_stack+0xa9/0xd0 [ 1825.243590] ? save_stack+0x45/0xd0 [ 1825.243603] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1825.243614] ? kasan_kmalloc+0x9/0x10 [ 1825.243625] ? __kmalloc+0x15c/0x740 [ 1825.243638] ? alloc_pipe_info+0x286/0x580 [ 1825.243650] ? splice_direct_to_actor+0x795/0x9d0 [ 1825.243662] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1825.243674] ? iov_iter_pipe+0xba/0x2f0 [ 1825.243690] default_file_splice_read+0x1b1/0xac0 [ 1825.251654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.251677] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1825.251692] ? iter_file_splice_write+0xfc0/0xfc0 [ 1825.264320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.264334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.264348] ? check_preemption_disabled+0x48/0x290 [ 1825.264367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.272274] ? fsnotify+0x4f5/0xed0 [ 1825.272295] ? debug_mutex_init+0x2d/0x60 [ 1825.272313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.272326] ? __fsnotify_parent+0xe2/0x450 [ 1825.272342] ? fsnotify_first_mark+0x350/0x350 [ 1825.272354] ? init_wait_entry+0x1c0/0x1c0 [ 1825.272364] ? __fget+0x472/0x710 [ 1825.272381] ? alloc_pipe_info+0x286/0x580 [ 1825.282207] ? security_file_permission+0x94/0x320 [ 1825.282227] ? rw_verify_area+0x118/0x360 [ 1825.282239] ? iter_file_splice_write+0xfc0/0xfc0 [ 1825.282254] do_splice_to+0x12a/0x190 [ 1825.282271] splice_direct_to_actor+0x31b/0x9d0 [ 1825.282291] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1825.282309] ? do_splice_to+0x190/0x190 [ 1825.291087] ? rw_verify_area+0x118/0x360 [ 1825.291104] do_splice_direct+0x2c7/0x420 [ 1825.291122] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1825.291162] ? rw_verify_area+0x118/0x360 [ 1825.301961] do_sendfile+0x61a/0xe60 [ 1825.301988] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1825.302005] ? fput+0x128/0x1a0 [ 1825.302021] ? do_syscall_64+0x8c/0x800 [ 1825.312448] ? do_syscall_64+0x8c/0x800 [ 1825.312467] __x64_sys_sendfile64+0x1f8/0x240 [ 1825.312484] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1825.312499] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1825.312520] do_syscall_64+0x1a3/0x800 [ 1825.312536] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1825.312551] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1825.312569] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1825.323080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1825.323092] RIP: 0033:0x458099 [ 1825.323105] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1825.323112] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1825.323125] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1825.323133] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1825.323141] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1825.323148] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1825.323156] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x4) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:22 executing program 5 (fault-call:4 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:38:22 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) fstatfs(r0, &(0x7f0000000000)=""/29) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000000c0)={0xf002, 0x100000}) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x12b280, 0x82) sendmsg$nl_crypto(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x108}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 03:38:22 executing program 3 (fault-call:5 fault-nth:18): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1825.653104] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1825.680252] FAULT_INJECTION: forcing a failure. [ 1825.680252] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:38:22 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1825.742677] CPU: 0 PID: 11841 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1825.749987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1825.759333] Call Trace: [ 1825.761919] dump_stack+0x1db/0x2d0 [ 1825.765585] ? dump_stack_print_info.cold+0x20/0x20 [ 1825.770598] ? kernel_text_address+0x73/0xf0 [ 1825.775026] should_fail.cold+0xa/0x15 [ 1825.778911] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1825.784024] ? arch_local_save_flags+0x50/0x50 [ 1825.788602] ? lock_release+0xc40/0xc40 [ 1825.792576] ? rcu_pm_notify+0xd0/0xd0 [ 1825.796470] should_fail_alloc_page+0x50/0x60 [ 1825.800975] __alloc_pages_nodemask+0x323/0xdc0 [ 1825.805659] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1825.810682] ? __kmalloc_node+0x3d/0x70 [ 1825.814655] ? rcu_read_lock_sched_held+0x110/0x130 [ 1825.819673] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1825.825310] alloc_pages_current+0x107/0x210 [ 1825.828341] overlayfs: failed to resolve './file1': -2 [ 1825.829718] push_pipe+0x3fc/0x7a0 03:38:22 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000000c0)) [ 1825.829743] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1825.829756] ? __kernel_text_address+0xd/0x40 [ 1825.829774] ? iov_iter_revert+0xaa0/0xaa0 [ 1825.852171] ? save_stack+0xa9/0xd0 [ 1825.855797] ? save_stack+0x45/0xd0 [ 1825.859409] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1825.864513] ? kasan_kmalloc+0x9/0x10 [ 1825.868422] ? __kmalloc+0x15c/0x740 [ 1825.872134] ? alloc_pipe_info+0x286/0x580 [ 1825.876370] ? splice_direct_to_actor+0x795/0x9d0 [ 1825.876383] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1825.876398] ? iov_iter_pipe+0xba/0x2f0 [ 1825.876417] default_file_splice_read+0x1b1/0xac0 [ 1825.876431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.876453] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1825.886297] ? iter_file_splice_write+0xfc0/0xfc0 [ 1825.886312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.886324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.886339] ? check_preemption_disabled+0x48/0x290 [ 1825.886360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.886373] ? fsnotify+0x4f5/0xed0 [ 1825.886384] ? debug_mutex_init+0x2d/0x60 03:38:22 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) pwritev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a9d1a5c0a23c075a26735aea548cb53450c8c73a7d58c861afa591572ab872cb8947455f39acd12fb1fec01651b891c82631721d0a525c56be4cf6c02f340d7d411efd4faa5ddceaa82f4f572571a442ad493523014192d67cd6143f0c248f6e4f3d5406d0ac5530929230cbdcf266c8d8c92df093", 0x75}, {&(0x7f00000001c0)="6abeca6d9d110a293caf45cf3c760603d1e32d05a6d60d3fb9d54ad74375302d0b835e792f2858029deb78d9ea94ff6a7969d85864f1da163555e9f0b3dc0cc322bf6a707033f1fe8f1ff0dfc88db91db001822b99b56bb2bbd16ec49ebcba6900026015f52886c4ee8a51c754d909a2", 0x70}], 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x42000) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0xffffffffffffff96, "e472203acea1ae56d89620f2313906ca60d1e866b15961ca420400d1338bce26e2f1badbe5"}, &(0x7f0000000080)=0x11) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={r2, 0xff}, &(0x7f0000000100)=0x8) [ 1825.886402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.945724] ? __fsnotify_parent+0xe2/0x450 [ 1825.950049] ? fsnotify_first_mark+0x350/0x350 [ 1825.954635] ? init_wait_entry+0x1c0/0x1c0 [ 1825.958866] ? __fget+0x472/0x710 [ 1825.962324] ? alloc_pipe_info+0x286/0x580 [ 1825.966572] ? security_file_permission+0x94/0x320 [ 1825.971510] ? rw_verify_area+0x118/0x360 [ 1825.975654] ? iter_file_splice_write+0xfc0/0xfc0 [ 1825.980506] do_splice_to+0x12a/0x190 [ 1825.984314] splice_direct_to_actor+0x31b/0x9d0 [ 1825.988970] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1825.993807] ? do_splice_to+0x190/0x190 [ 1825.997766] ? rw_verify_area+0x118/0x360 [ 1826.001895] do_splice_direct+0x2c7/0x420 [ 1826.006024] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1826.010867] ? rw_verify_area+0x118/0x360 [ 1826.015003] do_sendfile+0x61a/0xe60 [ 1826.018725] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1826.023299] ? fput+0x128/0x1a0 [ 1826.026577] ? do_syscall_64+0x8c/0x800 [ 1826.030538] ? do_syscall_64+0x8c/0x800 [ 1826.034513] __x64_sys_sendfile64+0x1f8/0x240 [ 1826.038988] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1826.043550] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1826.048289] do_syscall_64+0x1a3/0x800 [ 1826.052158] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1826.057067] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1826.062077] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1826.066918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1826.072097] RIP: 0033:0x458099 [ 1826.072111] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:38:22 executing program 3 (fault-call:5 fault-nth:19): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1826.072119] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1826.072132] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1826.072140] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1826.072148] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1826.072156] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1826.072164] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:38:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\xc4\x01\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:23 executing program 5: getpeername(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="8d000000e34c09ece618d08aafd4afdec564cb35c27129e6eda62a57b584ba651ad739ea3cb82783a28cb1e22093778f34f84e8396b467fec3462ef948c47dd2e8be89b61692246eca29bd379652cf8bcee3de145444d9fa34b44070a13e77c7c6eb1a914faaf537a620616020851fee3c7422f11ca4f00d837d9f1a07dec30ee69969dc768f570f2a131bc4c80ef07c44"], &(0x7f0000000100)=0x95) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1, 0x1}, 0x8) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x4d30000000) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000280)={r1, 0x8, 0x30}, &(0x7f00000002c0)=0xc) close(r2) [ 1826.276750] overlayfs: failed to resolve './file1': -2 [ 1826.283448] FAULT_INJECTION: forcing a failure. [ 1826.283448] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1826.354881] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1826.362302] CPU: 1 PID: 11869 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1826.369511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1826.378854] Call Trace: [ 1826.381441] dump_stack+0x1db/0x2d0 [ 1826.385071] ? dump_stack_print_info.cold+0x20/0x20 [ 1826.390089] ? kernel_text_address+0x73/0xf0 [ 1826.394503] should_fail.cold+0xa/0x15 [ 1826.398384] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1826.403487] ? arch_local_save_flags+0x50/0x50 [ 1826.408066] ? lock_release+0xc40/0xc40 [ 1826.412041] ? rcu_pm_notify+0xd0/0xd0 [ 1826.415935] should_fail_alloc_page+0x50/0x60 [ 1826.420424] __alloc_pages_nodemask+0x323/0xdc0 [ 1826.425196] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1826.430232] ? __kmalloc_node+0x3d/0x70 [ 1826.434321] ? rcu_read_lock_sched_held+0x110/0x130 [ 1826.439332] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1826.444864] alloc_pages_current+0x107/0x210 [ 1826.449269] push_pipe+0x3fc/0x7a0 [ 1826.452808] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1826.457744] ? __kernel_text_address+0xd/0x40 [ 1826.462242] ? iov_iter_revert+0xaa0/0xaa0 [ 1826.466484] ? save_stack+0xa9/0xd0 [ 1826.470112] ? save_stack+0x45/0xd0 [ 1826.473735] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1826.478832] ? kasan_kmalloc+0x9/0x10 [ 1826.482627] ? __kmalloc+0x15c/0x740 [ 1826.486336] ? alloc_pipe_info+0x286/0x580 [ 1826.490576] ? splice_direct_to_actor+0x795/0x9d0 [ 1826.495425] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1826.495439] ? iov_iter_pipe+0xba/0x2f0 [ 1826.495462] default_file_splice_read+0x1b1/0xac0 [ 1826.495474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1826.495492] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1826.504441] ? iter_file_splice_write+0xfc0/0xfc0 [ 1826.504456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1826.504468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1826.504482] ? check_preemption_disabled+0x48/0x290 [ 1826.504503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1826.504516] ? fsnotify+0x4f5/0xed0 [ 1826.504529] ? debug_mutex_init+0x2d/0x60 [ 1826.504547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1826.504558] ? __fsnotify_parent+0xe2/0x450 [ 1826.504573] ? fsnotify_first_mark+0x350/0x350 [ 1826.536011] ? init_wait_entry+0x1c0/0x1c0 [ 1826.536024] ? __fget+0x472/0x710 [ 1826.536042] ? alloc_pipe_info+0x286/0x580 [ 1826.536068] ? security_file_permission+0x94/0x320 [ 1826.536086] ? rw_verify_area+0x118/0x360 [ 1826.536099] ? iter_file_splice_write+0xfc0/0xfc0 [ 1826.536114] do_splice_to+0x12a/0x190 [ 1826.536130] splice_direct_to_actor+0x31b/0x9d0 [ 1826.536144] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1826.536164] ? do_splice_to+0x190/0x190 [ 1826.560024] ? rw_verify_area+0x118/0x360 [ 1826.560042] do_splice_direct+0x2c7/0x420 [ 1826.560058] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1826.594799] ? rw_verify_area+0x118/0x360 [ 1826.594818] do_sendfile+0x61a/0xe60 [ 1826.594843] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1826.594860] ? fput+0x128/0x1a0 [ 1826.594875] ? do_syscall_64+0x8c/0x800 [ 1826.594890] ? do_syscall_64+0x8c/0x800 [ 1826.616272] __x64_sys_sendfile64+0x1f8/0x240 [ 1826.616289] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1826.616304] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1826.662610] do_syscall_64+0x1a3/0x800 [ 1826.666586] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1826.671602] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1826.676623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1826.681474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1826.686656] RIP: 0033:0x458099 03:38:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0xdc, r3, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xc7}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nlmon0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4000001}, 0x20000800) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000280)) 03:38:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x8) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:23 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:23 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0xec6, 0x801) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x9, 0x20}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={r2, 0x9}, 0x8) close(r0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20041, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20840}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x200, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 1826.689840] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1826.708727] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1826.708740] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1826.708748] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1826.708755] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1826.708763] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1826.708770] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:23 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xe1, 0x200480) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) 03:38:23 executing program 3 (fault-call:5 fault-nth:20): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1826.935086] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:23 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) 03:38:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x82+?\x05\x0f\xf6') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget(0x3, 0x1, 0x2) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000080)=""/61) close(r0) [ 1826.983341] overlayfs: failed to resolve './file1': -2 03:38:23 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x03\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1827.564395] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 03:38:24 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x4) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0xfffffffffffffffe}, &(0x7f0000000080)=0x8) getsockname$packet(r1, &(0x7f0000000840)={0x11, 0x0, 0x0}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000940)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)=ANY=[@ANYBLOB="240000ac02dfcc3526478500ffdbdf258da7f295", @ANYRES32=r3, @ANYBLOB="0e0000000f00f3ffe8fff3ff"], 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x5, 0xb31345fee0faf556, 0xb58a, 0x7, r2}, &(0x7f0000000100)=0x10) [ 1827.572087] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1827.579358] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1827.586610] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1827.594037] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1827.601390] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:24 executing program 3 (fault-call:5 fault-nth:21): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1827.724081] overlayfs: failed to resolve './file1': -2 [ 1827.746268] FAULT_INJECTION: forcing a failure. [ 1827.746268] name failslab, interval 1, probability 0, space 0, times 0 [ 1827.758418] CPU: 0 PID: 11943 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1827.765761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1827.775094] Call Trace: [ 1827.777669] dump_stack+0x1db/0x2d0 [ 1827.781479] ? dump_stack_print_info.cold+0x20/0x20 [ 1827.786487] ? __mutex_lock+0x622/0x1670 [ 1827.790536] ? default_file_splice_read+0x50c/0xac0 [ 1827.795535] should_fail.cold+0xa/0x15 [ 1827.799417] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1827.804513] ? ___might_sleep+0x1e7/0x310 [ 1827.808638] ? arch_local_save_flags+0x50/0x50 [ 1827.813204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1827.818727] __should_failslab+0x121/0x190 [ 1827.822942] should_failslab+0x9/0x14 [ 1827.826722] kmem_cache_alloc_node_trace+0x270/0x720 [ 1827.831807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1827.837335] ? __fsnotify_parent+0xe2/0x450 [ 1827.841648] ? usercopy_warn+0x110/0x110 [ 1827.845796] __kmalloc_node+0x3d/0x70 [ 1827.849677] kvmalloc_node+0x68/0x100 [ 1827.853475] seq_read+0x832/0x1130 [ 1827.856999] ? rw_verify_area+0x118/0x360 [ 1827.861137] do_iter_read+0x4a9/0x660 [ 1827.864917] ? dup_iter+0x260/0x260 [ 1827.868539] vfs_readv+0x175/0x1c0 [ 1827.872070] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1827.877429] ? iov_iter_revert+0xaa0/0xaa0 [ 1827.881649] ? save_stack+0xa9/0xd0 [ 1827.885254] ? save_stack+0x45/0xd0 [ 1827.888861] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1827.893939] ? kasan_kmalloc+0x9/0x10 [ 1827.897803] ? __kmalloc+0x15c/0x740 [ 1827.901495] ? alloc_pipe_info+0x286/0x580 [ 1827.905705] ? splice_direct_to_actor+0x795/0x9d0 [ 1827.910535] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1827.915530] ? iov_iter_pipe+0xba/0x2f0 [ 1827.919486] default_file_splice_read+0x50c/0xac0 [ 1827.924307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1827.929844] ? iter_file_splice_write+0xfc0/0xfc0 [ 1827.934672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1827.940183] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1827.945698] ? check_preemption_disabled+0x48/0x290 [ 1827.950698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1827.956218] ? fsnotify+0x4f5/0xed0 [ 1827.959842] ? debug_mutex_init+0x2d/0x60 [ 1827.963990] ? security_file_permission+0x94/0x320 [ 1827.968912] ? rw_verify_area+0x118/0x360 [ 1827.973058] ? iter_file_splice_write+0xfc0/0xfc0 [ 1827.977880] do_splice_to+0x12a/0x190 [ 1827.981661] splice_direct_to_actor+0x31b/0x9d0 [ 1827.986308] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1827.991240] ? do_splice_to+0x190/0x190 [ 1827.995206] ? rw_verify_area+0x118/0x360 [ 1827.999348] do_splice_direct+0x2c7/0x420 [ 1828.003474] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1828.008306] ? rw_verify_area+0x118/0x360 [ 1828.012441] do_sendfile+0x61a/0xe60 [ 1828.016141] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1828.020703] ? fput+0x128/0x1a0 [ 1828.023960] ? do_syscall_64+0x8c/0x800 [ 1828.027912] ? do_syscall_64+0x8c/0x800 [ 1828.031866] __x64_sys_sendfile64+0x1f8/0x240 [ 1828.036346] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1828.040905] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1828.045645] do_syscall_64+0x1a3/0x800 [ 1828.049515] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1828.054422] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1828.059429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1828.064257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1828.069422] RIP: 0033:0x458099 [ 1828.072678] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1828.091556] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1828.099256] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1828.106502] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1828.113749] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1828.120997] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1828.128243] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x1000000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02x\x03\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:25 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0xa3f, 0x2, 0x7, 0x401, 0x5, 0xfffffffffffffffc, 0xfe9f, 0x8000, 0x402, 0xfffffffffffffe01, 0x81}, 0xb) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r2}, 0x8) 03:38:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:38:25 executing program 3 (fault-call:5 fault-nth:22): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1828.192850] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:25 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1828.280033] FAULT_INJECTION: forcing a failure. [ 1828.280033] name failslab, interval 1, probability 0, space 0, times 0 03:38:25 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x800, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x15c, 0x14, 0x7, 0x100, 0x70bd2d, 0x25dfdbfd, {0xf, 0x0, 0x1}, [@generic="85aec6fe1dc15a91998a91110cc33c2a841da2d03b98c30b7b06b9f666e13c5c2a914303418e6ae5e0b4e2cf98df830e46a3db8f5d59926d1df69e5b102efcc275f797fa115c749dc456f897e134d864567a20370a0b560066a10ff29a3234d94825ad7685a83aaeab3ecdcc991f6e456b8d2fbef2d86c1d27c467256cbbadb15bfaf5a0354c6a0274b8d139ff0872b6cee438cb97775bcbd48bad9388552880894ea96c014808da6c023f8754c6d3cdacb3cca03e769306a1b4887ddec0824062826d76f1", @generic="bf13300a9c67f860c80a23b7bea1b55a0cd2c4d131c942aaea17801791f5b680a04201f1765953a63c268147c1c20e0c560fcf", @generic="4ac30928edb9f0ce2ae5c78f2275bb67505affc242f2945b2988a067ec22c56df0e729e21739b9c52247e47c6446db705aaa90e1d3b7ac9c89959784045e146497738aa0308b5d9d2feb47", @typed={0x4, 0x8c}]}, 0x15c}, 0x1, 0x0, 0x0, 0x8080}, 0x804) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) [ 1828.322696] CPU: 0 PID: 11954 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1828.329905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1828.339262] Call Trace: [ 1828.341853] dump_stack+0x1db/0x2d0 [ 1828.345482] ? dump_stack_print_info.cold+0x20/0x20 [ 1828.350498] ? save_stack+0x45/0xd0 [ 1828.354145] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1828.359248] ? kasan_slab_alloc+0xf/0x20 [ 1828.363319] ? kmem_cache_alloc_node+0x144/0x710 [ 1828.368077] ? __alloc_skb+0xf4/0x730 03:38:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @initdev}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f00000000c0)=0xe8) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x4000, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xdd2a}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xfffffffffffeffff}}], [{@measure='measure'}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 1828.371875] ? sock_alloc_send_pskb+0x8c9/0xad0 [ 1828.376547] should_fail.cold+0xa/0x15 [ 1828.380438] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1828.385547] ? ___might_sleep+0x1e7/0x310 [ 1828.389702] ? arch_local_save_flags+0x50/0x50 [ 1828.394286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1828.399831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1828.405364] __should_failslab+0x121/0x190 [ 1828.409580] should_failslab+0x9/0x14 [ 1828.413363] kmem_cache_alloc_node_trace+0x270/0x720 [ 1828.418454] ? __alloc_skb+0xf4/0x730 [ 1828.422236] __kmalloc_node_track_caller+0x3d/0x70 [ 1828.427151] __kmalloc_reserve.isra.0+0x40/0xe0 [ 1828.431815] __alloc_skb+0x12d/0x730 [ 1828.435517] ? skb_scrub_packet+0x440/0x440 [ 1828.439823] ? add_lock_to_list.isra.0+0x450/0x450 [ 1828.444730] ? mark_held_locks+0x100/0x100 [ 1828.447030] overlayfs: failed to resolve './file1': -2 [ 1828.448952] ? unix_stream_sendpage+0x335/0xdc0 [ 1828.448973] alloc_skb_with_frags+0xef/0x720 [ 1828.448986] ? unix_stream_sendpage+0x2ef/0xdc0 [ 1828.449000] ? find_held_lock+0x35/0x120 [ 1828.471992] ? skb_complete_wifi_ack+0x1b0/0x1b0 [ 1828.476744] sock_alloc_send_pskb+0x8c9/0xad0 [ 1828.481237] ? unix_stream_sendpage+0x2e3/0xdc0 [ 1828.485889] ? sock_wmalloc+0x1f0/0x1f0 [ 1828.489860] ? wait_for_completion+0x810/0x810 [ 1828.494622] ? do_raw_spin_trylock+0x270/0x270 [ 1828.499273] ? vfs_readv+0x10c/0x1c0 [ 1828.502996] unix_stream_sendpage+0x312/0xdc0 [ 1828.507499] ? unix_find_other+0x5e0/0x5e0 [ 1828.511724] ? kvfree+0x61/0x70 [ 1828.514986] kernel_sendpage+0x95/0xf0 [ 1828.518859] ? unix_find_other+0x5e0/0x5e0 [ 1828.523090] sock_sendpage+0x8b/0xc0 [ 1828.526793] ? kernel_sendpage+0xf0/0xf0 [ 1828.530845] pipe_to_sendpage+0x2b4/0x390 [ 1828.534979] ? direct_splice_actor+0x1a0/0x1a0 [ 1828.539539] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1828.545056] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1828.550489] __splice_from_pipe+0x39a/0x7e0 [ 1828.554797] ? direct_splice_actor+0x1a0/0x1a0 [ 1828.559369] ? direct_splice_actor+0x1a0/0x1a0 [ 1828.563931] splice_from_pipe+0x1ea/0x310 [ 1828.568065] ? splice_shrink_spd+0xd0/0xd0 [ 1828.572305] ? security_file_permission+0x94/0x320 [ 1828.577323] generic_splice_sendpage+0x3c/0x50 [ 1828.581889] ? splice_from_pipe+0x310/0x310 [ 1828.586197] direct_splice_actor+0x126/0x1a0 [ 1828.590597] splice_direct_to_actor+0x3be/0x9d0 [ 1828.595265] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1828.600099] ? do_splice_to+0x190/0x190 [ 1828.604152] ? rw_verify_area+0x118/0x360 [ 1828.608288] do_splice_direct+0x2c7/0x420 [ 1828.612419] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1828.617262] ? rw_verify_area+0x118/0x360 [ 1828.621402] do_sendfile+0x61a/0xe60 [ 1828.625106] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1828.629691] ? fput+0x128/0x1a0 [ 1828.632964] ? do_syscall_64+0x8c/0x800 [ 1828.636919] ? do_syscall_64+0x8c/0x800 [ 1828.640873] __x64_sys_sendfile64+0x1f8/0x240 [ 1828.645363] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1828.649924] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1828.654661] do_syscall_64+0x1a3/0x800 [ 1828.658541] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1828.663456] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1828.668454] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1828.673281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1828.678454] RIP: 0033:0x458099 [ 1828.681631] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1828.700602] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1828.708316] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1828.715567] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 03:38:25 executing program 3 (fault-call:5 fault-nth:23): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1828.722824] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1828.730080] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1828.737333] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1828.829975] FAULT_INJECTION: forcing a failure. [ 1828.829975] name failslab, interval 1, probability 0, space 0, times 0 [ 1828.874350] CPU: 1 PID: 11981 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1828.881557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1828.890901] Call Trace: [ 1828.893485] dump_stack+0x1db/0x2d0 [ 1828.897133] ? dump_stack_print_info.cold+0x20/0x20 [ 1828.902159] should_fail.cold+0xa/0x15 [ 1828.906051] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1828.911161] ? ___might_sleep+0x1e7/0x310 [ 1828.915307] ? arch_local_save_flags+0x50/0x50 [ 1828.919904] __should_failslab+0x121/0x190 [ 1828.924135] should_failslab+0x9/0x14 [ 1828.927930] kmem_cache_alloc_node_trace+0x270/0x720 [ 1828.933050] __kmalloc_node+0x3d/0x70 [ 1828.936858] kvmalloc_node+0x68/0x100 [ 1828.940674] iov_iter_get_pages_alloc+0x87f/0x15a0 [ 1828.945605] ? put_pid+0x25/0x30 [ 1828.948986] ? iov_iter_revert+0xaa0/0xaa0 [ 1828.953236] ? unix_find_other+0x5e0/0x5e0 [ 1828.957477] ? kvfree+0x61/0x70 [ 1828.960753] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1828.965779] ? iov_iter_pipe+0xba/0x2f0 [ 1828.969758] default_file_splice_read+0x1b1/0xac0 [ 1828.974598] ? unix_find_other+0x5e0/0x5e0 [ 1828.978837] ? sock_sendpage+0x8b/0xc0 [ 1828.982732] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1828.988283] ? iter_file_splice_write+0xfc0/0xfc0 [ 1828.993124] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1828.997877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1829.003420] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1829.008786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1829.014321] ? fsnotify+0x4f5/0xed0 [ 1829.017949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:38:25 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10040, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/66) close(r0) [ 1829.023626] ? __fsnotify_parent+0xe2/0x450 [ 1829.027945] ? fsnotify_first_mark+0x350/0x350 [ 1829.032522] ? splice_from_pipe+0x1f5/0x310 [ 1829.036842] ? splice_shrink_spd+0xd0/0xd0 [ 1829.041090] ? security_file_permission+0x94/0x320 [ 1829.046109] ? rw_verify_area+0x118/0x360 [ 1829.050385] ? iter_file_splice_write+0xfc0/0xfc0 [ 1829.055336] do_splice_to+0x12a/0x190 [ 1829.059128] splice_direct_to_actor+0x31b/0x9d0 [ 1829.063791] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1829.068715] ? do_splice_to+0x190/0x190 [ 1829.072689] ? rw_verify_area+0x118/0x360 [ 1829.076840] do_splice_direct+0x2c7/0x420 [ 1829.080977] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1829.085818] ? rw_verify_area+0x118/0x360 [ 1829.090068] do_sendfile+0x61a/0xe60 [ 1829.093788] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1829.098361] ? fput+0x128/0x1a0 [ 1829.101622] ? do_syscall_64+0x8c/0x800 [ 1829.105576] ? do_syscall_64+0x8c/0x800 [ 1829.109531] __x64_sys_sendfile64+0x1f8/0x240 [ 1829.114022] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1829.118594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1829.123349] do_syscall_64+0x1a3/0x800 [ 1829.127224] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1829.132235] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1829.137256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1829.142105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1829.147289] RIP: 0033:0x458099 [ 1829.150472] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1829.169356] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1829.177055] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1829.184315] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1829.186372] overlayfs: failed to resolve './file1': -2 [ 1829.191585] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1829.191594] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1829.191602] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1829.249876] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:26 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x05\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x2000000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:26 executing program 5: r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @remote}, &(0x7f0000000400)=0x10, 0x80000) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000440)) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000480), &(0x7f00000004c0)=0x4) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x58, r4, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x17da8544}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_AF={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x58}}, 0x880) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000240)={0x5, &(0x7f0000000200)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000380)={r5, 0x4, &(0x7f0000000280)=[0x4, 0xc96, 0x7a, 0x400], &(0x7f00000002c0)=[0x5, 0xfffffffffffffff9, 0x81, 0x2, 0xffff, 0x7ea, 0x7, 0x7], 0x1, 0x2, 0x400, &(0x7f0000000300)=[0x0, 0x10000], &(0x7f0000000340)=[0x1ff]}) close(r1) 03:38:26 executing program 2: r0 = socket$isdn_base(0x22, 0x3, 0x0) getsockname(r0, &(0x7f0000002980)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000002a00)=0x80) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) 03:38:26 executing program 3 (fault-call:5 fault-nth:24): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1829.486909] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1829.508029] FAULT_INJECTION: forcing a failure. [ 1829.508029] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:38:26 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1829.590931] CPU: 1 PID: 12009 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1829.598153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1829.607591] Call Trace: [ 1829.610299] dump_stack+0x1db/0x2d0 [ 1829.614028] ? dump_stack_print_info.cold+0x20/0x20 [ 1829.619052] ? kernel_text_address+0x73/0xf0 [ 1829.623466] should_fail.cold+0xa/0x15 [ 1829.627354] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1829.632456] ? arch_local_save_flags+0x50/0x50 [ 1829.637047] ? lock_release+0xc40/0xc40 [ 1829.641034] should_fail_alloc_page+0x50/0x60 [ 1829.645530] __alloc_pages_nodemask+0x323/0xdc0 [ 1829.650205] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1829.655226] ? __kmalloc_node+0x3d/0x70 [ 1829.659207] ? rcu_read_lock_sched_held+0x110/0x130 [ 1829.664222] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1829.669763] alloc_pages_current+0x107/0x210 [ 1829.674186] push_pipe+0x3fc/0x7a0 [ 1829.677748] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1829.682686] ? iov_iter_revert+0xaa0/0xaa0 [ 1829.687061] ? unix_find_other+0x5e0/0x5e0 03:38:26 executing program 2: close(0xffffffffffffffff) socket$bt_rfcomm(0x1f, 0x1000000000000, 0x3) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xc36d, 0x4400) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000040)={@default, @bcast}) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000080)=0x1963543f, 0x4) [ 1829.691290] ? kvfree+0x61/0x70 [ 1829.694564] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1829.699586] ? iov_iter_pipe+0xba/0x2f0 [ 1829.703564] default_file_splice_read+0x1b1/0xac0 [ 1829.708408] ? unix_find_other+0x5e0/0x5e0 [ 1829.712646] ? sock_sendpage+0x8b/0xc0 [ 1829.716533] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1829.722069] ? iter_file_splice_write+0xfc0/0xfc0 [ 1829.726916] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1829.731691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:38:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0xa4, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x4, @remote, 0x7ff}, @in={0x2, 0x4e24, @rand_addr=0x4}, @in6={0xa, 0x4e23, 0xffffffffffffffbd, @rand_addr="239e22690d42041e8cdc5234309aae7d", 0x3}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x7, @rand_addr="6f7542fa09ec6330e330240ac9208144"}]}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000340)={r1, 0x1965, 0x3, 0x80000000, 0x9, 0x6}, &(0x7f0000000380)=0x14) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x8, 0x200240) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x8, 0x1, 0x6, 0x38000000, 0x0, 0x6b95, 0x10000, 0x8, 0x10000, 0x80, 0x6, 0x1800000, 0x200, 0x5, 0xfffffffffffffffa, 0x0, 0x400, 0x6, 0x80000000, 0x100, 0x9, 0x100000001, 0x5, 0x8, 0x800, 0x400, 0x2, 0x40, 0x0, 0x7, 0x9, 0x80, 0x6, 0xfff, 0x6, 0xffffffff, 0x0, 0x1fa, 0x4, @perf_bp={&(0x7f0000000080), 0x8}, 0x2, 0x0, 0x1, 0x9, 0x6, 0x9, 0x9}, r2, 0x8, r3, 0x1) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$BLKBSZSET(r4, 0x40081271, &(0x7f0000000040)=0x1) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r5) [ 1829.731710] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1829.731726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1829.731739] ? fsnotify+0x4f5/0xed0 [ 1829.751750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1829.751765] ? __fsnotify_parent+0xe2/0x450 [ 1829.751782] ? fsnotify_first_mark+0x350/0x350 [ 1829.751793] ? splice_from_pipe+0x1f5/0x310 [ 1829.751810] ? splice_shrink_spd+0xd0/0xd0 [ 1829.774751] ? security_file_permission+0x94/0x320 [ 1829.779687] ? rw_verify_area+0x118/0x360 [ 1829.783842] ? iter_file_splice_write+0xfc0/0xfc0 03:38:26 executing program 3 (fault-call:5 fault-nth:25): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1829.788675] do_splice_to+0x12a/0x190 [ 1829.788692] splice_direct_to_actor+0x31b/0x9d0 [ 1829.797126] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1829.801984] ? do_splice_to+0x190/0x190 [ 1829.802004] ? rw_verify_area+0x118/0x360 [ 1829.802021] do_splice_direct+0x2c7/0x420 [ 1829.802039] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1829.802062] ? rw_verify_area+0x118/0x360 [ 1829.802079] do_sendfile+0x61a/0xe60 [ 1829.802104] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1829.802121] ? fput+0x128/0x1a0 [ 1829.802137] ? do_syscall_64+0x8c/0x800 [ 1829.802150] ? do_syscall_64+0x8c/0x800 [ 1829.802168] __x64_sys_sendfile64+0x1f8/0x240 [ 1829.802184] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1829.802198] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1829.802219] do_syscall_64+0x1a3/0x800 [ 1829.802236] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1829.802251] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1829.802270] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1829.802292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1829.802302] RIP: 0033:0x458099 03:38:26 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x81, 0x200, 0x7ff, 0x10001, 0x9, 0x2}}, 0x8) close(r0) [ 1829.802316] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1829.802323] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1829.802336] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1829.802343] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1829.802351] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1829.802358] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 03:38:26 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x8000) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000180)={0x40000000, 0x0, "34a7b610c4a34ee295e97b4c0315fad442a1cde09aa2021170074b6a9d2b4ee9", 0x362b, 0x6ca0dcc, 0x7f, 0x3f, 0x10000, 0x3, 0x35c5, 0x101, [0x6, 0x609d, 0x7ff, 0x5]}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x1e) syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 03:38:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x06\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1829.802364] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1829.838628] overlayfs: failed to resolve './file1': -2 [ 1830.070442] overlayfs: failed to resolve './file1': -2 [ 1830.084852] FAULT_INJECTION: forcing a failure. [ 1830.084852] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1830.102904] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x4000000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:27 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd93008a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:27 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8100, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="6ed8020082f70030"], &(0x7f0000000080)=0xc) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000140)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f00000000c0)=r3, 0x4) [ 1830.196117] CPU: 1 PID: 12042 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1830.203417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.212764] Call Trace: [ 1830.215350] dump_stack+0x1db/0x2d0 [ 1830.218994] ? dump_stack_print_info.cold+0x20/0x20 [ 1830.224008] ? kernel_text_address+0x73/0xf0 [ 1830.228541] should_fail.cold+0xa/0x15 [ 1830.232435] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1830.237546] ? arch_local_save_flags+0x50/0x50 [ 1830.242137] ? lock_release+0xc40/0xc40 [ 1830.246110] ? rcu_pm_notify+0xd0/0xd0 [ 1830.250003] should_fail_alloc_page+0x50/0x60 [ 1830.254494] __alloc_pages_nodemask+0x323/0xdc0 [ 1830.259161] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1830.264191] ? __kmalloc_node+0x3d/0x70 [ 1830.268166] ? rcu_read_lock_sched_held+0x110/0x130 [ 1830.273176] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1830.278726] alloc_pages_current+0x107/0x210 [ 1830.283138] push_pipe+0x3fc/0x7a0 [ 1830.286686] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1830.291620] ? iov_iter_revert+0xaa0/0xaa0 [ 1830.295855] ? unix_find_other+0x5e0/0x5e0 [ 1830.300096] ? kvfree+0x61/0x70 [ 1830.303373] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1830.308387] ? iov_iter_pipe+0xba/0x2f0 [ 1830.312365] default_file_splice_read+0x1b1/0xac0 [ 1830.317208] ? unix_find_other+0x5e0/0x5e0 [ 1830.321466] ? sock_sendpage+0x8b/0xc0 [ 1830.325353] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1830.330888] ? iter_file_splice_write+0xfc0/0xfc0 [ 1830.335751] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1830.340519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.346049] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1830.351530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.357067] ? fsnotify+0x4f5/0xed0 [ 1830.360712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.366335] ? __fsnotify_parent+0xe2/0x450 [ 1830.370654] ? fsnotify_first_mark+0x350/0x350 [ 1830.375236] ? splice_from_pipe+0x1f5/0x310 [ 1830.379574] ? splice_shrink_spd+0xd0/0xd0 [ 1830.383823] ? security_file_permission+0x94/0x320 [ 1830.388757] ? rw_verify_area+0x118/0x360 [ 1830.392905] ? iter_file_splice_write+0xfc0/0xfc0 [ 1830.397798] do_splice_to+0x12a/0x190 [ 1830.401616] splice_direct_to_actor+0x31b/0x9d0 [ 1830.406404] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1830.411250] ? do_splice_to+0x190/0x190 [ 1830.415224] ? rw_verify_area+0x118/0x360 [ 1830.419378] do_splice_direct+0x2c7/0x420 [ 1830.423659] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1830.428514] ? rw_verify_area+0x118/0x360 [ 1830.432681] do_sendfile+0x61a/0xe60 [ 1830.436405] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1830.440989] ? fput+0x128/0x1a0 [ 1830.444273] ? do_syscall_64+0x8c/0x800 [ 1830.448350] ? do_syscall_64+0x8c/0x800 [ 1830.452328] __x64_sys_sendfile64+0x1f8/0x240 [ 1830.456927] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1830.461514] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1830.466276] do_syscall_64+0x1a3/0x800 [ 1830.470178] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1830.475129] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1830.480142] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1830.480166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1830.480177] RIP: 0033:0x458099 [ 1830.480190] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1830.480198] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1830.480211] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1830.480219] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1830.480226] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:38:27 executing program 3 (fault-call:5 fault-nth:26): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:27 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') close(r0) 03:38:27 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x800, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) close(r1) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x3}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280)={r5, 0xc14c}, &(0x7f00000002c0)=0x8) bind$ax25(r1, &(0x7f0000000180)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6}, [@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000040)={0x6, 0xa, 0x4, 0x1, {r3, r4/1000+30000}, {0x2, 0x1, 0x5, 0x7fffffff, 0x0, 0xa5, "ba71fd11"}, 0x8, 0x7, @userptr=0x4, 0x4}) [ 1830.480234] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1830.480248] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00?\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1830.620233] FAULT_INJECTION: forcing a failure. [ 1830.620233] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1830.629768] overlayfs: failed to resolve './file1': -2 03:38:27 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x4) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) [ 1830.687931] CPU: 0 PID: 12071 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1830.695141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.704487] Call Trace: [ 1830.707072] dump_stack+0x1db/0x2d0 [ 1830.710711] ? dump_stack_print_info.cold+0x20/0x20 [ 1830.715729] ? kernel_text_address+0x73/0xf0 [ 1830.720150] should_fail.cold+0xa/0x15 [ 1830.724037] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1830.729151] ? arch_local_save_flags+0x50/0x50 [ 1830.733731] ? lock_release+0xc40/0xc40 03:38:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000040)={'filter\x00', 0x0, 0x4, 0x1000, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000a80)=""/4096}, &(0x7f00000000c0)=0x78) syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 1830.737710] ? rcu_pm_notify+0xd0/0xd0 [ 1830.741610] should_fail_alloc_page+0x50/0x60 [ 1830.746202] __alloc_pages_nodemask+0x323/0xdc0 [ 1830.750886] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1830.755919] ? __kmalloc_node+0x3d/0x70 [ 1830.759898] ? rcu_read_lock_sched_held+0x110/0x130 [ 1830.764902] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1830.770438] alloc_pages_current+0x107/0x210 [ 1830.774857] push_pipe+0x3fc/0x7a0 [ 1830.774888] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1830.774913] ? iov_iter_revert+0xaa0/0xaa0 [ 1830.783350] ? unix_find_other+0x5e0/0x5e0 [ 1830.783372] ? kvfree+0x61/0x70 [ 1830.783382] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1830.783396] ? iov_iter_pipe+0xba/0x2f0 [ 1830.791826] default_file_splice_read+0x1b1/0xac0 [ 1830.791839] ? unix_find_other+0x5e0/0x5e0 [ 1830.791857] ? sock_sendpage+0x8b/0xc0 [ 1830.791880] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1830.800135] ? iter_file_splice_write+0xfc0/0xfc0 [ 1830.800150] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1830.800167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.800182] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1830.808958] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.808972] ? fsnotify+0x4f5/0xed0 [ 1830.808992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.809005] ? __fsnotify_parent+0xe2/0x450 [ 1830.809019] ? fsnotify_first_mark+0x350/0x350 [ 1830.809032] ? splice_from_pipe+0x1f5/0x310 [ 1830.822652] ? splice_shrink_spd+0xd0/0xd0 [ 1830.822678] ? security_file_permission+0x94/0x320 [ 1830.822695] ? rw_verify_area+0x118/0x360 03:38:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x8000000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) [ 1830.822706] ? iter_file_splice_write+0xfc0/0xfc0 [ 1830.822722] do_splice_to+0x12a/0x190 [ 1830.832286] splice_direct_to_actor+0x31b/0x9d0 [ 1830.832301] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1830.832321] ? do_splice_to+0x190/0x190 [ 1830.832338] ? rw_verify_area+0x118/0x360 [ 1830.832352] do_splice_direct+0x2c7/0x420 [ 1830.832367] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1830.843229] ? rw_verify_area+0x118/0x360 [ 1830.843247] do_sendfile+0x61a/0xe60 [ 1830.843271] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1830.843287] ? fput+0x128/0x1a0 [ 1830.843302] ? do_syscall_64+0x8c/0x800 [ 1830.852414] ? do_syscall_64+0x8c/0x800 [ 1830.852434] __x64_sys_sendfile64+0x1f8/0x240 [ 1830.852450] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1830.852464] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1830.852483] do_syscall_64+0x1a3/0x800 [ 1830.852498] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1830.862310] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1830.862330] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1830.862363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1830.862373] RIP: 0033:0x458099 [ 1830.862384] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1830.862392] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1831.010440] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1831.017687] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1831.024933] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1831.032180] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 03:38:27 executing program 3 (fault-call:5 fault-nth:27): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1831.039428] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1831.074089] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:28 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1831.142569] FAULT_INJECTION: forcing a failure. [ 1831.142569] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1831.206919] CPU: 0 PID: 12103 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1831.214334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1831.223677] Call Trace: [ 1831.226261] dump_stack+0x1db/0x2d0 [ 1831.229906] ? dump_stack_print_info.cold+0x20/0x20 [ 1831.234923] ? kernel_text_address+0x73/0xf0 [ 1831.239336] should_fail.cold+0xa/0x15 [ 1831.243230] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1831.248334] ? arch_local_save_flags+0x50/0x50 [ 1831.252924] ? lock_release+0xc40/0xc40 [ 1831.257018] ? rcu_pm_notify+0xd0/0xd0 [ 1831.260910] should_fail_alloc_page+0x50/0x60 [ 1831.265398] __alloc_pages_nodemask+0x323/0xdc0 [ 1831.270068] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1831.275102] ? __kmalloc_node+0x3d/0x70 [ 1831.279085] ? rcu_read_lock_sched_held+0x110/0x130 [ 1831.284187] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1831.289728] alloc_pages_current+0x107/0x210 [ 1831.294138] push_pipe+0x3fc/0x7a0 [ 1831.296478] overlayfs: failed to resolve './file1': -2 [ 1831.297698] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1831.297720] ? iov_iter_revert+0xaa0/0xaa0 [ 1831.312133] ? unix_find_other+0x5e0/0x5e0 [ 1831.316375] ? kvfree+0x61/0x70 [ 1831.319658] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1831.324756] ? iov_iter_pipe+0xba/0x2f0 [ 1831.328815] default_file_splice_read+0x1b1/0xac0 [ 1831.333653] ? unix_find_other+0x5e0/0x5e0 [ 1831.337886] ? sock_sendpage+0x8b/0xc0 [ 1831.341775] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1831.347307] ? iter_file_splice_write+0xfc0/0xfc0 [ 1831.352145] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1831.356912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.362447] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1831.367858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.367873] ? fsnotify+0x4f5/0xed0 [ 1831.367898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.377016] ? __fsnotify_parent+0xe2/0x450 [ 1831.377032] ? fsnotify_first_mark+0x350/0x350 [ 1831.377044] ? splice_from_pipe+0x1f5/0x310 [ 1831.377061] ? splice_shrink_spd+0xd0/0xd0 [ 1831.377090] ? security_file_permission+0x94/0x320 [ 1831.377107] ? rw_verify_area+0x118/0x360 [ 1831.409640] ? iter_file_splice_write+0xfc0/0xfc0 [ 1831.414475] do_splice_to+0x12a/0x190 [ 1831.414493] splice_direct_to_actor+0x31b/0x9d0 [ 1831.414507] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1831.414524] ? do_splice_to+0x190/0x190 [ 1831.414539] ? rw_verify_area+0x118/0x360 [ 1831.422971] do_splice_direct+0x2c7/0x420 [ 1831.422989] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1831.423013] ? rw_verify_area+0x118/0x360 [ 1831.423030] do_sendfile+0x61a/0xe60 [ 1831.423053] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1831.423069] ? fput+0x128/0x1a0 [ 1831.423094] ? do_syscall_64+0x8c/0x800 [ 1831.423107] ? do_syscall_64+0x8c/0x800 [ 1831.468588] __x64_sys_sendfile64+0x1f8/0x240 [ 1831.473084] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1831.477650] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1831.482413] do_syscall_64+0x1a3/0x800 [ 1831.486288] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1831.491194] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1831.496288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1831.501111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1831.506284] RIP: 0033:0x458099 [ 1831.509472] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1831.528361] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1831.536051] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1831.543301] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1831.550555] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:38:28 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) bind(r1, &(0x7f0000000140)=@hci={0x1f, r2, 0x1}, 0x80) close(r0) 03:38:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) close(r0) 03:38:28 executing program 3 (fault-call:5 fault-nth:28): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1831.557798] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1831.565093] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00@\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1831.697327] FAULT_INJECTION: forcing a failure. [ 1831.697327] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1831.750736] CPU: 0 PID: 12127 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1831.758049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1831.758060] Call Trace: [ 1831.758080] dump_stack+0x1db/0x2d0 [ 1831.758096] ? dump_stack_print_info.cold+0x20/0x20 [ 1831.778707] ? kernel_text_address+0x73/0xf0 [ 1831.783117] should_fail.cold+0xa/0x15 [ 1831.783136] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1831.783157] ? arch_local_save_flags+0x50/0x50 [ 1831.783169] ? lock_release+0xc40/0xc40 [ 1831.783183] ? rcu_pm_notify+0xd0/0xd0 [ 1831.783204] should_fail_alloc_page+0x50/0x60 [ 1831.791780] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1831.792155] __alloc_pages_nodemask+0x323/0xdc0 [ 1831.792176] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1831.792199] ? __kmalloc_node+0x3d/0x70 [ 1831.828978] ? rcu_read_lock_sched_held+0x110/0x130 [ 1831.833988] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1831.839543] alloc_pages_current+0x107/0x210 [ 1831.843949] push_pipe+0x3fc/0x7a0 [ 1831.847498] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1831.852432] ? iov_iter_revert+0xaa0/0xaa0 [ 1831.856683] ? unix_find_other+0x5e0/0x5e0 [ 1831.860913] ? kvfree+0x61/0x70 [ 1831.864183] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1831.869290] ? iov_iter_pipe+0xba/0x2f0 [ 1831.873276] default_file_splice_read+0x1b1/0xac0 [ 1831.878122] ? unix_find_other+0x5e0/0x5e0 [ 1831.882529] ? sock_sendpage+0x8b/0xc0 [ 1831.886420] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1831.891952] ? iter_file_splice_write+0xfc0/0xfc0 [ 1831.896813] ? anon_pipe_buf_release+0x4e0/0x4e0 03:38:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) open_by_handle_at(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="9700000002006d991400009906ac09b069be0088d077bee90d9409396a380fbe46d311957ca2352ff5d7d8ad952d91dc9213f518100ed3d3c8b2c26a2240eb1cb567dc07780ab967e1dfe113761824d8bf99be4c70717fb41baac362c77908b50747f95cf705b0c89d12cf19e36b81622aa94814707a06061972933514fdc373aee7ecd4c7d5185cc3864374ebcf689e7ea347410baa5489b828"], 0x202081) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') pipe(&(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x54, r2, 0x102, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xff}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x4851}, 0x4) close(r1) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$EVIOCSFF(r4, 0x40304580, &(0x7f0000000080)={0x57, 0x2, 0x0, {0x100000000, 0x7c36}, {0x2, 0x100000000}, @period={0x0, 0xffffffffffffff97, 0x9, 0xffffffffffffffff, 0x6, {0x1, 0x1, 0xce4a}, 0x5, &(0x7f0000000040)=[0x80000000, 0x3, 0x9, 0xd47, 0xffffffffffffffff]}}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1f, 0x6, 0x1000, 0x1, 0x0, 0xffffffffffffff9c, 0x2d0}, 0x2c) [ 1831.901571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.907100] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1831.912467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.918016] ? fsnotify+0x4f5/0xed0 [ 1831.921648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.921663] ? __fsnotify_parent+0xe2/0x450 [ 1831.921680] ? fsnotify_first_mark+0x350/0x350 [ 1831.921693] ? splice_from_pipe+0x1f5/0x310 [ 1831.921710] ? splice_shrink_spd+0xd0/0xd0 [ 1831.921736] ? security_file_permission+0x94/0x320 [ 1831.921753] ? rw_verify_area+0x118/0x360 [ 1831.931585] ? iter_file_splice_write+0xfc0/0xfc0 [ 1831.931600] do_splice_to+0x12a/0x190 [ 1831.931618] splice_direct_to_actor+0x31b/0x9d0 [ 1831.931633] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1831.931653] ? do_splice_to+0x190/0x190 [ 1831.931672] ? rw_verify_area+0x118/0x360 [ 1831.940534] do_splice_direct+0x2c7/0x420 [ 1831.940551] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1831.940576] ? rw_verify_area+0x118/0x360 [ 1831.940593] do_sendfile+0x61a/0xe60 [ 1831.940615] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1831.940630] ? fput+0x128/0x1a0 [ 1831.949750] ? do_syscall_64+0x8c/0x800 [ 1831.949764] ? do_syscall_64+0x8c/0x800 [ 1831.949807] __x64_sys_sendfile64+0x1f8/0x240 [ 1831.949824] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1831.949839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1831.949860] do_syscall_64+0x1a3/0x800 [ 1832.030347] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1832.035282] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1832.040289] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1832.045147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1832.049009] overlayfs: failed to resolve './file1': -2 [ 1832.050326] RIP: 0033:0x458099 [ 1832.050340] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1832.050348] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1832.050361] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1832.050369] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 03:38:28 executing program 3 (fault-call:5 fault-nth:29): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000080)='comm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 1832.050377] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1832.050385] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1832.050392] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1832.182339] FAULT_INJECTION: forcing a failure. [ 1832.182339] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1832.194464] CPU: 0 PID: 12143 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1832.201649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1832.210988] Call Trace: [ 1832.211006] dump_stack+0x1db/0x2d0 [ 1832.211036] ? dump_stack_print_info.cold+0x20/0x20 [ 1832.222185] ? kernel_text_address+0x73/0xf0 [ 1832.226610] should_fail.cold+0xa/0x15 [ 1832.230501] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1832.235628] ? arch_local_save_flags+0x50/0x50 [ 1832.240203] ? lock_release+0xc40/0xc40 [ 1832.244214] ? rcu_pm_notify+0xd0/0xd0 [ 1832.248114] should_fail_alloc_page+0x50/0x60 [ 1832.252606] __alloc_pages_nodemask+0x323/0xdc0 [ 1832.257279] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1832.262323] ? __kmalloc_node+0x3d/0x70 [ 1832.266301] ? rcu_read_lock_sched_held+0x110/0x130 [ 1832.271313] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1832.276870] alloc_pages_current+0x107/0x210 [ 1832.281281] push_pipe+0x3fc/0x7a0 [ 1832.284829] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1832.289773] ? iov_iter_revert+0xaa0/0xaa0 [ 1832.294050] ? unix_find_other+0x5e0/0x5e0 [ 1832.298293] ? kvfree+0x61/0x70 [ 1832.301568] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1832.306581] ? iov_iter_pipe+0xba/0x2f0 [ 1832.310571] default_file_splice_read+0x1b1/0xac0 [ 1832.315424] ? unix_find_other+0x5e0/0x5e0 [ 1832.319672] ? sock_sendpage+0x8b/0xc0 [ 1832.323563] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1832.329094] ? iter_file_splice_write+0xfc0/0xfc0 [ 1832.333930] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1832.338683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1832.344212] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1832.349578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1832.355115] ? fsnotify+0x4f5/0xed0 [ 1832.358769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1832.364316] ? __fsnotify_parent+0xe2/0x450 [ 1832.368641] ? fsnotify_first_mark+0x350/0x350 [ 1832.373299] ? splice_from_pipe+0x1f5/0x310 [ 1832.377639] ? splice_shrink_spd+0xd0/0xd0 [ 1832.381882] ? security_file_permission+0x94/0x320 [ 1832.386811] ? rw_verify_area+0x118/0x360 [ 1832.391000] ? iter_file_splice_write+0xfc0/0xfc0 [ 1832.395941] do_splice_to+0x12a/0x190 [ 1832.399735] splice_direct_to_actor+0x31b/0x9d0 [ 1832.404404] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1832.409261] ? do_splice_to+0x190/0x190 [ 1832.413243] ? rw_verify_area+0x118/0x360 [ 1832.417396] do_splice_direct+0x2c7/0x420 [ 1832.421552] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1832.426489] ? rw_verify_area+0x118/0x360 03:38:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x3a, 0x0, 0x3, {0xb91}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000080)={0x8, 0x9, 0x2, 0x81, 0x1e, 0x4}) close(r0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000180)={{0x0, 0x5, 0x2, 0x5}, 'syz0\x00', 0x42}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) 03:38:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 1832.430647] do_sendfile+0x61a/0xe60 [ 1832.434366] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1832.438953] ? fput+0x128/0x1a0 [ 1832.442258] ? do_syscall_64+0x8c/0x800 [ 1832.446242] ? do_syscall_64+0x8c/0x800 [ 1832.450235] __x64_sys_sendfile64+0x1f8/0x240 [ 1832.454754] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1832.459351] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1832.464124] do_syscall_64+0x1a3/0x800 [ 1832.468021] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1832.473072] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1832.478167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1832.483008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1832.488282] RIP: 0033:0x458099 [ 1832.491476] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1832.510462] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1832.518263] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1832.525510] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 03:38:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0xfeffffff) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$unix(r1, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) close(r0) 03:38:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00`\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:29 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1832.532770] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1832.540130] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1832.547382] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:29 executing program 3 (fault-call:5 fault-nth:30): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:29 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x9, 0x12000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x8000000000007ff, 0x10000) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000040)) close(r1) [ 1832.677083] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1832.744843] FAULT_INJECTION: forcing a failure. [ 1832.744843] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1832.758127] overlayfs: failed to resolve './file1': -2 [ 1832.807333] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1832.827927] CPU: 0 PID: 12182 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1832.835143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1832.844492] Call Trace: [ 1832.847083] dump_stack+0x1db/0x2d0 [ 1832.850726] ? dump_stack_print_info.cold+0x20/0x20 03:38:29 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) [ 1832.855751] ? kernel_text_address+0x73/0xf0 [ 1832.860165] should_fail.cold+0xa/0x15 [ 1832.864059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1832.869167] ? arch_local_save_flags+0x50/0x50 [ 1832.873767] ? lock_release+0xc40/0xc40 [ 1832.877770] ? rcu_pm_notify+0xd0/0xd0 [ 1832.881668] should_fail_alloc_page+0x50/0x60 [ 1832.886174] __alloc_pages_nodemask+0x323/0xdc0 [ 1832.890845] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1832.895866] ? __kmalloc_node+0x3d/0x70 [ 1832.899836] ? rcu_read_lock_sched_held+0x110/0x130 [ 1832.904844] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1832.910474] alloc_pages_current+0x107/0x210 [ 1832.914888] push_pipe+0x3fc/0x7a0 [ 1832.918430] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1832.923370] ? iov_iter_revert+0xaa0/0xaa0 [ 1832.927628] ? unix_find_other+0x5e0/0x5e0 [ 1832.931878] ? kvfree+0x61/0x70 [ 1832.935152] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1832.940179] ? iov_iter_pipe+0xba/0x2f0 [ 1832.944151] default_file_splice_read+0x1b1/0xac0 [ 1832.948995] ? unix_find_other+0x5e0/0x5e0 [ 1832.953234] ? sock_sendpage+0x8b/0xc0 03:38:29 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1832.957126] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1832.962658] ? iter_file_splice_write+0xfc0/0xfc0 [ 1832.967480] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1832.972220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1832.977735] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1832.983079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1832.988608] ? fsnotify+0x4f5/0xed0 [ 1832.992218] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1832.997757] ? __fsnotify_parent+0xe2/0x450 [ 1833.002071] ? fsnotify_first_mark+0x350/0x350 [ 1833.006651] ? splice_from_pipe+0x1f5/0x310 [ 1833.010951] ? splice_shrink_spd+0xd0/0xd0 [ 1833.015179] ? security_file_permission+0x94/0x320 [ 1833.020095] ? rw_verify_area+0x118/0x360 [ 1833.024216] ? iter_file_splice_write+0xfc0/0xfc0 [ 1833.029035] do_splice_to+0x12a/0x190 [ 1833.032815] splice_direct_to_actor+0x31b/0x9d0 [ 1833.037466] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1833.042292] ? do_splice_to+0x190/0x190 [ 1833.046246] ? rw_verify_area+0x118/0x360 [ 1833.050374] do_splice_direct+0x2c7/0x420 [ 1833.054499] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1833.059334] ? rw_verify_area+0x118/0x360 [ 1833.063471] do_sendfile+0x61a/0xe60 [ 1833.067177] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1833.071740] ? fput+0x128/0x1a0 [ 1833.074999] ? do_syscall_64+0x8c/0x800 [ 1833.078950] ? do_syscall_64+0x8c/0x800 [ 1833.083057] __x64_sys_sendfile64+0x1f8/0x240 [ 1833.087534] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1833.092094] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1833.096831] do_syscall_64+0x1a3/0x800 [ 1833.100700] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1833.105618] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1833.110612] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1833.115435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1833.120602] RIP: 0033:0x458099 [ 1833.123771] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1833.142664] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1833.150348] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 03:38:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) close(r0) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000000)={0xb, @pix_mp={0x81, 0xd9d, 0x3c73566f, 0x0, 0x0, [{0x8, 0x8b}, {0xd4b}, {0x7, 0x7}, {0x23}, {0x7, 0x94c7}, {0xe0, 0x2}, {0x100000000, 0x4143}, {0x4, 0x4}], 0xffffffffffffffff, 0x5, 0x4, 0x1, 0x1}}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x40000, 0x0) [ 1833.157594] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1833.164843] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1833.172110] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1833.179365] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:30 executing program 3 (fault-call:5 fault-nth:31): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x03x\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:30 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) [ 1833.362047] FAULT_INJECTION: forcing a failure. [ 1833.362047] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1833.377530] CPU: 0 PID: 12208 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1833.384872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1833.384878] Call Trace: [ 1833.384896] dump_stack+0x1db/0x2d0 [ 1833.384915] ? dump_stack_print_info.cold+0x20/0x20 [ 1833.384936] ? kernel_text_address+0x73/0xf0 [ 1833.384958] should_fail.cold+0xa/0x15 [ 1833.396868] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1833.396888] ? arch_local_save_flags+0x50/0x50 [ 1833.396901] ? lock_release+0xc40/0xc40 [ 1833.405519] ? rcu_pm_notify+0xd0/0xd0 [ 1833.405546] should_fail_alloc_page+0x50/0x60 [ 1833.405559] __alloc_pages_nodemask+0x323/0xdc0 [ 1833.405579] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1833.413863] ? __kmalloc_node+0x3d/0x70 [ 1833.413883] ? rcu_read_lock_sched_held+0x110/0x130 [ 1833.413896] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1833.413915] alloc_pages_current+0x107/0x210 [ 1833.423556] push_pipe+0x3fc/0x7a0 [ 1833.423580] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1833.423602] ? iov_iter_revert+0xaa0/0xaa0 [ 1833.423623] ? unix_find_other+0x5e0/0x5e0 [ 1833.431437] ? kvfree+0x61/0x70 [ 1833.431451] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1833.431462] ? iov_iter_pipe+0xba/0x2f0 [ 1833.431480] default_file_splice_read+0x1b1/0xac0 [ 1833.440589] ? unix_find_other+0x5e0/0x5e0 [ 1833.440609] ? sock_sendpage+0x8b/0xc0 [ 1833.440625] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1833.440652] ? iter_file_splice_write+0xfc0/0xfc0 [ 1833.449621] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1833.449639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1833.449653] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1833.460253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1833.460266] ? fsnotify+0x4f5/0xed0 [ 1833.460282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1833.460311] ? __fsnotify_parent+0xe2/0x450 [ 1833.468233] ? fsnotify_first_mark+0x350/0x350 [ 1833.468246] ? splice_from_pipe+0x1f5/0x310 [ 1833.468264] ? splice_shrink_spd+0xd0/0xd0 [ 1833.477490] ? security_file_permission+0x94/0x320 [ 1833.477511] ? rw_verify_area+0x118/0x360 [ 1833.483591] overlayfs: failed to resolve './file1': -2 [ 1833.484991] ? iter_file_splice_write+0xfc0/0xfc0 [ 1833.584161] do_splice_to+0x12a/0x190 [ 1833.587960] splice_direct_to_actor+0x31b/0x9d0 [ 1833.592615] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1833.597454] ? do_splice_to+0x190/0x190 [ 1833.601409] ? rw_verify_area+0x118/0x360 [ 1833.605548] do_splice_direct+0x2c7/0x420 [ 1833.609682] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1833.614523] ? rw_verify_area+0x118/0x360 [ 1833.618670] do_sendfile+0x61a/0xe60 [ 1833.622397] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1833.626970] ? fput+0x128/0x1a0 [ 1833.630239] ? do_syscall_64+0x8c/0x800 [ 1833.634196] ? do_syscall_64+0x8c/0x800 [ 1833.638154] __x64_sys_sendfile64+0x1f8/0x240 [ 1833.642628] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1833.647188] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1833.651929] do_syscall_64+0x1a3/0x800 [ 1833.655795] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1833.660716] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1833.665711] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1833.670536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1833.675702] RIP: 0033:0x458099 [ 1833.678876] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1833.697925] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1833.705607] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 03:38:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0xfffffffe) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:30 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:sysfs_t:s0\x00', 0x1d, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) close(r1) [ 1833.712971] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1833.720325] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1833.727569] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1833.734814] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1833.756385] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:30 executing program 3 (fault-call:5 fault-nth:32): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:30 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1f, 0x28400) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000380)={{0x2, 0x4e21, @local}, {0x306, @broadcast}, 0x40, {0x2, 0x4e23, @multicast1}, 'bond0\x00'}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000080)=0x0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r4 = request_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f0000000300)='/dev/midi#\x00', r3) add_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="7e0d6ea0caa9d30873c03d7a46a0bf478f44d80df73c19dfb6e2f6b6b0cb2fb64f6c5bc55422acf3cc4295b26d19145fceb873bcab935336845e68f522dcf915b35bf21ce7c6f8336a3ac8601d9d19a6fdc30c9dc09ffc31ccb1171d6bf1b3c3915b1bb7b500928527b45265e6e1f0e5283eae03f55a98d1bf0d01aee74d65975369fe3907c300eff16d7ac65a390bb16a42102efefec2aa1d9146da13a0cd95c2d3fee57ebcf3b8004dfae7703e1fb4bd0f85f9b226831f0c270b21503e271d90c79a8f3054ebbcb8ba16f4fda18682937cab9a34fad7a61b255f3bfec744e60dd82302ee3b77cb", 0xe8, r4) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f00000000c0)=r2) 03:38:30 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1833.932591] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:30 executing program 2: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40001, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x10000, 0x0) write$P9_RCLUNK(r2, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) [ 1834.007275] FAULT_INJECTION: forcing a failure. [ 1834.007275] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1834.085923] CPU: 0 PID: 12243 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1834.093214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1834.102558] Call Trace: [ 1834.105142] dump_stack+0x1db/0x2d0 [ 1834.108787] ? dump_stack_print_info.cold+0x20/0x20 [ 1834.113806] ? kernel_text_address+0x73/0xf0 [ 1834.118221] should_fail.cold+0xa/0x15 [ 1834.122113] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1834.127235] ? arch_local_save_flags+0x50/0x50 [ 1834.131808] ? lock_release+0xc40/0xc40 [ 1834.135781] ? rcu_pm_notify+0xd0/0xd0 [ 1834.139673] should_fail_alloc_page+0x50/0x60 [ 1834.144248] __alloc_pages_nodemask+0x323/0xdc0 [ 1834.148925] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1834.153947] ? __kmalloc_node+0x3d/0x70 [ 1834.157950] ? rcu_read_lock_sched_held+0x110/0x130 [ 1834.163051] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1834.168587] alloc_pages_current+0x107/0x210 [ 1834.173002] push_pipe+0x3fc/0x7a0 [ 1834.176553] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1834.181488] ? iov_iter_revert+0xaa0/0xaa0 03:38:30 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6b, 0xb23c0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000040)={0x5, [0x551a, 0x1, 0x401, 0xffffffffffffff81, 0x100, 0x101, 0xcf6, 0x5, 0x5, 0x200, 0x4a, 0x10001, 0x4, 0x69, 0x5084, 0x2, 0x4, 0x800, 0x5, 0x5, 0x2baf354e, 0x8001, 0x1c000, 0x1, 0x6, 0x3, 0x7fff, 0x3, 0x1f, 0xfffffffffffff988, 0x0, 0x10001, 0xffffffff00000001, 0x7, 0x400, 0x0, 0x8, 0x4, 0x7, 0x7, 0x32, 0x3, 0x9, 0x100000000, 0x1, 0x8, 0x78, 0x2], 0x2}) [ 1834.185866] ? unix_find_other+0x5e0/0x5e0 [ 1834.190111] ? kvfree+0x61/0x70 [ 1834.193385] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1834.198380] ? iov_iter_pipe+0xba/0x2f0 [ 1834.202357] default_file_splice_read+0x1b1/0xac0 [ 1834.207179] ? unix_find_other+0x5e0/0x5e0 [ 1834.211396] ? sock_sendpage+0x8b/0xc0 [ 1834.215260] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1834.220773] ? iter_file_splice_write+0xfc0/0xfc0 [ 1834.225592] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1834.230343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.235862] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1834.241232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.246746] ? fsnotify+0x4f5/0xed0 [ 1834.250353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.255873] ? __fsnotify_parent+0xe2/0x450 [ 1834.260171] ? fsnotify_first_mark+0x350/0x350 [ 1834.264730] ? splice_from_pipe+0x1f5/0x310 [ 1834.269036] ? splice_shrink_spd+0xd0/0xd0 [ 1834.273255] ? security_file_permission+0x94/0x320 [ 1834.278162] ? rw_verify_area+0x118/0x360 [ 1834.282285] ? iter_file_splice_write+0xfc0/0xfc0 [ 1834.287132] do_splice_to+0x12a/0x190 [ 1834.290934] splice_direct_to_actor+0x31b/0x9d0 [ 1834.295576] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1834.300395] ? do_splice_to+0x190/0x190 [ 1834.304354] ? rw_verify_area+0x118/0x360 [ 1834.308483] do_splice_direct+0x2c7/0x420 [ 1834.312647] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1834.317478] ? rw_verify_area+0x118/0x360 [ 1834.321620] do_sendfile+0x61a/0xe60 [ 1834.325324] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1834.329887] ? fput+0x128/0x1a0 [ 1834.333143] ? do_syscall_64+0x8c/0x800 [ 1834.337100] ? do_syscall_64+0x8c/0x800 [ 1834.341059] __x64_sys_sendfile64+0x1f8/0x240 [ 1834.345561] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1834.350214] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1834.354956] do_syscall_64+0x1a3/0x800 [ 1834.358830] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1834.363735] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1834.368731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1834.373569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1834.378734] RIP: 0033:0x458099 [ 1834.381903] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1834.400895] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1834.408622] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1834.415871] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1834.423116] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1834.430361] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1834.437609] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1834.455078] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x01\xc4\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:31 executing program 3 (fault-call:5 fault-nth:33): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:31 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\xd1\x81\x95,B\x11\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) fstat(r3, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f00000000c0)=[0xee00, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee01]) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x100000, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@dont_measure='dont_measure'}, {@appraise='appraise'}, {@obj_role={'obj_role', 0x3d, 'net/ip_mr_vif\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'eth1,['}}, {@pcr={'pcr', 0x3d, 0x1c}}]}}) close(r0) setsockopt$rose(r2, 0x104, 0x7, &(0x7f0000000340)=0x3, 0x4) 03:38:31 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000240)=""/126, &(0x7f00000002c0)=0x7e) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x20042, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000380), &(0x7f0000000340)=0x4) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000080)='-etl0\x00\x00 \xe6q\xfc7\x18\x02\v\x85<\xd3\x97\x8a\xac*\xaaYk\xb8IAUH\xa1j\xb2\xd8\xf0\x9et\xdc\x02\xd0U@\x99\xcby\xb4m\xcd\xa7\x82\xa7h(V\xf2\xe48\xe0\xcc\xd1\a\'\xa1\x10\x8c-\x04\x89\x10\"\xcc\xe6\xad\xc3\xf3\"\xa0\x9b\x8e\xff\xb8\xe1\xbc\xceBJA\xa8\xcf\x1d\xdcM\xba\x1a)\x19\xe7\xc0\x85\xd0{\x03\x03X\x99\xe6CW\x88\xbf\x1a:\xcb\x12\t\x18\xb8\xe6\xb3KQ\xf8\x80\xc1\xd6 \x8e0\x99\x87\x0f\xdfj\xb7\x88\x86\x9c\x13\xed\xdai\xfdTf\x9a\xd6\x8aZ\xe1\xadu\xdc\xd9\x89\xc1\xf6\x9c\xc9k\x00\xf2)\x0e&b\xa1\xeb%\xd2#p\x0f\x10\xc1\x91\xd4\x8e\xd3\xd4/\xfbGKTjn\xee\x99\x95\xa3\xc4\xb8aF\xd6\xda\xb1\x9dz\xbd$\x83\xb4\xc4?\x9f\x88\xb7\x95OI\xaa\x16\xae\x8f\x1f\xc1\xc4g\x1b 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1835.031116] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1835.038819] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1835.046075] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1835.053321] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1835.060573] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 03:38:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x1000000000000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:31 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000040)={0x80000000000, 0x1, 0x0, 0x80, 0x0, 0x4}) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x10001, 0x10800) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_mr_vif\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000340)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x4000, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) close(r1) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000140)) 03:38:31 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() write$P9_RSTATu(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="6b0000007d0100000055000200010000000004000074a0da000100000000000000000028556a00000002000000fb00000000000000000000776cff010000000000003117025b6b657972696e6776626f786e6574312b282d73656c660000010026e474c658c2c5dd2d0b55b74d66ddaf6e9c477bf5bc49fffc2e16e6daee20d0ffe645a5731396d33be73959ba5d1c3053413a8c2cc152e764082665cedd629587831c03caa125f628a709c158eb90c8734ee31df41ffbffffffffffffff09ef94564529bd36646d56183d0833490273169a30be6de0cd73da799b963a46dfc6fcf451639252f017af43650dc3f34aff", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4], 0x6b) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x4, 0x4) close(r1) r5 = add_key(&(0x7f0000000200)='cifs.spnego\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="61d55429edca2d8de261a0e3ce367cc991db35ab884f797784194ea6229c8533ea240993e5e3a3f666ad4aaf0f9708267d559435f7a26e1610b96b9b84bb882d61598054451dc587ed5085b2a2bdc6a8f094778d", 0x54, 0xfffffffffffffffb) r6 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)="162d978a", 0x4, 0x0) keyctl$search(0xa, r5, &(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz', 0x1}, r6) [ 1835.067822] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1835.109945] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:32 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd96f08a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x00\x01\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:32 executing program 3 (fault-call:5 fault-nth:34): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, @bcast, @bpq0='bpq0\x00', 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 03:38:32 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) [ 1835.292989] FAULT_INJECTION: forcing a failure. [ 1835.292989] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1835.305095] CPU: 0 PID: 12301 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1835.305105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1835.305110] Call Trace: [ 1835.305129] dump_stack+0x1db/0x2d0 [ 1835.305147] ? dump_stack_print_info.cold+0x20/0x20 [ 1835.305160] ? kernel_text_address+0x73/0xf0 [ 1835.321694] should_fail.cold+0xa/0x15 [ 1835.321712] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1835.321735] ? arch_local_save_flags+0x50/0x50 [ 1835.332916] ? lock_release+0xc40/0xc40 [ 1835.341165] ? rcu_pm_notify+0xd0/0xd0 [ 1835.354875] overlayfs: failed to resolve './file1': -2 [ 1835.358626] should_fail_alloc_page+0x50/0x60 [ 1835.358640] __alloc_pages_nodemask+0x323/0xdc0 [ 1835.358658] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1835.358678] ? __kmalloc_node+0x3d/0x70 [ 1835.368401] ? rcu_read_lock_sched_held+0x110/0x130 [ 1835.368415] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1835.368434] alloc_pages_current+0x107/0x210 [ 1835.368449] push_pipe+0x3fc/0x7a0 [ 1835.368468] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1835.392744] ? iov_iter_revert+0xaa0/0xaa0 [ 1835.392791] ? unix_find_other+0x5e0/0x5e0 [ 1835.392811] ? kvfree+0x61/0x70 [ 1835.392823] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1835.392836] ? iov_iter_pipe+0xba/0x2f0 [ 1835.409869] default_file_splice_read+0x1b1/0xac0 [ 1835.409883] ? unix_find_other+0x5e0/0x5e0 [ 1835.409901] ? sock_sendpage+0x8b/0xc0 [ 1835.409916] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1835.417385] ? iter_file_splice_write+0xfc0/0xfc0 [ 1835.417399] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1835.417416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.417429] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1835.417446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.417459] ? fsnotify+0x4f5/0xed0 [ 1835.426406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.426436] ? __fsnotify_parent+0xe2/0x450 [ 1835.426452] ? fsnotify_first_mark+0x350/0x350 [ 1835.426464] ? splice_from_pipe+0x1f5/0x310 [ 1835.426480] ? splice_shrink_spd+0xd0/0xd0 [ 1835.426502] ? security_file_permission+0x94/0x320 [ 1835.439432] ? rw_verify_area+0x118/0x360 [ 1835.439446] ? iter_file_splice_write+0xfc0/0xfc0 [ 1835.439461] do_splice_to+0x12a/0x190 [ 1835.439478] splice_direct_to_actor+0x31b/0x9d0 [ 1835.439491] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1835.465437] ? do_splice_to+0x190/0x190 [ 1835.465457] ? rw_verify_area+0x118/0x360 [ 1835.465474] do_splice_direct+0x2c7/0x420 [ 1835.465491] ? splice_direct_to_actor+0x9d0/0x9d0 03:38:32 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x102) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xe0, "508225c3e4ddb76fbaa564cc7719bc1af1837849df02b38f1d73c49ace94e70cc86bab83c3a491b119b702bd4342a3b96e9d13319dee00e9c67123515509ac67d207d68c66ef1e48c6668ef73f774b62e73e3f02dde22339425ff0d9249a2430eae39e3ddac23dea5c0d7ced9fb4f7a95cdd1a90576db6e0b0158b582fe7077716d1ab2086777f3a158f00b1aee26d3091adca70f41ea0d80531be353e805b3b21a9f639a91d45900493e7f018c99f392c56c7521cf3dbafeb11793a636527a25c9c5895669528eac7d83a3e2c73066f0429fb52c987cf9d2aa26fbbcaca6634"}, &(0x7f0000000140)=0xe8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x5, 0x0, 0x4, 0x1, 0x7ff, 0x40, 0x573, 0x3, r2}, &(0x7f00000001c0)=0x20) close(r0) 03:38:32 executing program 3 (fault-call:5 fault-nth:35): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1835.465520] ? rw_verify_area+0x118/0x360 [ 1835.465536] do_sendfile+0x61a/0xe60 [ 1835.474664] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1835.474697] ? fput+0x128/0x1a0 [ 1835.474712] ? do_syscall_64+0x8c/0x800 [ 1835.474725] ? do_syscall_64+0x8c/0x800 [ 1835.474744] __x64_sys_sendfile64+0x1f8/0x240 [ 1835.474759] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1835.474778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1835.484595] do_syscall_64+0x1a3/0x800 [ 1835.484612] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1835.484626] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1835.484644] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1835.484664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1835.493505] RIP: 0033:0x458099 [ 1835.493536] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1835.493560] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1835.493573] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1835.493582] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1835.493590] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1835.493598] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1835.493606] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) r3 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=r3) [ 1835.733036] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1835.743896] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:32 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1835.795358] FAULT_INJECTION: forcing a failure. [ 1835.795358] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1835.868614] CPU: 1 PID: 12332 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1835.875832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1835.885178] Call Trace: [ 1835.887764] dump_stack+0x1db/0x2d0 [ 1835.891387] ? dump_stack_print_info.cold+0x20/0x20 [ 1835.896403] ? kernel_text_address+0x73/0xf0 [ 1835.900811] should_fail.cold+0xa/0x15 [ 1835.904693] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1835.909814] ? arch_local_save_flags+0x50/0x50 [ 1835.914396] ? lock_release+0xc40/0xc40 [ 1835.918367] ? rcu_pm_notify+0xd0/0xd0 [ 1835.922262] should_fail_alloc_page+0x50/0x60 [ 1835.926763] __alloc_pages_nodemask+0x323/0xdc0 [ 1835.931575] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1835.936599] ? __kmalloc_node+0x3d/0x70 [ 1835.940573] ? rcu_read_lock_sched_held+0x110/0x130 [ 1835.945582] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1835.951121] alloc_pages_current+0x107/0x210 [ 1835.955531] push_pipe+0x3fc/0x7a0 [ 1835.959079] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1835.964018] ? iov_iter_revert+0xaa0/0xaa0 [ 1835.968262] ? unix_find_other+0x5e0/0x5e0 [ 1835.972504] ? kvfree+0x61/0x70 [ 1835.975782] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1835.980792] ? iov_iter_pipe+0xba/0x2f0 [ 1835.984786] default_file_splice_read+0x1b1/0xac0 [ 1835.989623] ? unix_find_other+0x5e0/0x5e0 [ 1835.993859] ? sock_sendpage+0x8b/0xc0 [ 1835.997756] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1836.003290] ? iter_file_splice_write+0xfc0/0xfc0 [ 1836.008126] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1836.012898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1836.018436] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1836.023807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1836.029521] ? fsnotify+0x4f5/0xed0 [ 1836.033171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1836.038707] ? __fsnotify_parent+0xe2/0x450 [ 1836.043031] ? fsnotify_first_mark+0x350/0x350 [ 1836.047610] ? splice_from_pipe+0x1f5/0x310 [ 1836.051923] ? splice_shrink_spd+0xd0/0xd0 [ 1836.056145] ? security_file_permission+0x94/0x320 [ 1836.061057] ? rw_verify_area+0x118/0x360 [ 1836.065183] ? iter_file_splice_write+0xfc0/0xfc0 [ 1836.070004] do_splice_to+0x12a/0x190 [ 1836.073812] splice_direct_to_actor+0x31b/0x9d0 [ 1836.078465] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1836.083316] ? do_splice_to+0x190/0x190 [ 1836.087285] ? rw_verify_area+0x118/0x360 [ 1836.091410] do_splice_direct+0x2c7/0x420 [ 1836.095536] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1836.100403] ? rw_verify_area+0x118/0x360 [ 1836.104565] do_sendfile+0x61a/0xe60 [ 1836.108269] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1836.112840] ? fput+0x128/0x1a0 [ 1836.116107] ? do_syscall_64+0x8c/0x800 [ 1836.120070] ? do_syscall_64+0x8c/0x800 [ 1836.124057] __x64_sys_sendfile64+0x1f8/0x240 [ 1836.128662] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1836.133234] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1836.137980] do_syscall_64+0x1a3/0x800 [ 1836.141847] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1836.146764] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1836.151766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1836.156623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1836.161807] RIP: 0033:0x458099 [ 1836.164987] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1836.183887] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1836.191581] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1836.198926] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1836.206173] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1836.213427] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1836.220684] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x100000000000000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:33 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xfffffffffffffc01, 0x1, 0x80000001, 0x2d6d, 0x7, 0x1ff, 0xfffffffffffffffb, 0x7, 0x5, 0x5, 0x9, 0x100000000}) close(r0) 03:38:33 executing program 3 (fault-call:5 fault-nth:36): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:33 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000ac0)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000007c0)='\xa3\xfe\xb4~6\x18B\xcc\x13\xd7\x90{\xc5\xa7v)\x1e\xb2k\xe4\xec\xf0\xdf\xcd\\,*m\xc0\xe7\xc7\xa8\xff\xad\\g\x9b\x99\xcdP\xc2m-\xfb\xfbF\xb3\x81\xc5\xf6vG\xda@O\x1f\xdf;\xd7\xa7K^\xb0\xea\xbb$\xfb\x1e\xbbrw\x93z\xd8L\xb1\a\xf6\xea\xad\x1c\xbe\xc9[K\xdd\xf8\xb2\xa2\xe0\xdc\xbb.#O K\x8f\x91f\xeeq\x8b\x87\x80\'\xfbC\xbb\x15t\x7f\xc2&a\xf5\x87\xdf\x88:\xf3\'\xafH\x85\xec\xcd\xf1\xbf\xb4.\xf8z\x8d\xb1!ewQLN:\xdb\xc8-\xb8\x91\x02>Qxm\x90\xcf\xa0JN\xe5\xa9t\x13L\xb0L\x11\xfd\xb6n\xa9\xb8\x8a\xab\x14\x05\xf3\x80\xc9y\x1e\b\x88gq\x1b\xae\xd4\x15\x8f\xb7hEK\xf7\xea\x80\xbd\xf7\xec\xbf-s\nD\xd0\xf3\x92\xd5\x00\x00\x00\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000480)=[@in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e20, 0x5, @ipv4={[], [], @broadcast}, 0x1}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e22, 0x400, @mcast2, 0x216}, @in6={0xa, 0x4e22, 0x0, @mcast2, 0xfffffffffffffff9}, @in6={0xa, 0x4e24, 0xffff, @ipv4={[], [], @rand_addr=0x6}, 0x1f}], 0x90) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000540)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000580)=0x0) r3 = syz_open_procfs(r2, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) vmsplice(r4, &(0x7f0000000400)=[{&(0x7f0000000080)="5862ebf1abc4c96d29f8c7a3919ff506fc624c1779031eee4e22e22c38bfd4663d7496ef29725ce694ca92d18d7d849ef55e2cd2f1cb2b9ea15f94d8a876a883b3395df364260439186efb2aed619cfc7f3bc7", 0x53}, {&(0x7f0000000180)="1b91f27c947beb44b08f0aec7619483e2cfc871282e3c4dc1a9ad6d63a618a195fee", 0x22}, {&(0x7f00000001c0)="dbd53bf48a165fd0f6da5bf1a51bb924af12d98978f12de664848d1cfda216c765fd2131190ec04b646dda8535933df23145f2e519ae23b31c02a078762b0792166dad9e06af7bd66ee1b9151545c83a02d16f6ca250cf8b036e4fcd7c021500fd010ddbdba1fa8317f1add924913d29dc125f6d1471729bf70a71e937f37c4950f524e1d4b85d6f8bbe3b3ec095d701c0518ec04311678544be8c", 0x9b}, {&(0x7f0000000280)="5a493586c69d4adfe845c150e2a6549007c542bdffe4", 0x16}, {&(0x7f00000002c0)="648e9d74d61decc4471af6dded09a840027e2f7463d7201d54f1b57a1dd3fe741628cf0b0c24f247324a4040169caeac18d64ea80a0d5059c3ee38abf31c38fa413ec120cf9e9abd816163787dcd4d7827831fa6b79dc5c017474cac90417b7ae14443646eff04e3b7313b69205caeecd68946c66c4927606dbbb400b945f5c611103ef221dd376798bba8cf19468d77b9b0c0441fee4a4b88779aed01948acf4f4b", 0xa2}, {&(0x7f0000000380)="fd3e03034996e3d99cc21d4e10bf12ba799b0d95e1ec54d663fb0b76052591af9f97270fc4c54346ab7e6d02bacc2dd3adeb14ab942e0d2815a557c5bd13086ba2a9e91e6f61b9dc5ae2bc7989db83aa46669e98bf75e6cc3377e35506a7a064381dfe2ef0b2cbca640b54543e0183307fd5", 0x72}], 0x6, 0x0) close(r1) fcntl$setstatus(r1, 0x4, 0x800) 03:38:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x00\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:33 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1836.372990] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1836.476707] FAULT_INJECTION: forcing a failure. [ 1836.476707] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1836.507138] CPU: 1 PID: 12355 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1836.514461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1836.523805] Call Trace: 03:38:33 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0xc3, 0x200000) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000)=0x7f, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x117, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r2) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000380)=""/95) [ 1836.526412] dump_stack+0x1db/0x2d0 [ 1836.530061] ? dump_stack_print_info.cold+0x20/0x20 [ 1836.535278] ? kernel_text_address+0x73/0xf0 [ 1836.539693] should_fail.cold+0xa/0x15 [ 1836.543585] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1836.548691] ? arch_local_save_flags+0x50/0x50 [ 1836.553267] ? lock_release+0xc40/0xc40 [ 1836.557240] ? rcu_pm_notify+0xd0/0xd0 [ 1836.561137] should_fail_alloc_page+0x50/0x60 [ 1836.565626] __alloc_pages_nodemask+0x323/0xdc0 [ 1836.570303] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1836.575336] ? __kmalloc_node+0x3d/0x70 [ 1836.579308] ? rcu_read_lock_sched_held+0x110/0x130 [ 1836.584314] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1836.589849] alloc_pages_current+0x107/0x210 [ 1836.594254] push_pipe+0x3fc/0x7a0 [ 1836.597796] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1836.602728] ? iov_iter_revert+0xaa0/0xaa0 [ 1836.606965] ? unix_find_other+0x5e0/0x5e0 [ 1836.611203] ? kvfree+0x61/0x70 [ 1836.614477] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1836.619491] ? iov_iter_pipe+0xba/0x2f0 [ 1836.623485] default_file_splice_read+0x1b1/0xac0 [ 1836.628331] ? unix_find_other+0x5e0/0x5e0 [ 1836.632565] ? sock_sendpage+0x8b/0xc0 [ 1836.636452] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1836.641985] ? iter_file_splice_write+0xfc0/0xfc0 [ 1836.646817] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1836.651571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1836.657194] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1836.662557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1836.668087] ? fsnotify+0x4f5/0xed0 [ 1836.671739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1836.677271] ? __fsnotify_parent+0xe2/0x450 [ 1836.681588] ? fsnotify_first_mark+0x350/0x350 [ 1836.686159] ? splice_from_pipe+0x1f5/0x310 [ 1836.690481] ? splice_shrink_spd+0xd0/0xd0 [ 1836.694721] ? security_file_permission+0x94/0x320 [ 1836.699825] ? rw_verify_area+0x118/0x360 [ 1836.703966] ? iter_file_splice_write+0xfc0/0xfc0 [ 1836.708814] do_splice_to+0x12a/0x190 [ 1836.712611] splice_direct_to_actor+0x31b/0x9d0 [ 1836.717271] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1836.722145] ? do_splice_to+0x190/0x190 [ 1836.726114] ? rw_verify_area+0x118/0x360 [ 1836.730258] do_splice_direct+0x2c7/0x420 [ 1836.734400] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1836.739240] ? rw_verify_area+0x118/0x360 [ 1836.743367] do_sendfile+0x61a/0xe60 [ 1836.747064] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1836.751627] ? fput+0x128/0x1a0 [ 1836.754897] ? do_syscall_64+0x8c/0x800 [ 1836.758856] ? do_syscall_64+0x8c/0x800 [ 1836.762821] __x64_sys_sendfile64+0x1f8/0x240 [ 1836.767332] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1836.771891] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1836.776644] do_syscall_64+0x1a3/0x800 [ 1836.780518] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1836.785431] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1836.790430] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1836.795266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1836.800438] RIP: 0033:0x458099 [ 1836.803618] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:38:33 executing program 3 (fault-call:5 fault-nth:37): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1836.822597] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1836.830291] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1836.837630] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1836.844877] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1836.852146] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1836.859413] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x00\x03\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1836.968321] overlayfs: failed to resolve './file0': -2 03:38:33 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0xa000, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x2) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) [ 1836.994474] FAULT_INJECTION: forcing a failure. [ 1836.994474] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1837.023935] CPU: 1 PID: 12389 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1837.031269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1837.040621] Call Trace: 03:38:33 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1837.043212] dump_stack+0x1db/0x2d0 [ 1837.046927] ? dump_stack_print_info.cold+0x20/0x20 [ 1837.051936] ? kernel_text_address+0x73/0xf0 [ 1837.056351] should_fail.cold+0xa/0x15 [ 1837.060257] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1837.065362] ? arch_local_save_flags+0x50/0x50 [ 1837.069937] ? lock_release+0xc40/0xc40 [ 1837.073993] ? rcu_pm_notify+0xd0/0xd0 [ 1837.077969] should_fail_alloc_page+0x50/0x60 [ 1837.082455] __alloc_pages_nodemask+0x323/0xdc0 [ 1837.082475] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1837.082498] ? __kmalloc_node+0x3d/0x70 [ 1837.082531] ? rcu_read_lock_sched_held+0x110/0x130 [ 1837.101160] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1837.101178] alloc_pages_current+0x107/0x210 [ 1837.111105] push_pipe+0x3fc/0x7a0 [ 1837.114796] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1837.114818] ? iov_iter_revert+0xaa0/0xaa0 [ 1837.114837] ? unix_find_other+0x5e0/0x5e0 [ 1837.114855] ? kvfree+0x61/0x70 [ 1837.114867] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1837.114880] ? iov_iter_pipe+0xba/0x2f0 [ 1837.114897] default_file_splice_read+0x1b1/0xac0 [ 1837.114908] ? unix_find_other+0x5e0/0x5e0 [ 1837.114925] ? sock_sendpage+0x8b/0xc0 [ 1837.114938] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1837.114951] ? iter_file_splice_write+0xfc0/0xfc0 [ 1837.114965] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1837.114981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1837.114994] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1837.115011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1837.115024] ? fsnotify+0x4f5/0xed0 [ 1837.115042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1837.115055] ? __fsnotify_parent+0xe2/0x450 [ 1837.115069] ? fsnotify_first_mark+0x350/0x350 [ 1837.124204] ? splice_from_pipe+0x1f5/0x310 [ 1837.124220] ? splice_shrink_spd+0xd0/0xd0 [ 1837.124244] ? security_file_permission+0x94/0x320 [ 1837.124261] ? rw_verify_area+0x118/0x360 [ 1837.124272] ? iter_file_splice_write+0xfc0/0xfc0 [ 1837.124287] do_splice_to+0x12a/0x190 [ 1837.159161] splice_direct_to_actor+0x31b/0x9d0 [ 1837.159175] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1837.159203] ? do_splice_to+0x190/0x190 [ 1837.194463] ? rw_verify_area+0x118/0x360 [ 1837.194481] do_splice_direct+0x2c7/0x420 [ 1837.194498] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1837.194520] ? rw_verify_area+0x118/0x360 [ 1837.194536] do_sendfile+0x61a/0xe60 [ 1837.194560] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1837.194576] ? fput+0x128/0x1a0 [ 1837.194606] ? do_syscall_64+0x8c/0x800 [ 1837.194619] ? do_syscall_64+0x8c/0x800 [ 1837.194637] __x64_sys_sendfile64+0x1f8/0x240 [ 1837.217063] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1837.217077] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1837.217097] do_syscall_64+0x1a3/0x800 [ 1837.226034] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1837.226050] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1837.226068] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1837.226088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1837.226097] RIP: 0033:0x458099 [ 1837.226108] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1837.247443] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1837.247456] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1837.247464] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1837.247471] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1837.247479] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1837.247486] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1837.385853] overlayfs: failed to resolve './file1': -2 [ 1837.475413] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1837.478875] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x200000000000000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:34 executing program 2: r0 = socket(0x11, 0x803, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x40) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x8, 0x0, 0x100000001, 0x100000001, 0x0}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000380)={0x2, 0x201, 0x6, 0x80000000, r1}, 0x10) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r2) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000001c0)={'filter\x00', 0x0, 0x4, 0xc3, [], 0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=""/195}, &(0x7f0000000240)=0x78) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000002c0)={0x2, 0x36, &(0x7f0000000280)="556c3de03ba5e219c0e72620465c4ea27e62472e0d97e555a56cd8a034085fb910cd1f71df1f8e44bf550a3a8047cac9e6d8ebb3abae"}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f00000004c0)={{0x9, 0x4, 0x100, 0x0, 'syz0\x00', 0x4b2c}, 0x0, 0x100, 0x2, r4, 0x7, 0x3, 'syz0\x00', &(0x7f0000000440)=['filter\x00', 'procvboxnet0posix_acl_access!bdev\x00', 'filter\x00', ',\x00', 'filter\x00', '&-&%(system@@lo!em0lo\\}GPL*+trusted@\x00', 'ppp1posix_acl_access-,\\]\x00'], 0x77, [], [0x81, 0xffffffffffffff24, 0x5, 0x6]}) 03:38:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000200)=0x1ad4000000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[0x3ff, 0x10000, 0x7, 0x20, 0x8, 0x8, 0x4901d4e8, 0x6f]}) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) fcntl$setsig(r2, 0xa, 0x36) pwrite64(r2, &(0x7f0000000180)="4a63b5d9b8df248fe5280fc5f7168627345f0a1007105ea503f92b0cbd333bebdd67d6b6a47bf003bb3ead0850fe171e54eed6c9ae8a4aba6434832dbc720e1042257f940f9edc3e86592017241198a9", 0x50, 0x0) 03:38:34 executing program 3 (fault-call:5 fault-nth:38): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:34 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97502a2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x00\x04\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1837.657618] FAULT_INJECTION: forcing a failure. [ 1837.657618] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1837.736767] CPU: 0 PID: 12427 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1837.744065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1837.744071] Call Trace: [ 1837.744092] dump_stack+0x1db/0x2d0 [ 1837.744109] ? dump_stack_print_info.cold+0x20/0x20 [ 1837.744136] ? kernel_text_address+0x73/0xf0 [ 1837.744156] should_fail.cold+0xa/0x15 [ 1837.756078] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1837.756099] ? arch_local_save_flags+0x50/0x50 [ 1837.756111] ? lock_release+0xc40/0xc40 [ 1837.756130] ? rcu_pm_notify+0xd0/0xd0 [ 1837.769125] should_fail_alloc_page+0x50/0x60 [ 1837.778083] __alloc_pages_nodemask+0x323/0xdc0 [ 1837.786592] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1837.794945] ? __kmalloc_node+0x3d/0x70 [ 1837.794965] ? rcu_read_lock_sched_held+0x110/0x130 [ 1837.804609] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1837.804641] alloc_pages_current+0x107/0x210 [ 1837.813694] push_pipe+0x3fc/0x7a0 [ 1837.813717] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1837.813740] ? iov_iter_revert+0xaa0/0xaa0 03:38:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1838.056664] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1838.064373] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1838.071622] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1838.078962] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:38:35 executing program 3 (fault-call:5 fault-nth:39): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1838.086205] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1838.093447] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 [ 1838.113983] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:35 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) close(r0) r1 = dup2(r0, r0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000180)) write(r1, &(0x7f0000000080)="73b106823614cc509d40be7bf3a4e5c0422ca07ef4b82fee2d9351dd566ee392dc9395b7624f349613c809462dacd55970c4f03aea019dfddb764d0a989e814516f7dc38c4d7138b0f4559820c860f67ffa48a58aa097349b5ab4cc76840ca2dd8dd12cd88bff2e7d9b581d3c5ed70857fdd49d2069a12327011166a3aa3bede21dcd280fbcc35a5cdb2cd8c89f0607bf17f7df1f482b197aec2d0d24e3635e7c936a22b064fa328e382f8a25f70ae346da77331973a69328ebeee90e97a5abb4ed7c23ee1b75499e2e9d76477649ef914d521122a0578f8ddb9ae5a21ab2bded3f80b56", 0xe4) r2 = getpgrp(0x0) perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x6, 0xff, 0x3, 0x3ff, 0x0, 0xfffffffffffffff8, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x401, 0x5, 0x100000001, 0x8, 0x1000, 0x2, 0x1f6, 0x401, 0x7f, 0x1, 0x6, 0x10000, 0x100000001, 0x80000001, 0xb24a, 0xe7, 0x1, 0x9, 0xffff, 0x401, 0x3, 0x44d, 0x1, 0x3, 0x7ff, 0x0, 0x80000001, 0x5, @perf_config_ext={0x7fffffff, 0x9}, 0x20400, 0x2d, 0x8, 0x3, 0x8, 0x3f, 0x7}, r2, 0x6, r1, 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x3, 0x6f86, 0x8001, 0x4, 0x13, 0xfffffffffffffff8, 0xffffffff, 0x8, 0xfffffffffffffffa, 0x3f, 0x400, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x10001) [ 1838.182391] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:35 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000700)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000080)="d45470a8eccf3ed7fa2e541a7d22dec2310d41d5c1ffacb9407296cbafc7157fcc44e958d28eb3bacf847ee003e4e6fd7b4c46138cf012e0d2c6da870eadb38ae3d42a0e6773a92af62578739e49555214f48a50f5dd8b23e271ac2a13f570de", 0x60}, {&(0x7f0000000580)="74fd0b95f50e91963208d4d6b9b16bc14429bc9c409ccc8b3f9c5f13e53a7596431c049eb5ef1818d8737e85bf6c4553f14554f5e2757973a53d883cae93c29b4e56b2fdf66380ba93605aefe5c3fb39715e153a29fd97ecc0fa527503b880206518eab2ce6f6959ce86abd3e1fdd5fd72b5ff4101f4ab2a4d2b757c822b29e8d32814e7e6", 0x85}, {&(0x7f0000000640)="8f036b148605181bb87ffa64065f30748bea413eef610f97ae82b6", 0x1b}], 0x3, &(0x7f00000006c0)=[@rights={0x20, 0x1, 0x1, [r0, r1, r0, r0]}], 0x20}, 0x800) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000180)={"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"}) [ 1838.264686] FAULT_INJECTION: forcing a failure. [ 1838.264686] name fail_page_alloc, interval 1, probability 0, space 0, times 0 03:38:35 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x4) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000100)) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000040)) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000080)={0x1, 0x1, [0x3, 0xff, 0xffffffffffff5557, 0x0, 0x8001, 0x3000000000, 0x4]}) close(r2) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000140)={0x742c, "17114f088db919699a5aacc5809f0b581de7bfc2441d819900a755e1973dc24a", 0x3, 0x1}) [ 1838.355447] CPU: 0 PID: 12457 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1838.362755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1838.372101] Call Trace: [ 1838.374685] dump_stack+0x1db/0x2d0 [ 1838.378319] ? dump_stack_print_info.cold+0x20/0x20 [ 1838.380626] overlayfs: failed to resolve './file1': -2 [ 1838.383332] ? kernel_text_address+0x73/0xf0 [ 1838.383356] should_fail.cold+0xa/0x15 [ 1838.383374] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1838.383394] ? arch_local_save_flags+0x50/0x50 [ 1838.383408] ? lock_release+0xc40/0xc40 [ 1838.410510] ? rcu_pm_notify+0xd0/0xd0 [ 1838.414405] should_fail_alloc_page+0x50/0x60 [ 1838.418896] __alloc_pages_nodemask+0x323/0xdc0 [ 1838.423596] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1838.428617] ? __kmalloc_node+0x3d/0x70 [ 1838.432592] ? rcu_read_lock_sched_held+0x110/0x130 [ 1838.437604] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1838.443139] alloc_pages_current+0x107/0x210 [ 1838.447566] push_pipe+0x3fc/0x7a0 [ 1838.451114] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 1838.456049] ? iov_iter_revert+0xaa0/0xaa0 [ 1838.460284] ? unix_find_other+0x5e0/0x5e0 [ 1838.464529] ? kvfree+0x61/0x70 [ 1838.467806] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1838.472816] ? iov_iter_pipe+0xba/0x2f0 [ 1838.476791] default_file_splice_read+0x1b1/0xac0 [ 1838.481633] ? unix_find_other+0x5e0/0x5e0 [ 1838.485864] ? sock_sendpage+0x8b/0xc0 [ 1838.489759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1838.495309] ? iter_file_splice_write+0xfc0/0xfc0 [ 1838.500159] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1838.504926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1838.510462] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1838.515830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1838.521365] ? fsnotify+0x4f5/0xed0 [ 1838.524977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1838.530492] ? __fsnotify_parent+0xe2/0x450 [ 1838.534797] ? fsnotify_first_mark+0x350/0x350 [ 1838.539363] ? splice_from_pipe+0x1f5/0x310 [ 1838.543691] ? splice_shrink_spd+0xd0/0xd0 [ 1838.547945] ? security_file_permission+0x94/0x320 [ 1838.552865] ? rw_verify_area+0x118/0x360 [ 1838.556995] ? iter_file_splice_write+0xfc0/0xfc0 [ 1838.561826] do_splice_to+0x12a/0x190 [ 1838.565628] splice_direct_to_actor+0x31b/0x9d0 [ 1838.570290] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1838.575137] ? do_splice_to+0x190/0x190 [ 1838.579180] ? rw_verify_area+0x118/0x360 [ 1838.583332] do_splice_direct+0x2c7/0x420 [ 1838.587461] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1838.592294] ? rw_verify_area+0x118/0x360 [ 1838.596426] do_sendfile+0x61a/0xe60 [ 1838.600141] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1838.604703] ? fput+0x128/0x1a0 [ 1838.607962] ? do_syscall_64+0x8c/0x800 [ 1838.611924] ? do_syscall_64+0x8c/0x800 [ 1838.615889] __x64_sys_sendfile64+0x1f8/0x240 [ 1838.620364] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1838.624926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1838.629676] do_syscall_64+0x1a3/0x800 [ 1838.633562] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1838.638484] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1838.643478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1838.648479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1838.653656] RIP: 0033:0x458099 [ 1838.656823] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1838.675706] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1838.683386] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 [ 1838.690632] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1838.697876] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1838.705253] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1838.712515] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x400000000000000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:35 executing program 3 (fault-call:5 fault-nth:40): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x00\x05\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000000280)=0xa) bind(r0, &(0x7f00000002c0)=@xdp={0x2c, 0x0, r3, 0x13}, 0x80) splice(r1, &(0x7f00000001c0), r0, &(0x7f0000000200), 0x3, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000140)={0x0, 0x0, [0x1, 0x0, 0x3, 0x1]}) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f0000000100)={r5, 0x1, 0x7f}, 0x8) ioctl$KDADDIO(r4, 0x4b34, 0x2800000) [ 1838.886318] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:35 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) recvfrom$unix(r0, &(0x7f0000000180)=""/249, 0xf9, 0x2, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) [ 1838.948999] FAULT_INJECTION: forcing a failure. [ 1838.948999] name failslab, interval 1, probability 0, space 0, times 0 [ 1838.982276] CPU: 0 PID: 12486 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #38 [ 1838.986620] QAT: Invalid ioctl [ 1838.989474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1838.989480] Call Trace: [ 1838.989501] dump_stack+0x1db/0x2d0 [ 1838.989523] ? dump_stack_print_info.cold+0x20/0x20 [ 1839.013229] ? fs_reclaim_acquire+0x20/0x20 [ 1839.017564] should_fail.cold+0xa/0x15 [ 1839.021455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1839.024571] QAT: Invalid ioctl [ 1839.026562] ? ___might_sleep+0x1e7/0x310 [ 1839.026577] ? arch_local_save_flags+0x50/0x50 [ 1839.026598] __should_failslab+0x121/0x190 [ 1839.042697] should_failslab+0x9/0x14 03:38:35 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x10) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000240)='NET_DM\x00') link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r2, 0x8, 0x70bd25, 0x25dfdbfc, {}, [""]}, 0x14}}, 0x4000) close(r0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xe4, r3, 0x4, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf154}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x637}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x22}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x81}]}, @TIPC_NLA_BEARER={0x4}]}, 0xe4}, 0x1, 0x0, 0x0, 0x80}, 0x4040004) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) prctl$PR_GET_THP_DISABLE(0x2a) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r4, &(0x7f0000000080)="2a59375c57d5", &(0x7f00000000c0)=""/182}, 0x18) [ 1839.046505] __kmalloc+0x2dc/0x740 [ 1839.050045] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 1839.055063] ? rw_copy_check_uvector+0x28c/0x330 [ 1839.059824] rw_copy_check_uvector+0x28c/0x330 [ 1839.064418] import_iovec+0xc1/0x2a0 [ 1839.068137] ? dup_iter+0x260/0x260 [ 1839.071764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1839.077328] ? push_pipe+0x417/0x7a0 [ 1839.081045] vfs_readv+0xf5/0x1c0 [ 1839.084502] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 1839.089888] ? iov_iter_revert+0xaa0/0xaa0 [ 1839.094128] ? unix_find_other+0x5e0/0x5e0 03:38:35 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1839.098365] ? kvfree+0x61/0x70 [ 1839.101642] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1839.106665] ? iov_iter_pipe+0xba/0x2f0 [ 1839.110641] default_file_splice_read+0x50c/0xac0 [ 1839.115492] ? unix_find_other+0x5e0/0x5e0 [ 1839.119740] ? iter_file_splice_write+0xfc0/0xfc0 [ 1839.124584] ? anon_pipe_buf_release+0x4e0/0x4e0 [ 1839.129440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1839.134979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1839.140514] ? fsnotify+0x4f5/0xed0 [ 1839.144170] ? security_file_permission+0x94/0x320 [ 1839.149098] ? rw_verify_area+0x118/0x360 [ 1839.153242] ? iter_file_splice_write+0xfc0/0xfc0 [ 1839.158079] do_splice_to+0x12a/0x190 [ 1839.161876] splice_direct_to_actor+0x31b/0x9d0 [ 1839.166554] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1839.171402] ? do_splice_to+0x190/0x190 [ 1839.173712] overlayfs: failed to resolve './file1': -2 [ 1839.175373] ? rw_verify_area+0x118/0x360 [ 1839.175391] do_splice_direct+0x2c7/0x420 [ 1839.175408] ? splice_direct_to_actor+0x9d0/0x9d0 [ 1839.175427] ? rw_verify_area+0x118/0x360 [ 1839.198084] do_sendfile+0x61a/0xe60 [ 1839.201891] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1839.206472] ? fput+0x128/0x1a0 [ 1839.209771] ? do_syscall_64+0x8c/0x800 [ 1839.213997] ? do_syscall_64+0x8c/0x800 [ 1839.217974] __x64_sys_sendfile64+0x1f8/0x240 [ 1839.222594] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1839.227179] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1839.231935] do_syscall_64+0x1a3/0x800 [ 1839.235825] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1839.240754] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1839.245781] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1839.250625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1839.255804] RIP: 0033:0x458099 [ 1839.258986] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1839.277873] RSP: 002b:00007f2de31ddc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1839.277887] RAX: ffffffffffffffda RBX: 00007f2de31ddc90 RCX: 0000000000458099 03:38:36 executing program 3 (fault-call:5 fault-nth:41): clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1839.277895] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 1839.277903] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1839.277911] R10: 0000020000000001 R11: 0000000000000246 R12: 00007f2de31de6d4 [ 1839.277920] R13: 00000000004c4f73 R14: 00000000004d8a28 R15: 0000000000000006 03:38:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x00\x06\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00') 03:38:36 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) close(r0) [ 1839.468584] overlayfs: failed to resolve './file1': -2 03:38:36 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x800000000000000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:36 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000002) [ 1839.587788] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:36 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r0) r1 = semget$private(0x0, 0x5, 0x90) semctl$GETNCNT(r1, 0x1, 0xe, &(0x7f00000001c0)=""/159) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x800, 0x0) 03:38:36 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:36 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000003) 03:38:36 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x800, 0x0) close(r0) [ 1839.867459] overlayfs: failed to resolve './file1': -2 03:38:36 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000004) 03:38:36 executing program 2: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x94) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f00000000c0)={0xee70, 0x7}) close(r0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4600, 0x0) bind$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x137, {0xd7, 0x20, 0x4, 0x10001, 0x8001, 0x5}, 0x4, 0x16e}, 0xe) [ 1839.954987] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1839.997290] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x00\b\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:37 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000340), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$packet(r1, &(0x7f0000000200), 0x0, 0x20000000, 0x0, 0x0) 03:38:37 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000005) [ 1840.237767] overlayfs: failed to resolve './file1': -2 03:38:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0xfeffffff00000000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:37 executing program 5: pipe2(&(0x7f0000000040), 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x280800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) close(r0) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 03:38:37 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:37 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000006) [ 1840.352661] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:37 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000007) [ 1840.551222] overlayfs: failed to resolve './file1': -2 [ 1840.552294] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:37 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1840.649825] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:37 executing program 2: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x4, 0x0, &(0x7f00000000c0)) recvmsg(r0, &(0x7f0000000340)={0x0, 0xffffffffffffffd3, 0x0}, 0x0) 03:38:37 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000008) [ 1840.847198] overlayfs: failed to resolve './file1': -2 03:38:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x00?\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$KDSKBLED(r0, 0x4b65, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:38:37 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000009) 03:38:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg(r0, &(0x7f000000ac80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[{0x20, 0x29, 0x2, "4bc333b8595a865187089d9bd700000004"}], 0x20}}], 0x1, 0x0) [ 1840.904114] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1840.961190] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0xffffffff00000000) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:37 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:37 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGREP(r1, 0x80084503, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) dup2(r0, r1) 03:38:37 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x2000000000a) 03:38:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000c6501b1b70893141183d91175ae9e56f61885fc719445f1e9409f0989c5319090550231efac3dbd8d07376f88e7183fbb2e4b49f4b6fa06698a68270c83aebe90900000588fea19128c2a299a1d2026a1e409ceee7723f7e84"], 0x1) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 03:38:38 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x2000000000b) [ 1841.268068] overlayfs: failed to resolve './file1': -2 [ 1841.292873] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x132128) 03:38:38 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x2000000000c) [ 1841.490338] overlayfs: failed to resolve './file1': -2 [ 1841.542925] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x00@\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:38 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:38 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x2000000000d) 03:38:38 executing program 5: getpgid(0xffffffffffffffff) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net\xafip_m\x02\x00\x00\x00f\x00\x06\xd6]\xbf\xb0\b\xfa\xc1\xe2.A\xad\xa40:\x90$U\x0e\xd3\xd3\x01\xdf\xb7\x8f\xea\xcel\x92;\xda\xeaq\xd7\x81\xa2A\xc8\xdf\x8a\x8d\xa3c\xaf\xdbpl+\xd2w\xca\xb2\x8f\n\t\a\xab;\x9b\x01h&\x83\xfd\'\a\x94\xfe!\x9dH\xa3\xf6=\xf2o]X\xa6e\xd5\bZ\x1bl2\xce\x99\x04U\x9f\x82\xed\x8eb\x9f\xbb\xf6\xdf\xd0\xe4|\xe8%\x99\xb4+S') r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000180)=0x1c) close(r1) 03:38:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:38 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x2000000000e) 03:38:38 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:38:38 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x2000000000f) [ 1841.922385] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1841.953309] overlayfs: failed to resolve './file1': -2 03:38:38 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:38 executing program 2: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) 03:38:39 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000010) [ 1842.161826] overlayfs: failed to resolve './file1': -2 03:38:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) [ 1842.232879] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x00`\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:39 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000300)='./file1/file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r2, r3) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x800, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r6, 0x402, 0x80000018) fcntl$notify(r5, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r4, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:39 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000300) 03:38:39 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd9750da2e9b9d2afcb677f9f706420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents(r0, &(0x7f00000000c0)=""/46, 0xffb1) 03:38:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000000)) close(r0) 03:38:39 executing program 2: syz_emit_ethernet(0x1, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], 0x0) 03:38:39 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000301) 03:38:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 1842.626906] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:39 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r0, &(0x7f0000000100)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a539d39c2bd6a40fa8c8aa024d86cdc834bc921c0525fec2541e21ccf67e1d7b55cabe9e068dd58ce565aa9a9d325ebac7627ffe7a54cdbd77b3", 0x2b}, 0x60) listen(r0, 0x0) accept(r0, 0x0, 0x0) 03:38:39 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:39 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x2000000f000) [ 1842.806740] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1842.969625] overlayfs: './file0' not a directory [ 1843.022930] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x03x\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:40 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x2007ffff000) 03:38:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x1000) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531df632572381004e4a84b5fe0140fc8b274c5f89f4a1f6f98ad1386011a979820dff9afda1a003d3b545ab7d5ef71d8ec6b0e852d6a4f662a573ed31bd0e04ab16112c692112ace8c2e6e37e3f4839efbcd7eaf8cee090c554624249e68a32611350f1c0ba89a2b0c887a91aa2e7e2f633cceb56fee13bbbb03d8ff00672014516020e5"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x80000018) fcntl$notify(r3, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:40 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:38:40 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x200fffff000) 03:38:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') fsync(r0) write$binfmt_misc(r0, &(0x7f0000001780)=ANY=[@ANYBLOB="73797a31e5ff4b201a1a2aff8b8af8ef8ad90fcdf1bd0800000080df200658085f00b0338b6969c27b4f3690233847455afb5d9ce0dc2fb1ebb1295d05a38002c8c5b3ec10f37efcacb9fc738426b4c7f51596c200e5deaa505e2019d39a7b1ecd4f6640fc39824ed3ced4905e78ce5e65d3ff79572110d2884f990625f19bdc877607e5783f1207000000000000004e16efe2ca4ebc507b7cbc81c16709476b420ca4206f6161e9c64532e62affff400d3967c7323a5dc2c53ac2f968d525183e60be5bb7955dff6330ee58957b5314eeaa0690000000000000000000"], 0xa7) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000040)={0x6, 0x1ff, 0x3, 0x0, 0x4, 0x0, 0x5, 0x4, 0x3f, 0x400, 0x2, 0x7, 0x0, 0x80, 0x6ced6804, 0x0, 0x8, 0x6, 0x3a22}) syz_mount_image$ceph(&(0x7f0000000280)='ceph\x00', &(0x7f0000000400)='./file0\x00', 0x7, 0x3, &(0x7f0000001600)=[{&(0x7f0000000440)="c27c83c49fb7cef2c3aaa3529c30a8fe21a617f784302950f56ca77fc07fe72de616da71be40a99d89c6985354d9a45f7eb8dfb4fecae66a54c2582919f512cb078690b8d3bc2497681a9a77a64436c38440e67a81e0cfd52dbc8c77b4ced8ea525fd64e24be1bea3fadd89311a48c5adabb6edd10ef8b5a11ff4d45fcc98f0ac1ec", 0x82, 0x7}, {&(0x7f0000000500)="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", 0x1000, 0x5}, {&(0x7f0000001500)="43c6850e25adeb0a9b951801147c78edabe9f54a8260f2a40f936bec7b5fc2ac5a7ac618c28cdb0a176846da3244863f9d5cd317846cdc6bd99205661880eea6b82e1805d40f30ef6a2a703d79d99e9061871019015288379cd778c42915d1ab3c97f6ee3a15902b6c367ec1013815c1e7c7ca1fea75b6ddff38d2412c81be6cc7f87fad74e67731a1773769def32f945e38b4eb22e8763cd4ace66b777c49e170983d8c4a2fa71a20230000b255ccf347b8fed4adbb114d05c5f6f070723166c019f01cc087347e2da93954cd407314a9a16d05124133f5a6a47a1405f6c4e5e2764abf40cd243b4cf507f91827faf94edb8942", 0xf4, 0x8001}], 0x2000001, &(0x7f0000001680)='net/connector\x00') r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x800, 0x80) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/connector\x00') io_setup(0x6, &(0x7f00000000c0)=0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000016c0), &(0x7f0000001700)=0x4) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f0000000380)="f7d5e4e3d2a1c74873b287e55425cc9a5bccceb18a08e3baea8c12740270b6ba8cbd0d0bcc3a3639d0e7bfd0282fd689a8c0ae9f49ac00ee313652742d73", 0x3e) io_destroy(r3) socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x3, @mcast2, 0x4}, 0x1c) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000002c0)={0x30001, 0x0, [0x3, 0x7, 0x1f, 0x0, 0x3, 0x1, 0x7, 0x5]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x7ff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e23, @remote}}, 0xdc, 0x4, 0x0, 0x800, 0x10}, &(0x7f0000001880)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000018c0)={r5}, 0x8) close(r0) set_thread_area(&(0x7f0000000240)={0x9, 0x1000, 0x0, 0xfff, 0xff, 0x1, 0x0, 0x4, 0x62, 0x1}) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000340)={0x1, 0xf17}) write$apparmor_exec(r1, &(0x7f0000001740)=ANY=[@ANYBLOB="7340fbb218598b3fb67461636b20235b65a58a3c85985d2d949e74683100"], 0xd) [ 1843.299584] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:40 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1843.355900] overlayfs: failed to resolve './file1ßc%r8ä¨K_àȲtÅøŸJo˜­†—˜ ßù¯Ú': -2 03:38:40 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x200ffffff1f) [ 1843.408198] ceph: device name is missing path (no : separator in /dev/loop5) [ 1843.542762] ceph: device name is missing path (no : separator in /dev/loop5) 03:38:40 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000580)=ANY=[@ANYBLOB="5000000090780000"], 0x0) 03:38:40 executing program 3: clone(0x4000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\xff\xff\xff\xc3\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1843.697360] overlayfs: failed to resolve './file1ßc%r8ä¨K_àȲtÅøŸJo˜­†—˜ ßù¯Ú': -2 [ 1843.793792] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="fcfee1da43070ed3b01705000000043e425fcbcdaab72a741fbf6ce1ebed53bb7ce1a92947c1fff52c2a4b6584a6af04a3b5797da3392422aae8f6cbdea55d0c95180dd0735824046c06c5ab9f27d40901fe050781371a4f490e64cf7c459932b16ce463f5c69e29cea1"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) epoll_wait(r1, &(0x7f0000000380)=[{}, {}, {}, {}], 0x4, 0x6dd) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f00000006c0)=ANY=[@ANYBLOB="000400000000eb00000200000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000580)=""/171) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x80000018) fcntl$notify(r3, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f00000002c0)={0x3f, 0x3, 0x292, 0xfffffffffffffff9, 0x2, 0x8f8}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x10001, 0x3f, 0x4}, &(0x7f0000000040)=0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e24, 0x7, @rand_addr="6dcc9f62f84ed256beaf7163d16c035a", 0x3}}, 0x0, 0x7f, 0x0, "73ab69ce1af8ea593b69cf2cf0aa948a9a22678cf909462b6e8f099371a0d8e7e28c13fc3dfb7e9e0125d0457020b21e51de421f37592fa91776387fbee07e8a94d5898d3d66e702834f69a0f071881e"}, 0xd8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000a80)={r1, 0x100, 0x1000, "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"}, 0x1008) syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 1844.070119] overlayfs: failed to resolve './file1': -2 03:38:41 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1844.103185] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:41 executing program 2: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) syz_execute_func(&(0x7f00000003c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) [ 1844.173064] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x4e20, @multicast1}}) write$P9_RLINK(r1, &(0x7f0000000240)={0x7, 0x47, 0x2}, 0x7) close(r0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000340)={0x0, 0x80000001, @value=0x3ff}) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x5c, r4, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x35}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3e}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x3}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8084}, 0x24004890) accept(r2, &(0x7f0000000280)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000300)=0x80) 03:38:41 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) syz_open_dev$evdev(0x0, 0x9, 0x21deab3fe58fcd64) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) recvmsg(r2, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @broadcast}}, 0x9, 0xfffffffffffffffc}, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={0x0, 0xb13, 0x0, 0x5, 0x8}, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1844.304916] overlayfs: failed to resolve './file1': -2 [ 1844.394119] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:41 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x90001, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000140)={0x0, @local, 0x4e22, 0x2, 'none\x00', 0x10, 0x3f, 0x66}, 0x2c) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000180)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) clock_getres(0x7, &(0x7f0000000080)) sendfile(r2, r1, 0x0, 0x5) 03:38:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x01\xc4\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) set_thread_area(&(0x7f00000002c0)={0x8001, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x80, 0xfffffffffffffffe, 0x1, 0x5, 0x5, 0x38c}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:41 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x9d, "de08ee18d10ffb82573ce48ff595552f6af132df68b33060873026c656bf778b049b3092d1e4b67a588c6bdad2852ce3db5758a447bc5e19e8162bfa17f8d308587150c389e7d1b9a0a4a933c90cb1d1784f4a6e8ec260c8a6e854cce47088b52a1678f8bb04afaf3721d4d0e550b873b8d5c42519f3db16e0be9afad4a9924f350a95de2ac0ff1fd3dbf9ba4402575d9285083cd24cf72613a16881cf"}, &(0x7f00000000c0)=0xa5) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x7fff}, &(0x7f00000001c0)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4089) close(r0) 03:38:41 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={[], 0x70000000000, 0x265, 0x0, 0xed5c, 0x1, r1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) timer_create(0x7, &(0x7f0000000180)={0x0, 0x3c, 0x1, @tid=r1}, &(0x7f00000001c0)=0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000240)=0x5) timer_gettime(r3, &(0x7f0000000200)) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000003c0)={0x0, 0xe2, &(0x7f00000002c0)="9e87b11dc6895746d3ebbf8440ec781af89e52a60ffb94084e6f34aa65a4eaa5640d3f7d1a2089455c26d305adc0b5b03bc625ff9df517c39dffdf528e3f03beae13576d4b80488029f0c78d79891f5ae8d81dc4e68d1a1eba1cd0b4173d6eaa18a6a656078fe23accdb2af859369b8260e0126c347134eb3277445370727f72b0c73f97b3d563047331eb1c7737ae5379302483ad0d9b079df61b51c8dd5cdd1491f059251b03807e985adf04600b9e6ccd5ee6b3ff7ea167d5ccdbe23599cad1d09129a54dba935082aeed42b068002c5f18204f14da61dd21669a97c9c0cc35f8"}) sendfile(r2, r0, 0x0, 0x20000000001) 03:38:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 1844.756578] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:41 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1844.903645] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:41 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3a) wait4(0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x40, r4, 0x424, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x81}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40488d1}, 0x8000) exit(0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) 03:38:41 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) syz_open_dev$evdev(0x0, 0x9, 0x21deab3fe58fcd64) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) recvmsg(r2, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @broadcast}}, 0x9, 0xfffffffffffffffc}, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000180)={0x0, 0xb13, 0x0, 0x5, 0x8}, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) [ 1845.132976] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1845.158211] tmpfs: No value for mount option '¨6Š›ø]Åcše!­?šteéòcÎZ%š' 03:38:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = getpid() syz_open_procfs(r1, &(0x7f0000000040)='net/dev\x00') connect$llc(r0, &(0x7f0000000000)={0x1a, 0xffff, 0x0, 0x400, 0x6, 0x4, @dev={[], 0xd}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x404200) close(r0) 03:38:42 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f0a6420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) [ 1845.190625] tmpfs: No value for mount option '¨6Š›ø]Åcše!­?šteéòcÎZ%š' 03:38:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\xff\xff\xfd\xfd\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000140)={0x0, 0x0, 0x3}) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000080)=0x400000000001) sendfile(r1, r0, 0x0, 0x20000000001) getsockopt$ax25_int(r0, 0x101, 0xdd65b3e83c4ac291, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 1845.285011] overlayfs: './file0' not a directory [ 1845.417315] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') capget(&(0x7f0000000300)={0x19980330, r0}, &(0x7f0000000380)={0x3, 0x6, 0xd95, 0x7, 0x3, 0x1}) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x2, 0x2) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:42 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f236420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:42 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:38:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000)=0x22, 0x4) close(r0) 03:38:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\xff\xff\xff\xfe\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1845.752592] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1845.761147] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r3 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r3, r1, 0x0, 0x12, &(0x7f0000000000)='user#-self}:self]\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 03:38:42 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1845.985458] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 1846.148270] overlayfs: './file0' not a directory [ 1846.182717] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:43 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) setns(r0, 0x1c000000) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000001c0), 0x2) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000080)={0x3, {{0xa, 0x4e20, 0x2, @rand_addr="a7a4a8e039a9b6504c7c09cc9caa1f22", 0x20}}}, 0x88) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r2, r1, 0x0, 0x20000000001) 03:38:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000480)='./bus\x00', 0x20) r1 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x200) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000380)={{&(0x7f0000338000/0x1000)=nil, 0x1000}, 0x2}) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000640)='cpuset.memory_pressure\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x80000018) fcntl$notify(r3, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) getsockopt(r2, 0x2, 0x1, &(0x7f0000000580)=""/165, &(0x7f00000002c0)=0xa5) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:43 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:43 executing program 2: r0 = socket(0x18, 0x2, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 03:38:43 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000100)={r2, 0x9, 0x80000000}, 0x8) 03:38:43 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x800000000001) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) lstat(0x0, &(0x7f00000004c0)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 03:38:43 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r5 = userfaultfd(0x0) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000100)={0xaa, 0x200000000000}) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r4, 0x0, 0x2000000000000022, &(0x7f0000013ff4)={@remote}, 0x6) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) close(r4) dup3(r2, r5, 0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3, 0x7f}, {0x3}], r3}, 0x18, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 1846.571528] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\xfd\xfd\xff\xff\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:43 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x9, 0x4000000000ec2, 0x4, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) [ 1846.636348] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:38:43 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={r2, 0x54, "cf0d42c20dfb8c1d8e945193d2adbd10b681a7289e9b6470650e1f688d117f6bf95901791c612ea16320d14731905bcf6d40375c03bfc2e7a57eafff4df528e1cbb18339231836acef396e712372465fdac9d7dc"}, &(0x7f0000000180)=0x5c) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) [ 1846.923238] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1846.930374] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$TCXONC(r1, 0x540a, 0x3) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x80000018) fcntl$notify(r3, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:43 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$kcm(0x11, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000000180)=""/115) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x7f) getgid() getgid() r1 = accept(r0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) getpeername$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) dup2(r0, r1) 03:38:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x1000, &(0x7f0000000a80)="8415f9ae55f9e047378d3c532103d90ff81f55a96bbd759305da3f91f8922f996e340aaf01f39b3b4214a3d1fe928c4cf1a1eb72d47c43f95264a324832f88d3a1c1da8b196c10afdacbbe1d64236bff65bfe9833d5ab734ea49d0f65fed00bd97dc2218247ff3c335a4377b92a51d7e5e04ad887d09c986cb4171348ed1371e0c4cc30d37a1308a07b17c3ecfccdca8220c98b5198bca8e484ff9a2416d9e9840bf4fe6a34bbc05856c12ce5b3b2fcd0cb403f2d07b0f583f382464c9e4f9d5be6f65a74159e3cbe894a3152b68f710c8d0ce0dbd9ad0a9f2f9c294bc2b6b07e5580cf55e3168f1db299d2ea3648bda33363739b7c9182ff6d55b1cbfd31f1d94d4a5a47c04a6ac43763cabf41c6ec19958bf8bfe8b037525614d3b72f4dfd2c93c22ad06fe427ecfd82636b80c33981b3dde2f3cb9b52e822f6129b378a9bdc2dbd3f52a5ff742501104959358ac4be389a12293950a1124338f01636c1ac5d2d58e05a7bbae74e956d502107f9d64fbd018c7496a3c5b7ff5e968f5f6dc7afa52acb6164cf45d762c104d20121b409fb6924313ce4d9ad5d67b75ef5fbb1a49d98a4e21fddbf42f7e72e8e0e3fc34ac79cc5a7352748fb6f0699c884800c6dbd58d12d3fc701c10efd0a69aac736ea7d0a3cc0f5978acdb89d1beafb1738817e24c7ad05cca4e9399b8d8f571db34c176cdedc031d66c507a24522c4baae91eae7baeacdf76806fa423e78928b7bcfd0f312330ef47f493fb88bd8cd9ea2897d30d01ea57ba7350e863d803d0a66ed30dcadac6ae6cdd599db3e4d93e73855fcc407d31f3b6ce85ef3efd27fb3c9812aee31fc6127e548b21ef3f45bbf73061dc38f61b73dd419e6086b0043c7b12e5287ef9c21d4eb44f29e8cd9540190b99058019bae5a57e7022c6e8fa8143ce1be6c48133594647c21a51947ca8e6bc027a41acb0247d286693f4e0995a5e20da335dc7a9d832c53d0074d2d5e1a19311ce92f1da6715aa33ed6bfc42a5c75fca885e0a1b9c833b5e82245f77d1cb80ba6adedb6e40e4805d58c8a18b8b5a9695af9866069aea129e8d3cfa4693091cf3105c70387d365cd863487f8e5c18b69d21a04c2abc37b5b99409eccc82fd752b63b7737d14ba2f883711b42583e9b2f965e1ca9cba01ac6c127d20036ed88bc7e003290b2f9f4707f7cc57496519a6bb9705f7464a22aca3e00cfdd04719d16cb85360236dbec2cac7cce35bb47c9089206836821fe802a3ec9bf9a5e40f454f07d585f7059b1d8c7560a1d9c8d934497835bdd2701427aed24c7961a33f05aaefdbeee12b9c9659c6b0e5ec28f4c946a49cd442bb36a15bf694574db31f30f668380582574d1c1c1203855173469c642995db5b17c2959f1d5561f21e1fc1b1773f745710faf9686ecf447292126b364caef1a9bcdbb957d9cdb70046a6a4701ffdb963e18e1a9110761ddd42c8b695c06bd0c3ac0ced4d42ffd0c88f22f48c2a3373499ad848a58a3aa3993ff1a546cf30c7ccf6c196b95af5c066990b009545e0b1276708944624eb7391dfa3990294cec45ae29bf0c12b4af9a2f34e37543746b2d7bdcb9251c7c89526870317e09edc844f6b6152be538459bd45dc14639621528d3c9239eb07c49ec94b53e3531ae19b3363e3f4bb405a3ae04d4d380189f567b0893e9917eccf73759e3b52b48d0ea2015f7f27b84805f6a0e35955a67e9bb7481ffcd501e2a69994c9c604587461fb22d10c9c4505e098c66a7ee0a1e54350c1009632b8660650e335ed3ba775f873ce9d57bc14b9024ced584f15e578f85f1627e4424d4bba66125f6780d7cee6a79295a6cc1a06e24bff7ed5d98427b14637d95740dab93e417690eeed7dea354f10ccd636cbc9eab27565bfab1024aa9e07b0761fee81fb804cc02fa1af2dabe64b127aa622831e31079bfb97aa5e050641913f74530aabd955bba9eb58f484706e0f7384275ab4941823fd2e7a98115a98099aea89cf07aadda6f8d6794461be0c8ee9fe4c6927c80da1d71ac45743edcbd3abeaec8797a39ff9f309d006813cb1d336e27a23ea9fba8e6fa80b07ee3210c0224aee842c61aa1c73e2750eb41dd63022a0c19ddb4c7da40e150b2efa5901bdef9912a6a6ba609f9fc858d7a216c0d528440404e067f4223b972a8364d99e6a34b082c49eef75e12295ba814d3a1a4cc94038e2a3071a318f5de80fd369ffdfb1c3df1e8b34be451b3a031a030c5efa6ef65e301a30609651a064bc5e8d5f0ac53ea59b0e5c4488d0f5f8be16545be269cef8bc39fcc7f2649fc0ade70fc7da2c0bb798a0fb73cf519157152ec9b34e7e8db653db736877af35168c68cd0a4758180f62fe4ed309c943fdab5fdd5159a054447f8f6d43e8a68d1b59f6882515232f2237dcb9a7b13bd9af921b9ed066c36d1537813a97ed30474116b959f97d6587a942b91026bea55046e78c3d9d7112e09d73dee9a78730d77997604259686a0da8863ca598d1886230edca2dbde4b2aad96ce08707aed8a0524e3e529ffe6f4031d47855063074ef25392566391d91ecf988ba3fd2ce36c9145538955a1721ca22df7b38d1e036e8d24a0bf53b0b7cf7c8bfb6519f3d26bd1f466ac50df52d265d6480fe664ed2f9155d2f2d2bb7c6daf8a7e7fcb5949eb66ef11e2c7c3f25b719b2234b5c2e733b6da7547aa56ea747129ae39f7a49a9d6b9095c66a20a8f5846f595520357642c1f4cdb7899e07e23e2f91474b392b5d967a84a678ec8798fd54000db2d728956bbc73f429a9fbc45b24069e354a348e538b4995d2f0fdb1778c010d6f540d9893cc58627696d028de25ed7d13423ed20e857422447385c9cafa41dbb909f5eaa1cda556cd04366b677d04e4a476feb4cb973db950069ce9f3271108080fab7a8a7d38af026d5e1e9631b7333e475d87ff7136c35265b67807126e9655b46b1acd7c9730fc67cb7e368fe2bf9dddff64216cca40cb22aa48e9d6e7a17f13e067f94c25d2a9a3639322b3dcc7421a1e5fd7d7a37ce985f67499e97965cddd7295837bb2c387945805d99bdba3e7deb8b5b4b4010535a573186659dcea2e59584acf0bd15ba611001ed896125f6e955f7c9e97ed93a825f1f23bef15659fd8488ae987efda54af896714c0f3cc7ce92124a03a3d7071cc7ab73dd533cddb3a534a0fb677e4dacad9c916a5434794ea476f015a493906fc18511efe0acaadbfd67eacb4835937ee78ca01c3f1160a4362c790312637a82f37289ee5389f5fb82499bdfd512abfbc4d6e4d6b3aba76db142f9be612d846d8c5d8b2c1c2b9af18ac61e67835009a7393c05f34f1090ed8c1e2a43380bcd78308a6069a5a3c3ca65422630e0fa61f065d57efa7ef681c5cadf58cdd215fc2909766b06a393d2a595910a36a2e070eb2a4c61d259d6692b14a13eae7051864f9a10a33c14f68b1eb4d45da657364c5fd64ef9461cef6de00b52a4f35b8222af8e375f510a5f8c44bb4e0d2619ac04f2493917caa6ed0bed9b3af79fb6aa79e46fafaf246f5b98f541ce7ff1581d7c75c40fbd0ec1f3b7265c7ceea958cd20583b06e38600a637d0b3d1963cf01c2d71ede5680b0354603d91d6cf9315afc35bf77762e01c1b3fd32d8de7414354fe193e3825ca5737dd9944688150793342bbd7dc4fa4e68aa1e7473b7fbe458996f170193fe903ee60bedeaaaf75a9a8984203d6eba9110aa0304b373a0598a5dc10dfe70130b7efea32b6b2fc9a0b76facbbf0407f00afe767c7d72872c58c23bd20bf3d9867ad677487d15891da3d807cc53aabd87bbbe32afdcc07808217f1703077e78a1670ed36b14f6eb2a4a63e8760364ec68c034e1ace68ae76650861d59e9c1629c1e7f802e29b8cb885de744635992d8ae6103cbe317f472b2ccee24bf65cc486ddfadd884819d19c002ac77d3a64a755adc63d84dab096dabbf122f305a289044acf68f8dc87cba15152b9f8c9010a45a625c51e5c63f6e4d91baf9bbf169c3711de4e9d1e578908a184a71c6c4b216790634ea83cde563e8cec6e0f0576846a3d85fd8465e37502352d6f8587781082096aeca5d25c976f7ab3c2780cea4f22bbb72aed75cc53b4d691227cf8268d555b9adeb6d7c5192d1acb772bfa2a3dabb9cb16c28bf7731e859dd30c72f9620f6b214c8010e9b7d0d6ead804109589e0c974cabbfce0703b113eef8488d68e71e452ad839ad3a27cc24ac544e4b825f6a5e42faab8c3e58b97b4db026cf54c70530f02416c033ef6e69ced36eb0ba653185ca2ee08455a2e203533ebecf09085c636acc8d59df4471f64e0b4e22a090914a4a44e4a04ffcc82de2c2be67b97a9aa4393a4adcd5a3d4c11a1ee9c6a8db4a486e49ed20bddf25f80b9f686aa18d33cdb6da2ba06569e9a895bf35d581c0d76cbe5b46ffbc8fbbb6ee1f1bf73aef464a102f8c17f57441407f47e53de08d0c74f7ec5b34f55d8ca66e981ff730840f46fa46dc6444077ea1682b6508a8322d8c974630d5fda10b05ee72499bf148c0453d99b3633e367771efcfa0e06f8024e413d2a6acbe1127b607ef8417f402b017387cf7f6090c9c56effed7308f989f0d305d8febaad432421f78145253726a68d5bf781d136ab17cb71fbb1aa8db42dca739a12c49519247709b26196d4220efb77a0ba1fd5dc4621b56463d48aa706b37d6e08444098ed4dfc40fb30e0851c52bf72a6f87b54d4e4a3bac7fca56981925676303a85e01bb067e777c9f573c4d145260e19270ac131cca0535b20e6de1a53b5bc9ba256c951f6966804adc9d3b450b06506c674ecee61e7944877f9c3cd99df809d20a896de00cd8f6e13aef68c6ddb39ba242ee47a02a8988bba2a2f430cc2b54f5ce20c9132ef0181e213962761a141539e66fd2e5dec9b1e29520201e84f8ebb462884d6a474622e98f17d2ae70f87023b5bc64dd87bd280a20bd22c60fd9bc315676ae7dbf813f06e4524df99dd9e07e7b81eab4de1ab72c0e0e1cd4fd7eef4ffcc48eac7e4f523a9e8e56a4a9483caa57c03fc8b1a47fb77ada6d9b774812a5ae71b25a64e3ae2466f09a4370831bab112e3b292d109113786694c0d78369c741319afe710a0047cf86893d3c2797f216c7d08e742e32e1d0dc077cf4d7b6847574ff52db9a0e3d0f72d7ad33943a0d2b1bbaa16e8b0611dc27e77f29ab564c35943191a48632bf2124d5772479cdada6cca48bc9d281d22c835eb2b3fd707bc73bfae708952a16ee6f58ce5c6c90bede76b589490372d8f68ef7bebd1ad0a5f59d5df201d504a129df314faa9ced5ff6a307954f8527aff5040ebf0aa4edcdb05c2bfcfc7feead1a67b768a2741dc3b0f8dedae3c729713370e9932973d7818a81705cfd7a0cffed534cb68761bd25c66eb35d4d5fbfd25e83a1294b56064ed20dc72e4cc99981679112ea936d511f410561b132947247c47420f8d25b2df0de544db33d7f63047de13b5338f597d479bde8baba8bb3dc89ac2ec3df6971e9855e386bb58d9b7402c094818895d41448d790559918e2b9ad7aa9ad8eb7d9449b00fa7fb0219a0f63a253dfaa98330b9a84de6d3d235089583b493dda27222cae62d222034571d80e7a97b0139590e027db57c4ed3d473983cf15932a2526b62a74961eefc94e4e7531d303c40d8737f4c4837c6b465d843d66b9cf47b46ef8e96384136d4667629f5ecbeb72a64730bcf8fc5585853a914f0e988494f769ebe37a0b0ccbfbe64bab95e704a83facbef15c674e25af5ca1200d71d0ae731520ad"}) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)=0x100000000) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000200)=0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000180)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) close(r0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f00000000c0)={0x4, 0x20, &(0x7f0000000080)="32719a5699116dbed1b3daa972c8082ccdf5ac711299b539d227449498076a67"}) 03:38:43 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xf72, 0x8080) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000200)={0x4ad57d91, 0x4cb800000000, 0x25, 0x102}) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x30cb, @loopback, 0x40}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000440)={r3, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x800, 0x5}, &(0x7f0000000380)=0x90) exit(0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000003c0)) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) mq_timedsend(r1, &(0x7f0000000080)="51d3ac5d1c39d01c540d6d89f3c74114f1d3cd6b56f6da554530d8d9ea7880770554cefa2706fb0610bfdeda1cd4d1ed0b34bf759abe285ea50dc4f8a10d07f6c0c8d597582ceaccfda1bcc925d2f4ce9efb94a3f1d0d6fb5fe6464357c4ec64a66655a7acb65621bbcaffb613363d70a86274be58137ffe0104e2a9a7c78bbabbe32df4aca17f4744abeadbbf7df8f2e21d2d412e215fce9f7838399c940ec34ae92b60509152c90fc96a8efc75d080bbe52907f69acb5f8f0144acfc065ca94185dbc1622fc413edc70495501929a3018370f405593b8003c435085c14ca", 0xdf, 0x9, &(0x7f0000000180)) sendfile(r2, r1, 0x0, 0x20000000001) 03:38:43 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:44 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000080)) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 03:38:44 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) exit(0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f00000000c0)={0x0, 0x10000, 0x0, 0x0, 0x101}) sendfile(r1, r0, 0x0, 0x20000000001) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x100, 0x0) [ 1847.244988] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1847.279151] overlayfs: failed to resolve './file1': -2 03:38:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\xc3\xff\xff\xff\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:44 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) 03:38:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 03:38:44 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000380)) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000140)={@remote, @local, 0x0}, &(0x7f0000000180)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000001c0)={@dev={0xfe, 0x80, [], 0xa}, 0x1b, r2}) mount$bpf(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='bpf\x00', 0x400, &(0x7f0000000480)={[{@mode={'mode', 0x3d, 0x4}}], [{@obj_type={'obj_type', 0x3d, 'wchan\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x10000}}]}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000500)={0x5}, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYBLOB="7a000000e6579110f0c8da03a7a8e9f95c1b085aed1eb4333d7ef81d34a1d68c438c23b0e215461e21590229b4e32720234a586fa548d7269a0ca478d4d0b47ada23392977bd7d2e84ea5b8a3d711205c8333fe548642f43609fd4aa76961798fd99fadcabc774b3a3e3c236b2c1ab9ff8e1f69c1cc4317e10c20de7f7a0d273314e0ed4d8b7075d16610b18f4204fdd"], &(0x7f0000000100)=0x2) r5 = getpgid(0xffffffffffffffff) capset(&(0x7f0000000200)={0x399f1336, r5}, &(0x7f0000000240)={0x7fffffff, 0x10000, 0xfffffffffffffffc, 0x7, 0x8000, 0xa39}) [ 1847.577301] overlayfs: failed to resolve './file1': -2 [ 1847.598994] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() clone(0x2e828903, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x9, 0xfffffffffffffffa) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) connect$bt_sco(r2, &(0x7f0000000100)={0x1f, {0x7fff, 0x4, 0x7, 0x1, 0x0, 0x4}}, 0x8) wait4(0x0, 0x0, 0x0, 0x0) finit_module(r0, &(0x7f0000000000)='GPL\x00', 0x3) 03:38:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000740)={[], 0x800000000000000, 0x7ff, 0x6, 0x0, 0x6, 0x2, 0x103001, [], 0x2e}) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x80000018) fcntl$notify(r3, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) 03:38:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 03:38:44 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f636420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) [ 1847.974473] overlayfs: failed to resolve './file1': -2 [ 1848.013006] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\xfe\xff\xff\xff\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:44 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fsetxattr(r0, &(0x7f0000000200)=@random={'osx.', 'ppp1,*\xcd\x00'}, &(0x7f0000000240)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000080)) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RWALK(r1, &(0x7f0000000100)={0x3d, 0x6f, 0x2, {0x4, [{0x41, 0x1, 0x4}, {0x0, 0x400, 0x3}, {0x4, 0x4, 0x7}, {0x0, 0x3}]}}, 0x3d) close(r1) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f0000000040)=@netrom) socket$can_raw(0x1d, 0x3, 0x1) 03:38:44 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1848.094777] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="2d012e2f66d53dfb261616b05c81316bbb82d2801ccebadcb47a889ef15a51696c65301a3939c3a8dd0c53794ba26a61de3470f02e572ff2c3cb13085ec74c5f31d85c525bb6d1956a5e7fb407534bf5ce37e8249e4da3c9aa1ec9933b52f3d1fc43ce93b23f8f492638332d55cec4e71d0c0907aea27942d3cb2f48350120cdc9fc27cbc895c6a40b233de7a6e5d4f9159689b9a5047344e672c73c2992603164df502f18c89a1a01cff6b4c1b5ba4550654dc1f1a76baa0f4f1e0cb86ac18ca8041693fbbe7b724b03505071c2fc50603fe7172ee02c90247ea4491bb83d2599732a3fd56c46b481"], 0x1) [ 1848.263111] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:45 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000240)) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000540)=""/113) r2 = socket$nl_route(0x10, 0x3, 0x0) exit(0x0) getpgid(0xffffffffffffffff) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) capset(&(0x7f0000000040)={0x39980732, r3}, &(0x7f0000000000)={0x4, 0x0, 0x0, 0x0, 0x1, 0x3}) r4 = accept4(r0, &(0x7f0000000100)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, &(0x7f0000000080)=0x80, 0x800) accept$inet(r4, &(0x7f0000000380)={0x2, 0x0, @multicast1}, &(0x7f00000003c0)=0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x7e}, 0xc, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00082cbd7000fbdbdf25010000000000000002410000001000137564703a737d7a3000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4040090) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:45 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000040)) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0)=0xf, 0x9, 0x2) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) [ 1848.429250] overlayfs: failed to resolve './file1': -2 [ 1848.476109] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x80000018) fcntl$notify(r3, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f00000002c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) bind$inet(r1, 0x0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) 03:38:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02M8\x02\x00\x01', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:45 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:45 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000080)=0xfffffffffffffffa) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp6\x00') ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}]}) syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:38:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents(r0, &(0x7f0000000140)=""/87, 0x57) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(r0, &(0x7f0000000080)=""/130, 0x82) [ 1848.732819] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1848.869618] overlayfs: failed to resolve './file1': -2 03:38:45 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:45 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f00000000c0)=@netrom={'nr', 0x0}, 0x1a4e69d7d2532fe1) sendfile(r1, r0, 0x0, 0x20000000001) [ 1848.966106] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:46 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000140)='./file0\x00') fcntl$setlease(r0, 0x400, 0x0) [ 1849.143814] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1849.189647] overlayfs: failed to resolve './file1': -2 03:38:46 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x80000) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000180)={0x0, 0xc1, 0xffffffffffffff81, &(0x7f0000000100)=0xd4}) getpgrp(0xffffffffffffffff) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000140)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_PURGE_ALL_CACHES(r4, 0x770a, 0x0) fchdir(r3) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) 03:38:46 executing program 5: r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/ip_mr_vif\x00') r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) [ 1849.283529] audit: type=1804 audit(2000000326.140:677): pid=13437 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir360972205/syzkaller.RvOpTo/712/file0" dev="sda1" ino=16619 res=1 03:38:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="2f0012000400000000000bbf28d54f11ad1252951333497c5ba9257c2f99340cbcf4f62b8a4078ec992ff34c82a79f24e62aec77799324e9e7ea8b3197f47c3c2d13faa2b106dd1be8f81e91a89389799220ebf6c015c9717c4af399c71e41077e8f496222d06a14efc8ff0434d625e150a344d9b3520791d66ae985dd6e2f91f4f9b284a558ca4c9570908596acc0d6d1ad1a820bfb83f9d2ac48b6dc54ceed0deba390c656"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r1 = creat(&(0x7f0000000300)='./file1/file0\x00', 0x2007ffffc) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:46 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000000)) close(r0) 03:38:46 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000080)=0x8000000) fcntl$notify(r0, 0x402, 0x80000020) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="0e0000000400000000005800437ed1c3bd6319331527aa839f6e27bec3aceff58fdec30a6159939fb527c08b45cd35d5e1a03dfe4fb44c9d00b7df52c5a13cfd970be9c38c64c8d7076630f760c1d26249155c3c244cb3f3ff640b63dd857479592b06d4897e6a704f5227bf59edf93d7e1847861b29993111a66f32a0f052f20df3c4aecac43cf269f4a99de2aa7bf72d791ada0bdab14e50393bb6ed322fcbb23bc6f4c6ae065393e6aaf6bc27f35b49b7dbe24f7c422c804d7c89acfd1680d57ce8dca07ef574f172bb57de34a778f6bf5d43e39e2a99ade28d76088ca3319695322c035d1a25329f5199c69bbf2a71ec7da42709afa92995da9bb564317e37376128df29b4d1fbd15c8b983563e15ae6924da8c4a92c16dec609727a2bbe1dad73268146ecc4ed4a439e0c4aaab444235d2dfc08d11b0a28f591b5ebd39bdbbd0760373b2377ceb4948ade4ac9cddefdc5f1e0a6652a4fa12e6353e7a55d8052"], 0x64) sendfile(r1, r0, 0x0, 0x9) [ 1849.539577] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1849.547889] overlayfs: failed to resolve './file1': -2 03:38:46 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) truncate(&(0x7f00000000c0)='./file0\x00', 0x519) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000080)=""/55) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:46 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f736420a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) [ 1849.613994] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:46 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) clock_adjtime(0x7, &(0x7f0000000080)={0xcc, 0xd848, 0xd, 0x401, 0x527, 0x755, 0x876fd0e, 0x71, 0x1, 0x7fffffff, 0x7, 0x53, 0x4, 0x4, 0x4, 0x80000001, 0x80000000, 0x64c, 0xfffffffffffffffd, 0x6, 0x8001, 0x1, 0x9, 0x1, 0x7f, 0xfffffffffffffff7}) exit(0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f0000000180)={0x8001002, 0x9, 0x1}) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) sendfile(r1, r0, 0x0, 0x20000000001) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000001c0)) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000200)=r0) [ 1849.812340] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1849.823938] overlayfs: failed to resolve './file1': -2 03:38:46 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1850.025970] audit: type=1804 audit(2000000326.890:678): pid=13437 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir360972205/syzkaller.RvOpTo/712/file0" dev="sda1" ino=16619 res=1 03:38:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000001440)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) connect$bt_l2cap(r3, 0x0, 0x0) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000000040)=""/31, 0x1f, 0x0, 0x0, 0x3ce) r4 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f00000000c0)='A', 0x1, 0x0, 0x0, 0x0) dup2(r0, r2) 03:38:46 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={0x0}}, 0x80) mlockall(0x1) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r4, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x100a}], 0x1) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r0 = getpgid(0x0) r1 = getpgid(0xffffffffffffffff) rt_tgsigqueueinfo(r0, r1, 0xa, &(0x7f00000005c0)={0x2e, 0x100000000, 0x4}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0xca000, 0x0) ioctl$sock_bt_hci(r4, 0xc00448f7, &(0x7f0000000740)="395e9369c48e3bea8128c948c614d0a418f82d0f6fe4eca7324e4aa6bb68f643ddca105b425d0f94958c8d07a1361f835fe118c40f66283ff48389afe3a7759bafaaf22d4eb08e7f2dbda0c8690df28db96d967bcf0b913060e910234664d505486a3ff5b437cd490d4ed133fbc3964816811e45e0f7612cdc85c64c78ae4b46c16dd3b2d5e3715846c57881600b41ad72b3696b28950ba71b3a200d52068c969abc739e19dbba71d57ad8b939ae8fe46fc952fc9a2551e171f1fa6241faa300c1c742fed964c6c544910ab5932c491afa0c7373e07de22d6a608a958f959795ab1a8aa2b992b61d") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) rt_tgsigqueueinfo(r3, r3, 0x7, &(0x7f00000002c0)={0x40, 0x0, 0xcde3}) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x716146c91a665f38, &(0x7f0000000c40)=ANY=[]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="2f00be79000000000000638319bf62fd3b4500f93b252c684ba0fd09e45a9c53d14f035773cacc8b3aa6a283dd03dcacace178deac79427c5916c94b51b39a1093b8144db6870d1647ce1f28c1471a5a4ece3707f71afe2af77e2a18a2d5ad372718d454e47c36d27de373b2839f0870fb6888af1b4be0e6094bb557417261d0ec193820474673f7eff3864e520d26c4b96e37623dd5dec18470090e1b3ea91c5cf0c211185202de72f715b7429d1ec0"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, r2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r7, 0x402, 0x80000018) fcntl$notify(r6, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r5, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bridge_slave_1\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 1850.072162] audit: type=1804 audit(2000000326.930:679): pid=13510 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir360972205/syzkaller.RvOpTo/712/file0" dev="sda1" ino=16619 res=1 [ 1850.073069] Process accounting resumed [ 1850.113663] Process accounting resumed [ 1850.197937] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:47 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000040)={0x4, "5e9f7053c5f56bfc75d9469077d3a7a57428bc48f5d1b1636165b1642bbae731", 0x5, 0xc40, 0xfffffffffffffff7, 0x100000000, 0x4, 0x0, 0x4, 0x1000}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000180)={0xe, 0xa, 0x1ff, 0xc9, 0x80, "87c66cad46966ba3437a565fd2fd964e3fce2fbb7f1f41eafdf0668c8baef294f9b078cb481a6a3c4dd26c4e415fb59e7180e4e5d53c79a7356473cd288ecfd73051ac3164eae5a5e45a1cdcc1418c3df7ca05fa39e540b083e7ce1d2cb04485bcb039286fdb0886cc09ebc66d71c8e276852c1e268e95e263e841cf1615ce10"}, 0x8c) close(r2) [ 1850.306733] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1850.333068] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:47 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1850.512829] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000880)='./file0/file0\x00', 0x80fd, 0x60) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) read$FUSE(r1, &(0x7f0000001400), 0x1000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000c80)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x80000018) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={0x0, 0xff}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000680)={r5, 0x69, "b48af88c01a6cf8613d8e8ee3e84ae7bcd74169d47bcbddfcc56e2f41a299d795f311b8ca3ad36ec9fedb74922d726128ad22297b8b34e7a19c38fc266df2db88fb8ab9b529d0e2f6f9245627eac0e4d4ec919d784be1b3e95c8e89315717635a17f61ef026eaae83f"}, &(0x7f0000000800)=0x71) fcntl$notify(r3, 0x402, 0x10) kexec_load(0x6, 0x2, &(0x7f0000000000)=[{&(0x7f0000000580)="1a178cec570a3f82b5a6db06555b3c9934c1fed72e05ab1a791fb2b267c867d9f4ca2e2a2c33c0ab525aebf4c16b4786ec911b30928fbe9d78829e442655a2aa9f63827be9d67732030a76bfdbf79ff72d1be86eda455e89f3c54ec432070adf083a7d6c3636a9f4a7840421c554fef73ab3ff3e1d682e3515b30e117ade4687d0d6c5a1b48fbbef5c449bdf324fe9066ece063eaa95934f72f043f1879ce57648e69b0f2d432a117ad9e53541b9983f17a6f75b1a2fd166871e526b765b852ea2", 0xc1, 0x3, 0x2}, {&(0x7f0000000740)="6616215b3dcb1f3d2dde84af0d2cc5e76301728020b846bc39c3d6267101cb8cce984aed2c06e91820569c869b59f6d9b58e19c996666cc5338da715a0df67bb438ce2083ffc44f74de19fce184d3b8620e0fdf62bebdfe1ebb3135d2a14c6fe5393f1cf89fa5a0a131fb47874e1129c2066cf0386664bc4ecf1556646b66efdfd038212053d6fe6ff0395d9303f4f76b9171ccc6078bbe578bea0faddc414511ca6d39619afdc01493a1355a189fde3cd3f967b51517c4b8fd102", 0xbb, 0x6, 0x3}], 0x1f0000) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) [ 1850.773092] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:47 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:38:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x9, @mcast1, 0x9}}}, 0x30) 03:38:47 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x9a0000, 0x3f2, 0x2, [], &(0x7f00000000c0)={0x9d0001, 0x8, [], @string=&(0x7f0000000080)=0xfff}}) sendfile(r1, r0, 0x0, 0x20000000001) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x2f3) [ 1851.051485] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) close(r0) [ 1851.131874] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:48 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f00000001c0), 0x4) setsockopt$inet_int(r0, 0x0, 0x50020000000c9, 0x0, 0x0) 03:38:48 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:48 executing program 3: clone(0x2840000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x6, 0x9, 0x7f, 0x4, 0xfcf4, r2}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400202) close(r0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) fchown(r0, r3, r4) 03:38:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) rt_tgsigqueueinfo(r0, r0, 0x39, &(0x7f00000002c0)={0x3, 0x7fffffff, 0x9}) [ 1851.426186] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:48 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:48 executing program 5: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) [ 1851.631471] overlayfs: failed to resolve './file1': -2 [ 1851.709415] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1851.721578] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:48 executing program 2: timer_create(0xfffffffffffffffb, 0x0, &(0x7f0000000040)) 03:38:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x72, "091f46d4012f48ffd0ea5492081ac248ab72062b1aeb32d137536baef62a5769c628f0e00a90027b2c988127c76cdcd38f67392fcc6a08b96ac617968454987c0670e2a756bc6fea11187f124681ae5c35fbd9bd74a7417c2ba6ed51a53a7099217b20a12a1ff9a8a0e38818f52af27d3f07"}, &(0x7f0000000080)=0x7a) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r2, 0x7ff, 0x20}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$getown(r0, 0x9) syz_open_procfs(r5, &(0x7f0000000180)='net/sctp\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r0) fcntl$setlease(r3, 0x400, 0x0) 03:38:48 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:48 executing program 2: [ 1851.880194] overlayfs: failed to resolve './file1': -2 03:38:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000200)=0x6) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000380)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) syz_open_procfs(r1, &(0x7f0000000440)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGETLED(r2, 0x4b31, &(0x7f00000001c0)) close(r0) 03:38:48 executing program 2: [ 1852.018814] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:49 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x1d9c) 03:38:49 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x80000001, 0x10000) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000380)={@dev, @multicast2, 0x0}, &(0x7f0000000680)=0xc) recvfrom(r0, &(0x7f0000000580)=""/193, 0xc1, 0x2040, &(0x7f0000000740)=@can={0x1d, r1}, 0x80) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="2f00120004c26713eeb108e14d6184fb09dbd4431b5fa19568480a72153cf90370ebee509c959d32b5a569d5049cc6e7f9681dcb354ca33ab851aae385ae10f2c1266912a4e82e3759373941865e8f31a9d03deff521e20e143864f9bebd9c5b706d32c4fbde60f5f2a9c40093d2736d9e9f1ce0"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r5, 0x402, 0x80000018) fcntl$notify(r4, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:49 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:49 executing program 2: 03:38:49 executing program 2: [ 1852.392911] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1852.469896] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:49 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) exit(0x0) capset(&(0x7f0000000040)={0x20080525}, &(0x7f0000000000)={0x400000000, 0x0, 0x0, 0x1}) r0 = socket(0xa, 0x3, 0x80000001) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000001780)=0xfffffffffffffbff, 0x4) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) recvmsg(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) linkat(r2, &(0x7f00000017c0)='./bus\x00', r2, &(0x7f0000001800)='./bus\x00', 0x1400) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getcwd(&(0x7f00000001c0)=""/4096, 0x1000) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000011c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c6500000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaaaabb00000000000000000000ac1414bbac1414bb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0003001000000000000000000000000000000000000000000000000000040004552524f"], 0x1) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000001740)={0x0, 0xfffffffffffffffa, 0x7f}, 0xc) shmget(0x0, 0x4000, 0x200, &(0x7f0000ffa000/0x4000)=nil) fallocate(r2, 0x0, 0x0, 0x1000f4) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x21, &(0x7f0000000140)=0x4, 0x4) mlockall(0x1) finit_module(r0, &(0x7f00000016c0)='CONNMARK\x00', 0x1) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) lseek(r2, 0x0, 0x4) 03:38:49 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f702e20a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) 03:38:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7uI\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\x00\x00\x00\x00\x00\x00\x00\x00J\x9d\xc9\xb2\x97\xa3\x88v~R\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85w\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\xa70xffffffffffffffff}) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000080)={0x2, 0x7fffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x6) 03:38:49 executing program 2: 03:38:49 executing program 2: [ 1852.698381] overlayfs: './file0' not a directory 03:38:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000040)={{0x0, 0x1, 0x7f3, 0x3, 0x7}, 0x1ad, 0x37}) close(r0) ioctl$VIDIOC_G_AUDIO(r1, 0x80345621, &(0x7f0000000000)) 03:38:49 executing program 2: [ 1852.843860] audit: type=1804 audit(2000000329.710:680): pid=13731 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir197591848/syzkaller.hTawdt/654/bus" dev="sda1" ino=17897 res=1 [ 1852.943272] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1852.975282] audit: type=1800 audit(2000000329.760:681): pid=13731 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor3" name="bus" dev="sda1" ino=17897 res=0 03:38:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006e6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) chdir(&(0x7f00000002c0)='./bus\x00') 03:38:49 executing program 2: 03:38:49 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:50 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000080)={0x3, 0x0, [{0xffffffff, 0x2, 0x0, 0x0, @irqchip={0x2}}, {0x32c, 0x0, 0x0, 0x0, @msi={0x8, 0x10000, 0x2}}, {0x100, 0x7, 0x0, 0x0, @irqchip={0x4, 0x8}}]}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:50 executing program 2: 03:38:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000005, 0xff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 03:38:50 executing program 2: [ 1853.455844] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x8000, 0x5, &(0x7f0000000500)=[{&(0x7f0000000100)="9886cd26347502a2fad3ed1205f311a9f3b89522afd0801b445870018c088626c6edfc0afae1378678fda08a6cb5cfeb51b8fd4d1b640297e3607fb9016328496688e831eb17009ca83df5f5c04bd96c0f46189c671a652f2a5b6ae6b93e8697abb5177ea93a4172b5cc4144922bdf136319c7", 0x73, 0x7f}, {&(0x7f0000000180)="c15176411ba00f5fb7f092a6d20e77ae7a11f0b1326af9b63f1a1ff170ad8570dced732c8bf55106efe32af185ba203f012928", 0x33}, {&(0x7f00000001c0)="632835de67fe31602436c9b8bbc26af6138087a58b8f4accbf1f567060ab6b961649ec17b4b121a7058a5957c9e40ab6a687022c8f9b90a0ccfcc3df492cd9a43ffd66b3118dd06987a6a677462aef0659c085276b525930", 0x58, 0x200}, {&(0x7f00000002c0)="bae3e3fa77bdb4858dbba410250f25b5a3937313f6672a1e5f97ceef74777fcb0a45141da59309b9598e3bf8e3ad9a62cdcbcefe822a4d3019b1a7c4e9c6f7ddf2246dc153942aa9459a3b11b9e6dcccdcd6ccab95cf927441d2ddb5ed2d39e4fc0bfd8ed23041bca8cc7f1983078d1dfece9f713e33d387d8fee716449de683cd1bbe5234c9e5efb84dd23e6820c7295ea8dae2bead29dcda6386c68d801da1e060b5769cc12aa90256ea76f24d0d769654845b801a12cbf8d1e64686e76e896fed523987c68e09c29643e28d6adbffca164ec8d5dae714926d0c6d937d512cb52d542adf35a88b7b7de75e24529ef7caa79688055b", 0xf6, 0x5}, {&(0x7f0000000440)="ca5c6c8d71cfedea24f27c9c9b187c497c3aacac37662a0f2b5361251bec144ae69748ffe082222e308380aff3fc107c0292c3a94e7801bc178856603685451649018614da38b6d2ff7ac1c99f7ecdf95ec899d8c51280c647a6d39dfd2f5ec18967f7113447ce389e56b93b2fcfe8afcf64c05dfaac88fb87002d0d60cacc35e80924015e4e5972a15c1dee60e618015b9e822b0a11b3137fa352fffe656fa68385f753b912c09bfc34c188907a046fc8c18f57aca1fa09c7a13d", 0xbb, 0x1345}], 0x200000, &(0x7f0000000680)={[{@numtail='nonumtail=0'}, {@shortname_mixed='shortname=mixed'}, {@iocharset={'iocharset', 0x3d, 'macturkish'}}, {@utf8='utf8=1'}], [{@subj_user={'subj_user', 0x3d, ']'}}, {@uid_lt={'uid<', r1}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r2, r0, 0x0, 0x20000000001) 03:38:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:51 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:51 executing program 2: 03:38:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000380)={0x0, 0x35}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000400)={r3}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000300)={0x3, 0x80000001, 0xfffffffffffffff8, 0xc9, &(0x7f0000000000)=""/201, 0xc9, &(0x7f0000000180)=""/201, 0x42, &(0x7f0000000280)=""/66}) close(r0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000340)={0x1, 0xe8e, 0x7, 0x0, 0x5, 0x4}) [ 1854.220234] overlayfs: failed to resolve './file1·îT“ã=eÅ': -2 03:38:51 executing program 2: 03:38:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000000)={0x1, 0x1, [0x3d, 0x9, 0x6, 0x9, 0x100000001, 0x80, 0xffffffff00000000, 0x8]}) 03:38:51 executing program 2: [ 1854.498817] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x80000018) execve(&(0x7f0000000300)='./file1/file0\x00', &(0x7f0000000880)=[&(0x7f0000000380)='overlay\x00', &(0x7f0000000580)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', &(0x7f0000000740)='ppp1+Icpuset]$bdevem1-cgroupGPL/eth0]*ppp0\x00', &(0x7f0000000780)='GPLtrustedmd5sum\xc6\x00', &(0x7f00000007c0)='bdevself{\x16.(e\x00', &(0x7f0000000800)='btrfs\x00', &(0x7f0000000840)='reiserfs\x00'], &(0x7f0000000b80)=[&(0x7f00000008c0)='%\\+\x00', &(0x7f0000000c80)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', &(0x7f0000000900)='\'selinux\x00', &(0x7f0000000940)='tmpfs\x00']) fcntl$notify(r3, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r4, &(0x7f00000002c0)={0x10}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:51 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:51 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSETLED(r0, 0x4b32, 0x2) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r2, 0x0, 0x20000000801) readahead(r2, 0x4, 0x100000001) 03:38:51 executing program 2: [ 1854.923135] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1854.956116] __ntfs_error: 3 callbacks suppressed [ 1854.956126] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:51 executing program 2: 03:38:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)=0x81) r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000180)=""/253, &(0x7f0000000040)=0xfd) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 03:38:51 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x1, 0x7}) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000140)={0x0, 0x0, {0x800, 0x4511, 0x1001, 0x0, 0xa, 0x6, 0x0, 0x5}}) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:51 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1855.182568] [ 1855.184247] ====================================================== [ 1855.190564] WARNING: possible circular locking dependency detected [ 1855.196878] 5.0.0-rc3+ #38 Not tainted [ 1855.200762] ------------------------------------------------------ [ 1855.206058] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1855.207082] syz-executor1/13865 is trying to acquire lock: [ 1855.207088] 00000000e414c807 (&ovl_i_mutex_dir_key[depth]){++++}, at: lookup_slow+0x4a/0x80 [ 1855.215724] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1855.219623] [ 1855.219623] but task is already holding lock: [ 1855.219629] 00000000a335f590 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x45d/0x2700 [ 1855.219659] [ 1855.219659] which lock already depends on the new lock. [ 1855.219659] [ 1855.249685] kobject: 'loop5' (00000000c040e333): kobject_uevent_env [ 1855.252850] [ 1855.252850] the existing dependency chain (in reverse order) is: [ 1855.252855] [ 1855.252855] -> #3 (&sig->cred_guard_mutex){+.+.}: [ 1855.252880] __mutex_lock+0x12f/0x1670 [ 1855.252892] mutex_lock_killable_nested+0x16/0x20 [ 1855.252904] lock_trace+0x4a/0xe0 [ 1855.252917] proc_pid_stack+0x1e6/0x430 [ 1855.252927] proc_single_show+0xf6/0x180 [ 1855.252939] seq_read+0x4db/0x1130 [ 1855.266996] kobject: 'loop5' (00000000c040e333): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1855.267641] do_iter_read+0x4a9/0x660 [ 1855.275964] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1855.281542] vfs_readv+0x175/0x1c0 03:38:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') getpgrp(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000340)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 1855.281553] do_preadv+0x1c4/0x280 [ 1855.281564] __x64_sys_preadv+0x9a/0xf0 [ 1855.281581] do_syscall_64+0x1a3/0x800 [ 1855.299515] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1855.299764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1855.360575] [ 1855.360575] -> #2 (&p->lock){+.+.}: [ 1855.365691] __mutex_lock+0x12f/0x1670 [ 1855.370098] mutex_lock_nested+0x16/0x20 [ 1855.374683] seq_read+0x71/0x1130 [ 1855.379169] do_iter_read+0x4a9/0x660 [ 1855.379395] kobject: 'eql' (000000008138da11): kobject_add_internal: parent: 'net', set: 'devices' [ 1855.383488] vfs_readv+0x175/0x1c0 [ 1855.383502] default_file_splice_read+0x50c/0xac0 [ 1855.383512] do_splice_to+0x12a/0x190 [ 1855.383522] splice_direct_to_actor+0x31b/0x9d0 [ 1855.383532] do_splice_direct+0x2c7/0x420 [ 1855.383542] do_sendfile+0x61a/0xe60 [ 1855.383555] __x64_sys_sendfile64+0x1f8/0x240 [ 1855.383568] do_syscall_64+0x1a3/0x800 [ 1855.383586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1855.396856] kobject: 'eql' (000000008138da11): kobject_uevent_env [ 1855.402054] [ 1855.402054] -> #1 (sb_writers#3){.+.+}: [ 1855.402079] __sb_start_write+0x20b/0x360 [ 1855.402092] mnt_want_write+0x3f/0xc0 [ 1855.402105] ovl_want_write+0x76/0xa0 [ 1855.402115] ovl_xattr_set+0x53/0x5b0 [ 1855.402127] ovl_other_xattr_set+0x39/0x50 [ 1855.402137] __vfs_removexattr+0x112/0x180 [ 1855.402146] vfs_removexattr+0xb7/0x200 [ 1855.402158] removexattr+0xda/0x130 [ 1855.407647] kobject: 'eql' (000000008138da11): fill_kobj_path: path = '/devices/virtual/net/eql' [ 1855.411638] path_removexattr+0x1b7/0x210 [ 1855.411650] __x64_sys_removexattr+0x59/0x80 [ 1855.411665] do_syscall_64+0x1a3/0x800 [ 1855.420225] kobject: 'queues' (00000000b8073c18): kobject_add_internal: parent: 'eql', set: '' [ 1855.420535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1855.426797] kobject: 'queues' (00000000b8073c18): kobject_uevent_env [ 1855.429907] [ 1855.429907] -> #0 (&ovl_i_mutex_dir_key[depth]){++++}: 03:38:52 executing program 5: syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_mr_vif\x00\x1e\xb0L\xb4_\x93\xff.l_\xaf\xca{\x18g&|\x1et}5o\x92\xbd\xdah\x9b\xefH\xf1\xd0\x8dD\xfd\xb39\xbf\x8c\x02\x95*;\xff\xadS\xa7\xf1\x7f\xd9\xc5\xef\x9cT0=x]\xc8\x1b7\x93\xd4\xe4\xa5\xb7f\xa7\xf2c\xf8\xd6\x9a\xbel\xb1\x92\xdb-\xd4h\xfd\x9d\xff\a\xb4\xb3\xf5\x8e>\x90\xfbQ0PE=qy\x8b\x0e\xb2\f\xbd\x85\xef+^\xcee\x8a_\xe0\v.~\x17\xb8%\x91\xb8@Xf\x16\x83P\x1b\x13\xa6\xf4\x95\xf5Y\xa1\x19\xeaC]\xb9\xb0\xf0P\'\xb9\x17\x8a\x90A+p\x87\x9b\xde\x88P\xb48\xb9\xbd\x02\xd5c\xd8l\xc3\r?Vkr\xf9\x91\x107\x99\xe1\xf4s\xcf\xeb\xf0\x03d\xad\v\xdf0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) [ 1855.429932] lock_acquire+0x1db/0x570 [ 1855.429946] down_read+0x8d/0x120 [ 1855.439730] kobject: 'queues' (00000000b8073c18): kobject_uevent_env: filter function caused the event to drop! [ 1855.441852] lookup_slow+0x4a/0x80 [ 1855.441866] walk_component+0x8e5/0x26a0 [ 1855.441877] link_path_walk.part.0+0xa57/0x1550 [ 1855.441891] path_openat+0x222/0x5650 [ 1855.447661] kobject: 'rx-0' (00000000bbe3c150): kobject_add_internal: parent: 'queues', set: 'queues' [ 1855.451976] do_filp_open+0x26f/0x370 [ 1855.451989] do_open_execat+0x20e/0x930 [ 1855.452000] __do_execve_file.isra.0+0x1966/0x2700 [ 1855.452024] __x64_sys_execve+0x8f/0xc0 [ 1855.460137] kobject: 'rx-0' (00000000bbe3c150): kobject_uevent_env [ 1855.460661] do_syscall_64+0x1a3/0x800 [ 1855.465327] kobject: 'rx-0' (00000000bbe3c150): fill_kobj_path: path = '/devices/virtual/net/eql/queues/rx-0' [ 1855.469721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1855.469726] [ 1855.469726] other info that might help us debug this: [ 1855.469726] [ 1855.469729] Chain exists of: [ 1855.469729] &ovl_i_mutex_dir_key[depth] --> &p->lock --> &sig->cred_guard_mutex [ 1855.469729] [ 1855.480863] kobject: 'tx-0' (00000000ed4b6415): kobject_add_internal: parent: 'queues', set: 'queues' [ 1855.483087] Possible unsafe locking scenario: [ 1855.483087] [ 1855.483091] CPU0 CPU1 [ 1855.483094] ---- ---- [ 1855.483097] lock(&sig->cred_guard_mutex); [ 1855.483105] lock(&p->lock); [ 1855.483113] lock(&sig->cred_guard_mutex); [ 1855.483119] lock(&ovl_i_mutex_dir_key[depth]); [ 1855.483126] [ 1855.483126] *** DEADLOCK *** [ 1855.483126] [ 1855.483135] 1 lock held by syz-executor1/13865: [ 1855.483138] #0: 00000000a335f590 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x45d/0x2700 [ 1855.483167] [ 1855.483167] stack backtrace: [ 1855.502661] kobject: 'tx-0' (00000000ed4b6415): kobject_uevent_env [ 1855.506061] CPU: 1 PID: 13865 Comm: syz-executor1 Not tainted 5.0.0-rc3+ #38 [ 1855.506069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1855.506074] Call Trace: [ 1855.506093] dump_stack+0x1db/0x2d0 [ 1855.519528] kobject: 'tx-0' (00000000ed4b6415): fill_kobj_path: path = '/devices/virtual/net/eql/queues/tx-0' [ 1855.521045] ? dump_stack_print_info.cold+0x20/0x20 [ 1855.521059] ? print_stack_trace+0x77/0xb0 [ 1855.521077] ? vprintk_func+0x86/0x189 [ 1855.768302] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1855.773655] __lock_acquire+0x3014/0x4a30 [ 1855.777792] ? debug_smp_processor_id+0x1c/0x20 [ 1855.782445] ? perf_trace_lock+0x12f/0x750 [ 1855.786669] ? mark_held_locks+0x100/0x100 [ 1855.790889] ? __d_lookup+0x560/0x960 [ 1855.794674] ? __d_lookup+0x560/0x960 [ 1855.798463] ? add_lock_to_list.isra.0+0x450/0x450 [ 1855.803379] ? __lock_is_held+0xb6/0x140 [ 1855.807424] ? __d_lookup+0x587/0x960 [ 1855.811210] lock_acquire+0x1db/0x570 [ 1855.815006] ? lookup_slow+0x4a/0x80 [ 1855.818705] ? ___might_sleep+0x1e7/0x310 [ 1855.822837] ? lock_release+0xc40/0xc40 [ 1855.826799] down_read+0x8d/0x120 [ 1855.830234] ? lookup_slow+0x4a/0x80 [ 1855.833933] ? __down_interruptible+0x740/0x740 [ 1855.838591] lookup_slow+0x4a/0x80 [ 1855.842119] walk_component+0x8e5/0x26a0 [ 1855.846165] ? smack_inode_permission+0x2d4/0x3d0 [ 1855.850997] ? smack_file_ioctl+0x3c0/0x3c0 [ 1855.855303] ? selinux_is_enabled+0x43/0x60 [ 1855.859610] ? path_init+0x1ef0/0x1ef0 [ 1855.863486] ? security_inode_permission+0xd5/0x110 [ 1855.868575] ? inode_permission+0xb4/0x570 [ 1855.872797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1855.878320] ? security_inode_permission+0xd5/0x110 [ 1855.883324] ? inode_permission+0xb4/0x570 [ 1855.887547] link_path_walk.part.0+0xa57/0x1550 [ 1855.892206] ? walk_component+0x26a0/0x26a0 [ 1855.896511] ? __switch_to_asm+0x34/0x70 [ 1855.900560] ? __this_cpu_preempt_check+0x1d/0x30 [ 1855.905390] path_openat+0x222/0x5650 [ 1855.909181] ? lockdep_init_map+0x10c/0x5b0 [ 1855.913490] ? path_lookupat.isra.0+0xba0/0xba0 [ 1855.918145] ? __mutex_init+0x1f6/0x2a0 [ 1855.922104] ? print_usage_bug+0xd0/0xd0 [ 1855.926155] ? __lock_acquire+0x572/0x4a30 [ 1855.930372] ? prepare_creds+0xa4/0x4e0 [ 1855.934329] ? prepare_exec_creds+0x12/0xf0 [ 1855.938633] ? __do_execve_file.isra.0+0x47a/0x2700 [ 1855.943651] ? __x64_sys_execve+0x8f/0xc0 [ 1855.947801] ? do_syscall_64+0x1a3/0x800 [ 1855.951846] ? mark_held_locks+0xb1/0x100 [ 1855.955990] do_filp_open+0x26f/0x370 [ 1855.959773] ? may_open_dev+0x100/0x100 [ 1855.963740] ? add_lock_to_list.isra.0+0x450/0x450 [ 1855.968655] ? retint_kernel+0x2d/0x2d [ 1855.972528] ? __do_execve_file.isra.0+0x821/0x2700 [ 1855.977547] ? __do_execve_file.isra.0+0x901/0x2700 [ 1855.982550] do_open_execat+0x20e/0x930 [ 1855.986512] ? unregister_binfmt+0x2b0/0x2b0 [ 1855.990904] ? kasan_check_read+0x11/0x20 [ 1855.995040] ? do_raw_spin_trylock+0x270/0x270 [ 1855.999610] __do_execve_file.isra.0+0x1966/0x2700 [ 1856.004528] ? copy_strings_kernel+0x110/0x110 [ 1856.009095] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1856.014616] ? strncpy_from_user+0x3ad/0x4e0 [ 1856.019011] ? digsig_verify.cold+0x32/0x32 [ 1856.023315] ? kmem_cache_alloc+0x341/0x710 [ 1856.027620] ? do_syscall_64+0x8c/0x800 [ 1856.031579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1856.037099] ? getname_flags+0x277/0x5b0 [ 1856.041143] ? trace_hardirqs_off_caller+0x300/0x300 [ 1856.046233] __x64_sys_execve+0x8f/0xc0 [ 1856.050193] do_syscall_64+0x1a3/0x800 [ 1856.054069] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1856.058992] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1856.064021] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1856.068854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1856.074025] RIP: 0033:0x458099 [ 1856.077204] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1856.096093] RSP: 002b:00007fbf4e252c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 1856.103784] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458099 [ 1856.111036] RDX: 0000000020000b80 RSI: 0000000020000880 RDI: 0000000020000300 [ 1856.118286] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1856.125538] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbf4e2536d4 03:38:53 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0xf573) ioctl$RTC_WIE_ON(r0, 0x700f) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) sysinfo(&(0x7f0000000080)=""/80) [ 1856.132789] R13: 00000000004be6af R14: 00000000004ced68 R15: 00000000ffffffff [ 1856.171817] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1856.193825] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1856.229289] kobject: 'loop5' (00000000c040e333): kobject_uevent_env [ 1856.294874] kobject: 'loop5' (00000000c040e333): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1856.305838] kobject: 'rx-0' (00000000bbe3c150): kobject_cleanup, parent 00000000b8073c18 [ 1856.314283] kobject: 'rx-0' (00000000bbe3c150): auto cleanup 'remove' event [ 1856.322409] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1856.329011] kobject: 'loop3' (00000000d32db8a1): kobject_uevent_env [ 1856.335581] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1856.345420] kobject: 'rx-0' (00000000bbe3c150): kobject_uevent_env [ 1856.354827] kobject: 'loop3' (00000000d32db8a1): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1856.364674] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1856.373050] kobject: 'rx-0' (00000000bbe3c150): fill_kobj_path: path = '/devices/virtual/net/eql/queues/rx-0' [ 1856.385972] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1856.395178] kobject: 'rx-0' (00000000bbe3c150): auto cleanup kobject_del [ 1856.402280] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1856.411882] kobject: 'rx-0' (00000000bbe3c150): calling ktype release [ 1856.419281] kobject: 'loop3' (00000000d32db8a1): kobject_uevent_env [ 1856.425910] kobject: 'rx-0': free name [ 1856.429981] kobject: 'tx-0' (00000000ed4b6415): kobject_cleanup, parent 00000000b8073c18 03:38:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x400, 0x80) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:53 executing program 2: 03:38:53 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:53 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xffffffff, 0x101000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="200229bd7000fddb5a5a78fe2bed607b87180c37bfe56561df25020000000c000200050000efaa00000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="0c00080005000000000000000c0008003e000000000000000c00040001000000000000000c00050020000000000000000800010000000000"], 0x78}, 0x1, 0x0, 0x0, 0x4080}, 0x4800) [ 1856.438470] kobject: 'loop3' (00000000d32db8a1): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1856.447098] kobject: 'tx-0' (00000000ed4b6415): auto cleanup 'remove' event [ 1856.473592] kobject: 'tx-0' (00000000ed4b6415): kobject_uevent_env [ 1856.484013] kobject: 'tx-0' (00000000ed4b6415): fill_kobj_path: path = '/devices/virtual/net/eql/queues/tx-0' [ 1856.496991] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1856.509069] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1856.515811] kobject: 'tx-0' (00000000ed4b6415): auto cleanup kobject_del [ 1856.521650] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1856.526171] kobject: 'tx-0' (00000000ed4b6415): calling ktype release [ 1856.537947] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1856.539419] kobject: 'tx-0': free name [ 1856.559393] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1856.563375] kobject: 'queues' (00000000b8073c18): kobject_cleanup, parent (null) [ 1856.570537] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1856.578134] kobject: 'queues' (00000000b8073c18): calling ktype release [ 1856.590856] kobject: 'queues' (00000000b8073c18): kset_release [ 1856.604903] kobject: 'queues': free name [ 1856.610317] overlayfs: failed to resolve './file1': -2 [ 1856.614886] kobject: 'eql' (000000008138da11): kobject_uevent_env [ 1856.621875] kobject: 'eql' (000000008138da11): fill_kobj_path: path = '/devices/virtual/net/eql' [ 1856.638942] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1856.648929] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1856.674204] kobject: 'eql' (000000008138da11): kobject_cleanup, parent (null) [ 1856.682932] kobject: 'eql' (000000008138da11): calling ktype release [ 1856.691299] kobject: 'eql': free name [ 1856.692759] kobject: 'loop1' (00000000835d4027): kobject_uevent_env 03:38:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:53 executing program 2: 03:38:53 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='personality\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x55fc8f3f, 0x80, 0x80, 0x1, 0x1, 0x3, 0x6, 0x9, 0x1eb, 0x38, 0x18a, 0x9, 0x8, 0x20, 0x2, 0xffffffff, 0x2, 0x4}, [{0x6, 0x0, 0x20, 0xa9, 0x80, 0x100000001, 0xf2f, 0x6}, {0x6, 0x9, 0x4, 0x8, 0x9, 0x80000001, 0x1ff, 0x3}], "85fe2b094610412a68dfc80e97f471ddda5e7d592aee4ef438ba271f78dcd21bcc5fea1782ec336213787a67679d429792dff58225cd1248b7dd813cf03a59da74478ca7b25e9cf5f992fb7a373abb63aaa7db577b56bb7342f711b74078433638d36042038e855117cbd5e0a35d6f0be829b6c374eb4cdf310e9a40e2695ffe42bf46add97b41a9d5aaba56b856f920e48f8ce31203eb4232db666f59185c8d55027a0d07b7b9e76303bd5ed4310eaa1d0a212f1f840df49da342125c6fd9d52b1eb3113917c51dfbd0a8dc14896b347977b959f4a1", [[], [], [], [], [], []]}, 0x74e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000200)=""/237, 0x67}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x2, 0x70, 0x2, 0x7fff, 0x3, 0x2, 0x0, 0x5, 0x24000, 0x6, 0x200000000, 0x891, 0x6, 0x5, 0x1, 0x14, 0x9, 0x7fffffff, 0x12e0000, 0x1, 0x6, 0x1, 0x6, 0xfffffffffffffffe, 0x7, 0x3, 0xffffffffffff7fff, 0x0, 0xffff, 0x6, 0x5, 0x4, 0x8, 0x2, 0x1, 0x3c, 0x401, 0x8, 0x0, 0x5, 0x4, @perf_config_ext={0x4, 0x101}, 0x240, 0x0, 0x90, 0x9, 0x6, 0x987f, 0xd60}) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000180)={0xb5f4, 0xe, 0x1, "022cc876221feadefdc0cd4a2bfc22fba534686b8e5333b5d011a318d7705ad8", 0x32315258}) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x1000}, 0x8) close(r0) 03:38:53 executing program 2: [ 1856.702459] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:38:53 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f00000000c0)='./file0\x00', 0x200, 0x6, &(0x7f0000001440)=[{&(0x7f0000000100)="69a45ba190418f6ef77b555fb228862fcffe819b164c631f2ea7921155b91991acee11c7e61b99d2a8bd7b609715ee9e45e6e8ada4624ef53796690ab948dc35fa2b7792aad4596989e3add96628aa9957480e48c938e6b1818166255143cde4186eeb886ef27d127ba0e025a2880bf556a19028b9f22cbd15550970344463f0b2f692bf7bea8a2d3f8ae5a50193692261401f171077169fbfe83d97cb30471f1edc06fbd238101131b99150d335a731853f476b4b0bda47eff6b4e0b29a338058b0cf2933905eb9dd304e45b545559fcbe0252e", 0xd4, 0x1}, {&(0x7f0000000200)="303961e792155321832555d309db09c5a7fa3286e5709770344c7559c8237a6a5b2b59466b3927fae57604bb88821aa11c8346fa08d3597a0df2c48b9b3d609af7b3963247ebcb8cbf4780e3822b0fcd1643560d7922a009f47106b8e7c707e5e05324", 0x63, 0x81}, {&(0x7f00000002c0)="d2046f7bd19af83a3b8533db0282d339d3bb9ea9c3f92f5a29bedddeef08c5aaba110dbf", 0x24, 0x25}, {&(0x7f0000000440)="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", 0x1000, 0x4}, {&(0x7f0000000300)="27231a98c5e25dae6338d1f76d60f2dc87fc48214822e56eef6df7f8ea74f8f2c5260123000608f2ecac83b193ea8b9a690768cb798fb1b675a0616702f7cba83f5d1730c01ed2f5", 0x48, 0x3c4}, {&(0x7f0000000380)="2378872e6d5fa9088130928760feaf8beffdf0351454db2225db0aeec48a8c051362af34be59e22ddbba491715131e", 0x2f, 0x8}], 0x100002, 0x0) [ 1856.754511] kobject: 'eql' (000000006c60c5ef): kobject_add_internal: parent: 'net', set: 'devices' [ 1856.764033] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1856.770460] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1856.781320] kobject: 'eql' (000000006c60c5ef): kobject_uevent_env [ 1856.788074] kobject: 'eql' (000000006c60c5ef): fill_kobj_path: path = '/devices/virtual/net/eql' [ 1856.798245] kobject: 'queues' (000000005f941fb6): kobject_add_internal: parent: 'eql', set: '' [ 1856.807650] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1856.811821] kobject: 'loop5' (00000000c040e333): kobject_uevent_env [ 1856.842196] kobject: 'loop5' (00000000c040e333): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:38:53 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1856.845937] kobject: 'queues' (000000005f941fb6): kobject_uevent_env [ 1856.856769] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1856.874433] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1856.878248] kobject: 'queues' (000000005f941fb6): kobject_uevent_env: filter function caused the event to drop! [ 1856.897547] kobject: 'rx-0' (0000000000e4bf18): kobject_add_internal: parent: 'queues', set: 'queues' [ 1856.909090] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1856.926010] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1856.936998] kobject: 'loop3' (00000000d32db8a1): kobject_uevent_env [ 1856.938711] kobject: 'rx-0' (0000000000e4bf18): kobject_uevent_env 03:38:53 executing program 2: [ 1856.947854] kobject: 'loop3' (00000000d32db8a1): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1856.950007] kobject: 'rx-0' (0000000000e4bf18): fill_kobj_path: path = '/devices/virtual/net/eql/queues/rx-0' [ 1856.986872] kobject: 'tx-0' (00000000678321ed): kobject_add_internal: parent: 'queues', set: 'queues' [ 1856.999152] kobject: 'tx-0' (00000000678321ed): kobject_uevent_env [ 1857.000579] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1857.014107] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1857.020727] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1857.028266] kobject: 'tx-0' (00000000678321ed): fill_kobj_path: path = '/devices/virtual/net/eql/queues/tx-0' [ 1857.097029] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1857.103999] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1857.152195] kobject: 'loop3' (00000000d32db8a1): kobject_uevent_env [ 1857.160019] kobject: 'loop3' (00000000d32db8a1): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1857.171660] kobject: 'rx-0' (0000000000e4bf18): kobject_cleanup, parent 000000005f941fb6 [ 1857.179961] kobject: 'rx-0' (0000000000e4bf18): auto cleanup 'remove' event [ 1857.187807] kobject: 'rx-0' (0000000000e4bf18): kobject_uevent_env [ 1857.201189] kobject: 'rx-0' (0000000000e4bf18): fill_kobj_path: path = '/devices/virtual/net/eql/queues/rx-0' [ 1857.212375] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1857.220667] kobject: 'rx-0' (0000000000e4bf18): auto cleanup kobject_del [ 1857.221156] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1857.227707] kobject: 'rx-0' (0000000000e4bf18): calling ktype release [ 1857.241240] kobject: 'loop5' (00000000c040e333): kobject_uevent_env [ 1857.252830] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1857.265448] kobject: 'loop5' (00000000c040e333): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1857.282207] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1857.291032] kobject: 'rx-0': free name [ 1857.295264] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1857.304261] kobject: 'tx-0' (00000000678321ed): kobject_cleanup, parent 000000005f941fb6 [ 1857.307894] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1857.313668] kobject: 'tx-0' (00000000678321ed): auto cleanup 'remove' event [ 1857.320524] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1857.330267] kobject: 'tx-0' (00000000678321ed): kobject_uevent_env [ 1857.345799] overlayfs: failed to resolve './file1': -2 [ 1857.353665] kobject: 'loop3' (00000000d32db8a1): kobject_uevent_env [ 1857.368530] kobject: 'loop3' (00000000d32db8a1): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1857.380112] kobject: 'tx-0' (00000000678321ed): fill_kobj_path: path = '/devices/virtual/net/eql/queues/tx-0' [ 1857.389449] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1857.395874] kobject: 'tx-0' (00000000678321ed): auto cleanup kobject_del [ 1857.404252] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1857.410726] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1857.414208] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1857.424873] kobject: 'tx-0' (00000000678321ed): calling ktype release [ 1857.448286] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env 03:38:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:38:54 executing program 2: 03:38:54 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r1, r0, 0x0, 0x20000000001) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000080)=0x5301) 03:38:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000300)={0x1d, r3}, 0x10) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x5, 0x10, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r6, 0x402, 0x80000018) fcntl$notify(r5, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r4, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) [ 1857.454898] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1857.471335] kobject: 'tx-0': free name [ 1857.513976] kobject: 'queues' (000000005f941fb6): kobject_cleanup, parent (null) [ 1857.526695] kobject: 'queues' (000000005f941fb6): calling ktype release [ 1857.540942] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1857.549943] kobject: 'queues' (000000005f941fb6): kset_release [ 1857.555625] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1857.556476] kobject: 'queues': free name [ 1857.570360] kobject: 'eql' (000000006c60c5ef): kobject_uevent_env [ 1857.578891] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1857.578955] kobject: 'eql' (000000006c60c5ef): fill_kobj_path: path = '/devices/virtual/net/eql' [ 1857.588116] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1857.601537] overlayfs: failed to resolve './file1': -2 [ 1857.610071] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1857.623129] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1857.642325] kobject: 'eql' (000000006c60c5ef): kobject_cleanup, parent (null) [ 1857.652591] kobject: 'eql' (000000006c60c5ef): calling ktype release 03:38:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00\x00\x00\x01\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:54 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:54 executing program 2: 03:38:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 1857.661135] kobject: 'loop5' (00000000c040e333): kobject_uevent_env [ 1857.663527] kobject: 'eql': free name [ 1857.675023] kobject: 'loop5' (00000000c040e333): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:38:54 executing program 2: [ 1857.734578] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1857.746473] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1857.756588] kobject: 'eql' (00000000f416b9ca): kobject_add_internal: parent: 'net', set: 'devices' [ 1857.770290] kobject: 'eql' (00000000f416b9ca): kobject_uevent_env [ 1857.777225] kobject: 'eql' (00000000f416b9ca): fill_kobj_path: path = '/devices/virtual/net/eql' [ 1857.777633] overlayfs: failed to resolve './file1': -2 [ 1857.786448] kobject: 'queues' (0000000068a164ef): kobject_add_internal: parent: 'eql', set: '' [ 1857.804811] kobject: 'queues' (0000000068a164ef): kobject_uevent_env [ 1857.811898] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1857.812740] kobject: 'queues' (0000000068a164ef): kobject_uevent_env: filter function caused the event to drop! [ 1857.818749] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1857.828959] kobject: 'rx-0' (00000000dca94c68): kobject_add_internal: parent: 'queues', set: 'queues' [ 1857.850364] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1857.854084] kobject: 'rx-0' (00000000dca94c68): kobject_uevent_env [ 1857.858730] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:38:54 executing program 2: [ 1857.880144] kobject: 'rx-0' (00000000dca94c68): fill_kobj_path: path = '/devices/virtual/net/eql/queues/rx-0' [ 1857.882241] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1857.890671] kobject: 'tx-0' (000000002f64616e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1857.907556] kobject: 'tx-0' (000000002f64616e): kobject_uevent_env [ 1857.914330] kobject: 'tx-0' (000000002f64616e): fill_kobj_path: path = '/devices/virtual/net/eql/queues/tx-0' [ 1857.920625] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:38:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 1857.939460] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f0012bd572000001000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f0000338000/0x2000)=nil, 0x2000, 0x1, 0x4010, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x80000018) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:54 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1858.021656] kobject: 'loop5' (00000000c040e333): kobject_uevent_env [ 1858.039677] kobject: 'loop5' (00000000c040e333): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1858.062240] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1858.070909] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1858.098160] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1858.108909] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1858.109298] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env 03:38:55 executing program 2: [ 1858.144406] kobject: 'rx-0' (00000000dca94c68): kobject_cleanup, parent 0000000068a164ef [ 1858.164314] kobject: 'rx-0' (00000000dca94c68): auto cleanup 'remove' event [ 1858.169931] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1858.172701] kobject: 'rx-0' (00000000dca94c68): kobject_uevent_env [ 1858.187665] kobject: 'rx-0' (00000000dca94c68): fill_kobj_path: path = '/devices/virtual/net/eql/queues/rx-0' [ 1858.197962] kobject: 'rx-0' (00000000dca94c68): auto cleanup kobject_del [ 1858.204895] kobject: 'rx-0' (00000000dca94c68): calling ktype release [ 1858.211469] kobject: 'rx-0': free name [ 1858.215461] kobject: 'tx-0' (000000002f64616e): kobject_cleanup, parent 0000000068a164ef [ 1858.233176] kobject: 'tx-0' (000000002f64616e): auto cleanup 'remove' event [ 1858.240185] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1858.240315] kobject: 'tx-0' (000000002f64616e): kobject_uevent_env [ 1858.240345] kobject: 'tx-0' (000000002f64616e): fill_kobj_path: path = '/devices/virtual/net/eql/queues/tx-0' [ 1858.252190] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1858.262230] kobject: 'tx-0' (000000002f64616e): auto cleanup kobject_del [ 1858.288167] kobject: 'tx-0' (000000002f64616e): calling ktype release 03:38:55 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000002c0)) getpgid(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)=0x0) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000680)='net/tE\xd4a\x19(Gr\\\xdae\xaf\x85\x17e}\xe2T\xddy\x16\xe9\xd8u\xcb\xa4\x968\xc7\xcd=\xec\x19\xb7C\xe12\xa8\x97\xfd\xef\xfb\xe6\xe0\x02\xca\xe9B\xf7\x119-\xe8\x11Xd\xfe\x95!4<\x81/T\x99\xba**c\x9b\x91b\xf1\f\xf0l{\xa03en\xec\x16D\xa1\xf21\xbb\xad\xb3\\\xa3\x86?\x05\xa5\x14\xe3\xf1\x03\xfc\xc7\a\x9fl\xa4X2\xa0\x92E%\xe9\x9a{\xfd\x16\xcc\x06o_\xd2P{\x1c\xe0%\xb4<2J\xa3L/\x83\xb449\x8f\xc9A\x00\xc5\x021\x11\xfd\xf1\x92\xc3\"b\x19\xa2\x926\a\xd8m\x14\xf9\xb1B\x19,\x14\x11b\xc0\xaa\x05\xef\x8c\xdc\xa0 \xf7\xfeF\x90J\xd6\x97p\x85\xe4Ml\xf8\x84\xf6)\x9a\xaem\x8ff\xbe H\x1e\xed\xaf&4\xe80\xa0\xc4\xb0\xa0\xb3\xbf\x82g\xc1l+\x9c(\x9a\xafp\x17\xa0\x12\"(*z\x9e\xe7\x9b\xc2\xe4\x97\xbf\xedd_\x9d\xd8sZ\x98\xb8\xd0\xf0wL\fFNl6mAq\xc1\x86\x84\xe2') syz_open_procfs(r0, &(0x7f0000000300)='stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x401) io_setup(0xff, &(0x7f0000000080)=0x0) syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x6, 0xc200) io_submit(r4, 0x1, &(0x7f0000000200)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x0, r3, &(0x7f00000000c0)="ad561d7612c7bd95d839c4049730fabddd5361ee5a3963cb73a4acbb1cedea7076ef1cf88244fd619ab000b9c2d64ce8153b291eb26aca4b0abb937eded1827b3d076bb01e03b8aaa5934358336579e793a9ee7770b6671620850135d9acb89ff084b66cab353d83343859868c9c03786902d436d42cf463fd6b63a9fac05218bc0d87bae18b7f187b8ab3ba09ede359cce1c4b4b66ac03e99777b3772b4faf8e4f22cf3d03d0ef7a268a7d7702cd3b86eb124143f62993519c64485966ac385c1b680b38ede3e05a2606683cd6c5962baec7ddf8619b60d94d47d8f861196777717", 0xe2, 0x9, 0x0, 0x2, 0xffffffffffffff9c}]) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) sendfile(r3, r2, 0x0, 0x20000000001) 03:38:55 executing program 2: [ 1858.295075] kobject: 'tx-0': free name [ 1858.299338] kobject: 'queues' (0000000068a164ef): kobject_cleanup, parent (null) [ 1858.305408] overlayfs: failed to resolve './file1': -2 [ 1858.311679] kobject: 'queues' (0000000068a164ef): calling ktype release [ 1858.313672] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1858.326396] kobject: 'queues' (0000000068a164ef): kset_release [ 1858.326408] kobject: 'queues': free name [ 1858.326802] kobject: 'eql' (00000000f416b9ca): kobject_uevent_env [ 1858.335699] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1858.336651] kobject: 'eql' (00000000f416b9ca): fill_kobj_path: path = '/devices/virtual/net/eql' [ 1858.351192] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1858.399011] kobject: 'eql' (00000000f416b9ca): kobject_cleanup, parent (null) [ 1858.400547] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1858.410715] kobject: 'eql' (00000000f416b9ca): calling ktype release [ 1858.414525] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1858.420562] kobject: 'eql': free name 03:38:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f0000000040)=0x8) write$binfmt_elf32(r1, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x7b1) close(r0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) [ 1858.447854] kobject: 'loop3' (00000000d32db8a1): kobject_uevent_env [ 1858.458503] kobject: 'loop3' (00000000d32db8a1): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1858.469917] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1858.482867] kobject: 'eql' (00000000fce0ea5a): kobject_add_internal: parent: 'net', set: 'devices' [ 1858.487977] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1858.494205] kobject: 'eql' (00000000fce0ea5a): kobject_uevent_env [ 1858.525361] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1858.531850] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:38:55 executing program 2: 03:38:55 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) exit(0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x20000000001) 03:38:55 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1858.539084] kobject: 'eql' (00000000fce0ea5a): fill_kobj_path: path = '/devices/virtual/net/eql' [ 1858.545471] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1858.573079] kobject: 'queues' (000000003bd669e3): kobject_add_internal: parent: 'eql', set: '' [ 1858.590444] kobject: 'loop5' (00000000c040e333): kobject_uevent_env 03:38:55 executing program 2: [ 1858.602350] kobject: 'queues' (000000003bd669e3): kobject_uevent_env [ 1858.612588] kobject: 'loop5' (00000000c040e333): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1858.627481] kobject: 'queues' (000000003bd669e3): kobject_uevent_env: filter function caused the event to drop! [ 1858.654500] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1858.661939] kobject: 'loop3' (00000000d32db8a1): kobject_uevent_env [ 1858.672285] kobject: 'rx-0' (00000000f82e0e09): kobject_add_internal: parent: 'queues', set: 'queues' [ 1858.678096] kobject: 'loop3' (00000000d32db8a1): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1858.690990] kobject: 'rx-0' (00000000f82e0e09): kobject_uevent_env [ 1858.699424] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1858.710171] kobject: 'rx-0' (00000000f82e0e09): fill_kobj_path: path = '/devices/virtual/net/eql/queues/rx-0' [ 1858.729355] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1858.733888] kobject: 'tx-0' (0000000024ca9f94): kobject_add_internal: parent: 'queues', set: 'queues' [ 1858.740622] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:38:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) r5 = getgid() getresgid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f0000000300)=[0xee01, 0xee01, 0xffffffffffffffff, 0xee01, 0xee01, 0x0, 0xee01, 0x0]) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x3}, [{0x2, 0x1, r4}], {0x4, 0x2}, [{0x8, 0x5, r5}, {0x8, 0x4, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x7, r9}, {0x8, 0x1, r10}, {0x8, 0x7, r11}, {0x8, 0x0, r12}, {0x8, 0x5, r13}], {0x10, 0x2}, {0x20, 0x2}}, 0x74, 0x1) [ 1858.764525] kobject: 'tx-0' (0000000024ca9f94): kobject_uevent_env [ 1858.784183] kobject: 'tx-0' (0000000024ca9f94): fill_kobj_path: path = '/devices/virtual/net/eql/queues/tx-0' [ 1858.952884] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1858.964382] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1859.027839] overlayfs: failed to resolve './file1': -2 [ 1859.032267] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1859.039588] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1859.090676] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1859.091950] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1859.113834] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:38:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)=0x80000000) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x80000018) fcntl$notify(r3, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:56 executing program 2: 03:38:56 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="5203bc06dc073d340b0e74a48a37b656589ce5a8913a26cb5db37095d4efc1fba6ffd97508a2e9b9d2afcb677f9f707820a1c3aa93f7a8a3aa3ef6f72d9d39e99b876fe99e6e7d74d6c21b191b479c8e6232e18209137c781797d5bf34d2b12f74ba7f49a8b017c00475349200e3e0182a746cd3736c3cfe0dd80eac484202f6c76b8cc7d2f5becf68419a932b82d8d3fbe1f9e6a6b69a2d0259a0fd7cabfcd7bb8c7b3e3bb3c92739be39296e4406a8b808f3a8088972d3d1e9ae916093791aaac69afa420885a93c795b93f0dc65b2734c0ae6ec01d713a2a723b44272dcc2dfe5c4b3c1324d7b381522e00a3f62b30f7fb979995cbabba0b1086564662306139906114c470248d09e1ce745ae3db8b1db17dc70edb3eb75f8b39db54b404834b629336021e974d3ab6ffae40348d8bf51da3bf1c85b1d763008ff792fcccd06e752323a0bd7fd7d4383da3b68474005d6dc7b26712f359fcc369ace5a839dbb6e9464fb3160ffba48f5bf2515b9c3ba9ed9b2ab7cfd520f45df038b79480098faeb974ec7c7307a0124621067acf25c6779e2526c267ccf20def683a2a885f133abcd74da3b34ad481c1989b344cac78fa40966aaeac8f469fe6a14145f086a905500042ca21237c43257acf8a7dfe4fd17509e041b77260a3e2d38", 0x1dd, 0x3}]) [ 1859.141977] kobject: 'rx-0' (00000000f82e0e09): kobject_cleanup, parent 000000003bd669e3 [ 1859.181224] kobject: 'rx-0' (00000000f82e0e09): auto cleanup 'remove' event [ 1859.189534] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1859.209903] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1859.227952] kobject: 'rx-0' (00000000f82e0e09): kobject_uevent_env 03:38:56 executing program 2: [ 1859.234873] kobject: 'rx-0' (00000000f82e0e09): fill_kobj_path: path = '/devices/virtual/net/eql/queues/rx-0' [ 1859.240800] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1859.255833] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1859.262864] kobject: 'rx-0' (00000000f82e0e09): auto cleanup kobject_del [ 1859.277992] kobject: 'rx-0' (00000000f82e0e09): calling ktype release [ 1859.278207] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1859.285101] kobject: 'rx-0': free name [ 1859.295071] kobject: 'tx-0' (0000000024ca9f94): kobject_cleanup, parent 000000003bd669e3 [ 1859.303343] kobject: 'tx-0' (0000000024ca9f94): auto cleanup 'remove' event [ 1859.306569] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1859.310456] kobject: 'tx-0' (0000000024ca9f94): kobject_uevent_env [ 1859.310488] kobject: 'tx-0' (0000000024ca9f94): fill_kobj_path: path = '/devices/virtual/net/eql/queues/tx-0' [ 1859.310555] kobject: 'tx-0' (0000000024ca9f94): auto cleanup kobject_del [ 1859.326426] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1859.336542] kobject: 'tx-0' (0000000024ca9f94): calling ktype release [ 1859.336549] kobject: 'tx-0': free name [ 1859.336568] kobject: 'queues' (000000003bd669e3): kobject_cleanup, parent (null) [ 1859.336578] kobject: 'queues' (000000003bd669e3): calling ktype release [ 1859.353487] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1859.363307] overlayfs: failed to resolve './file1': -2 03:38:56 executing program 2: [ 1859.377689] kobject: 'queues' (000000003bd669e3): kset_release [ 1859.404872] kobject: 'queues': free name [ 1859.409636] kobject: 'eql' (00000000fce0ea5a): kobject_uevent_env [ 1859.418147] kobject: 'eql' (00000000fce0ea5a): fill_kobj_path: path = '/devices/virtual/net/eql' [ 1859.427687] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1859.434495] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1859.449117] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1859.482317] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1859.488769] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1859.499107] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1859.505672] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1859.533145] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 1859.567794] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1859.576517] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1859.601077] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1859.618965] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1859.634596] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1859.645874] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1859.679042] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1859.688792] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1859.720626] kobject: 'batman_adv' (0000000074baf939): kobject_uevent_env [ 1859.728567] overlayfs: failed to resolve './file1': -2 [ 1859.730750] kobject: 'batman_adv' (0000000074baf939): kobject_uevent_env: filter function caused the event to drop! [ 1859.734646] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1859.748196] kobject: 'batman_adv' (0000000074baf939): kobject_cleanup, parent (null) [ 1859.751151] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1859.760206] kobject: 'batman_adv' (0000000074baf939): calling ktype release [ 1859.776848] kobject: (0000000074baf939): dynamic_kobj_release [ 1859.782907] kobject: 'batman_adv': free name [ 1859.787757] kobject: 'rx-0' (0000000092dcc8fa): kobject_cleanup, parent 000000003c539264 [ 1859.796140] kobject: 'rx-0' (0000000092dcc8fa): auto cleanup 'remove' event [ 1859.803406] kobject: 'rx-0' (0000000092dcc8fa): kobject_uevent_env [ 1859.809867] kobject: 'rx-0' (0000000092dcc8fa): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 1859.820495] kobject: 'rx-0' (0000000092dcc8fa): auto cleanup kobject_del [ 1859.827537] kobject: 'rx-0' (0000000092dcc8fa): calling ktype release [ 1859.837193] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1859.838410] kobject: 'rx-0': free name [ 1859.845063] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1859.848121] kobject: 'tx-0' (000000007e45a646): kobject_cleanup, parent 000000003c539264 [ 1859.865352] kobject: 'tx-0' (000000007e45a646): auto cleanup 'remove' event [ 1859.872563] kobject: 'tx-0' (000000007e45a646): kobject_uevent_env [ 1859.878969] kobject: 'tx-0' (000000007e45a646): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 1859.889961] kobject: 'tx-0' (000000007e45a646): auto cleanup kobject_del [ 1859.896882] kobject: 'tx-0' (000000007e45a646): calling ktype release [ 1859.903488] kobject: 'tx-0': free name [ 1859.907378] kobject: 'queues' (000000003c539264): kobject_cleanup, parent (null) [ 1859.915824] kobject: 'queues' (000000003c539264): calling ktype release [ 1859.922626] kobject: 'queues' (000000003c539264): kset_release [ 1859.928597] kobject: 'queues': free name [ 1859.933102] kobject: 'syz_tun' (00000000892387cf): kobject_uevent_env [ 1859.939708] kobject: 'syz_tun' (00000000892387cf): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 1859.949707] kobject: 'eql' (00000000fce0ea5a): kobject_cleanup, parent (null) [ 1859.961518] kobject: 'eql' (00000000fce0ea5a): calling ktype release 03:38:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:56 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:56 executing program 2: [ 1859.969294] kobject: 'eql': free name [ 1859.971510] kobject: 'loop5' (00000000c040e333): kobject_uevent_env [ 1859.979549] kobject: 'loop5' (00000000c040e333): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1860.002371] kobject: 'syz_tun' (00000000892387cf): kobject_cleanup, parent (null) [ 1860.014549] kobject: 'syz_tun' (00000000892387cf): calling ktype release [ 1860.024799] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1860.034669] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1860.039750] kobject: 'syz_tun': free name 03:38:57 executing program 3: clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='wchan\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0x7fff, 0x4) exit(0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x5, 0x7fff, 0x1f}}, 0x28) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000000)) ioctl$KDSETMODE(r0, 0x4b3a, 0x0) sendfile(r1, r0, 0x0, 0x20000000001) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x4100, 0x0) 03:38:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) r1 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000380)=0x80, 0x800) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000580)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) personality(0x4000009) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000640)={0x0, 0x3}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000006c0)={r4, 0x5, 0x20}, &(0x7f0000000740)=0xc) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r6, 0x402, 0x80000018) fcntl$notify(r5, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x52, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0x5, 0x0, 0xfffffffffffffffe, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996, 0x3}, 0x0, 0xd, 0xffffffffffffffff, 0x2) 03:38:57 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_vif\x00') ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x7, [@bcast, @bcast, @default, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default]}) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x2, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0xfff}) r1 = syz_open_procfs(0x0, &(0x7f00000008c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) socket$unix(0x1, 0x0, 0x0) 03:38:57 executing program 2: [ 1860.099211] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1860.111456] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1860.122540] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1860.128987] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:38:57 executing program 2: [ 1860.192233] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1860.219259] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1860.230857] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:38:57 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1860.269056] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1860.284982] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:38:57 executing program 2: [ 1860.322974] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1860.329907] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1860.331885] overlayfs: failed to resolve './file1': -2 [ 1860.384786] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1860.398951] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1860.420586] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1860.427251] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:38:57 executing program 2: [ 1860.437600] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1860.444293] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1860.454021] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:38:57 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) [ 1860.499834] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1860.508587] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1860.529686] kobject: 'rx-0' (00000000e1d428ee): kobject_cleanup, parent 0000000060c93e32 [ 1860.538026] kobject: 'rx-0' (00000000e1d428ee): auto cleanup 'remove' event [ 1860.542272] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1860.551112] kobject: 'rx-0' (00000000e1d428ee): kobject_uevent_env [ 1860.551706] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1860.558171] kobject: 'rx-0' (00000000e1d428ee): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1860.575017] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1860.590114] kobject: 'rx-0' (00000000e1d428ee): auto cleanup kobject_del [ 1860.597157] kobject: 'rx-0' (00000000e1d428ee): calling ktype release [ 1860.603811] kobject: 'rx-0': free name [ 1860.607742] kobject: 'tx-0' (000000000dc3a601): kobject_cleanup, parent 0000000060c93e32 [ 1860.616015] kobject: 'tx-0' (000000000dc3a601): auto cleanup 'remove' event [ 1860.623410] kobject: 'tx-0' (000000000dc3a601): kobject_uevent_env [ 1860.629711] kobject: 'tx-0' (000000000dc3a601): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1860.640491] kobject: 'tx-0' (000000000dc3a601): auto cleanup kobject_del [ 1860.647837] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1860.647855] kobject: 'tx-0' (000000000dc3a601): calling ktype release [ 1860.656724] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1860.660844] kobject: 'tx-0': free name [ 1860.660877] kobject: 'queues' (0000000060c93e32): kobject_cleanup, parent (null) [ 1860.660884] kobject: 'queues' (0000000060c93e32): calling ktype release [ 1860.660891] kobject: 'queues' (0000000060c93e32): kset_release [ 1860.660900] kobject: 'queues': free name [ 1860.716596] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1860.723147] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1860.724526] kobject: 'ip6gre0' (0000000019835033): kobject_uevent_env [ 1860.742741] kobject: 'ip6gre0' (0000000019835033): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1860.744810] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1860.754960] kobject: 'batman_adv' (00000000bfd6fe4e): kobject_uevent_env [ 1860.760327] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1860.767225] kobject: 'batman_adv' (00000000bfd6fe4e): kobject_uevent_env: filter function caused the event to drop! [ 1860.767266] kobject: 'batman_adv' (00000000bfd6fe4e): kobject_cleanup, parent (null) [ 1860.767274] kobject: 'batman_adv' (00000000bfd6fe4e): calling ktype release [ 1860.767280] kobject: (00000000bfd6fe4e): dynamic_kobj_release [ 1860.767290] kobject: 'batman_adv': free name [ 1860.767433] kobject: 'rx-0' (00000000e1eb8591): kobject_cleanup, parent 00000000844c0775 [ 1860.798959] overlayfs: failed to resolve './file1': -2 [ 1860.809477] kobject: 'rx-0' (00000000e1eb8591): auto cleanup 'remove' event [ 1860.834622] kobject: 'rx-0' (00000000e1eb8591): kobject_uevent_env [ 1860.840940] kobject: 'rx-0' (00000000e1eb8591): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1860.851037] kobject: 'rx-0' (00000000e1eb8591): auto cleanup kobject_del [ 1860.857910] kobject: 'rx-0' (00000000e1eb8591): calling ktype release [ 1860.864520] kobject: 'rx-0': free name [ 1860.868428] kobject: 'tx-0' (000000003ad5c304): kobject_cleanup, parent 00000000844c0775 [ 1860.876668] kobject: 'tx-0' (000000003ad5c304): auto cleanup 'remove' event [ 1860.884320] kobject: 'tx-0' (000000003ad5c304): kobject_uevent_env [ 1860.890707] kobject: 'tx-0' (000000003ad5c304): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1860.900810] kobject: 'tx-0' (000000003ad5c304): auto cleanup kobject_del [ 1860.907762] kobject: 'tx-0' (000000003ad5c304): calling ktype release [ 1860.914378] kobject: 'tx-0': free name [ 1860.918271] kobject: 'queues' (00000000844c0775): kobject_cleanup, parent (null) [ 1860.926693] kobject: 'queues' (00000000844c0775): calling ktype release [ 1860.933472] kobject: 'queues' (00000000844c0775): kset_release [ 1860.939432] kobject: 'queues': free name [ 1860.943864] kobject: 'ip6gretap0' (00000000de871e1a): kobject_uevent_env [ 1860.950713] kobject: 'ip6gretap0' (00000000de871e1a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1860.961877] kobject: 'eql' (000000007497db43): kobject_add_internal: parent: 'net', set: 'devices' [ 1860.973287] kobject: 'eql' (000000007497db43): kobject_uevent_env [ 1860.979644] kobject: 'eql' (000000007497db43): fill_kobj_path: path = '/devices/virtual/net/eql' [ 1860.989067] kobject: 'queues' (00000000b16a8bc8): kobject_add_internal: parent: 'eql', set: '' [ 1860.998651] kobject: 'queues' (00000000b16a8bc8): kobject_uevent_env [ 1861.005423] kobject: 'queues' (00000000b16a8bc8): kobject_uevent_env: filter function caused the event to drop! [ 1861.016412] kobject: 'rx-0' (0000000069f7b5ee): kobject_add_internal: parent: 'queues', set: 'queues' [ 1861.022237] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1861.026520] kobject: 'rx-0' (0000000069f7b5ee): kobject_uevent_env [ 1861.035792] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1861.039162] kobject: 'rx-0' (0000000069f7b5ee): fill_kobj_path: path = '/devices/virtual/net/eql/queues/rx-0' [ 1861.049252] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 1861.058224] kobject: 'tx-0' (00000000c87fc716): kobject_add_internal: parent: 'queues', set: 'queues' [ 1861.058389] kobject: 'tx-0' (00000000c87fc716): kobject_uevent_env [ 1861.080406] kobject: 'tx-0' (00000000c87fc716): fill_kobj_path: path = '/devices/virtual/net/eql/queues/tx-0' [ 1861.102198] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1861.108730] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1861.183749] kobject: 'rx-0' (0000000069f7b5ee): kobject_cleanup, parent 00000000b16a8bc8 [ 1861.192029] kobject: 'rx-0' (0000000069f7b5ee): auto cleanup 'remove' event [ 1861.199186] kobject: 'rx-0' (0000000069f7b5ee): kobject_uevent_env [ 1861.205537] kobject: 'rx-0' (0000000069f7b5ee): fill_kobj_path: path = '/devices/virtual/net/eql/queues/rx-0' [ 1861.215674] kobject: 'rx-0' (0000000069f7b5ee): auto cleanup kobject_del [ 1861.222589] kobject: 'rx-0' (0000000069f7b5ee): calling ktype release [ 1861.229165] kobject: 'rx-0': free name [ 1861.233121] kobject: 'tx-0' (00000000c87fc716): kobject_cleanup, parent 00000000b16a8bc8 [ 1861.241343] kobject: 'tx-0' (00000000c87fc716): auto cleanup 'remove' event [ 1861.248466] kobject: 'tx-0' (00000000c87fc716): kobject_uevent_env [ 1861.254848] kobject: 'tx-0' (00000000c87fc716): fill_kobj_path: path = '/devices/virtual/net/eql/queues/tx-0' [ 1861.265007] kobject: 'tx-0' (00000000c87fc716): auto cleanup kobject_del [ 1861.271869] kobject: 'tx-0' (00000000c87fc716): calling ktype release [ 1861.278878] kobject: 'tx-0': free name [ 1861.282845] kobject: 'queues' (00000000b16a8bc8): kobject_cleanup, parent (null) [ 1861.291237] kobject: 'queues' (00000000b16a8bc8): calling ktype release [ 1861.298041] kobject: 'queues' (00000000b16a8bc8): kset_release [ 1861.304052] kobject: 'queues': free name [ 1861.308363] kobject: 'eql' (000000007497db43): kobject_uevent_env [ 1861.314669] kobject: 'eql' (000000007497db43): fill_kobj_path: path = '/devices/virtual/net/eql' [ 1861.324221] kobject: 'ip6gre0' (0000000019835033): kobject_cleanup, parent (null) [ 1861.336583] kobject: 'ip6gre0' (0000000019835033): auto cleanup 'remove' event [ 1861.336648] IPVS: ftp: loaded support on port[0] = 21 [ 1861.344176] kobject: 'ip6gre0' (0000000019835033): kobject_uevent_env [ 1861.360603] kobject: 'lo' (00000000989a7018): kobject_add_internal: parent: 'net', set: 'devices' [ 1861.360660] kobject: 'loop5' (00000000c040e333): kobject_uevent_env [ 1861.370870] kobject: 'lo' (00000000989a7018): kobject_uevent_env [ 1861.380590] kobject: 'ip6gre0' (0000000019835033): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1861.382745] kobject: 'lo' (00000000989a7018): fill_kobj_path: path = '/devices/virtual/net/lo' [ 1861.393049] kobject: 'loop5' (00000000c040e333): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1861.402588] kobject: 'queues' (00000000945b1886): kobject_add_internal: parent: 'lo', set: '' [ 1861.414778] kobject: 'ip6gre0' (0000000019835033): calling ktype release [ 1861.420422] kobject: 'queues' (00000000945b1886): kobject_uevent_env [ 1861.431025] kobject: 'ip6gre0': free name [ 1861.438295] kobject: 'queues' (00000000945b1886): kobject_uevent_env: filter function caused the event to drop! [ 1861.448802] kobject: 'rx-0' (000000008f1deaf5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1861.458402] kobject: 'rx-0' (000000008f1deaf5): kobject_uevent_env [ 1861.464930] kobject: 'rx-0' (000000008f1deaf5): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 1861.475010] kobject: 'tx-0' (00000000f7fbd521): kobject_add_internal: parent: 'queues', set: 'queues' [ 1861.484592] kobject: 'tx-0' (00000000f7fbd521): kobject_uevent_env [ 1861.490915] kobject: 'tx-0' (00000000f7fbd521): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 1861.501608] kobject: 'eql' (000000007497db43): kobject_cleanup, parent (null) [ 1861.501615] kobject: 'ip6gretap0' (00000000de871e1a): kobject_cleanup, parent (null) [ 1861.501625] kobject: 'ip6gretap0' (00000000de871e1a): auto cleanup 'remove' event [ 1861.513400] kobject: 'eql' (000000007497db43): calling ktype release 03:38:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'eql\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x18\x00\xa9[\x00`\x02\x00', @ifru_settings={0xa88b, 0x0, @te1=0x0}}) 03:38:58 executing program 2: 03:38:58 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000013c0)="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", 0x1dd, 0x3}]) 03:38:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000000000006f6f743d002c00"]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x7, 0x5}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f001200040000000000"], 0x0, &(0x7f0000000340)='reiserfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x6) personality(0x4000009) mmap(&(0x7f000030b000/0x1000)=nil, 0x1000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x4) fcntl$notify(r2, 0x402, 0x10) mmap(&(0x7f0000338000/0x3000)=nil, 0x3000, 0x800002000003, 0x13, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x9, 0x4, 0x6d79}) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x6, 0x0, 0xd85d, 0x10001, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x5, 0xff, 0x3, 0x1, 0x7fff, 0xffffffffffff8001, 0x10000, 0x5, 0xe3a, 0x45, 0x0, 0x4, 0x6, 0x4, 0x0, 0xd0f0, 0x0, 0x2, 0x4, 0x6, 0x0, 0x1, 0x1ff, 0xb9, 0x9, 0xffff, 0x200, 0x0, 0x0, 0x9, 0x1, @perf_bp={0x0}, 0x10, 0x4e, 0x67cbdd72, 0x6, 0xffffffff, 0x996}, 0x0, 0xd, 0xffffffffffffffff, 0x2) [ 1861.518792] kobject: 'tunl0' (000000006bea6914): kobject_add_internal: parent: 'net', set: 'devices' [ 1861.528168] kobject: 'eql': free name [ 1861.532720] kobject: 'ip6gretap0' (00000000de871e1a): kobject_uevent_env [ 1861.532730] kobject: 'ip6gretap0' (00000000de871e1a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1861.532737] kobject: 'ip6gretap0' (00000000de871e1a): calling ktype release [ 1861.532757] kobject: 'ip6gretap0': free name [ 1861.533580] kobject: 'tunl0' (000000006bea6914): kobject_uevent_env [ 1861.591651] kobject: 'tunl0' (000000006bea6914): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 1861.601438] kobject: 'loop4' (0000000023fb6fa7): kobject_uevent_env [ 1861.607975] kobject: 'loop4' (0000000023fb6fa7): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1861.617209] kobject: 'queues' (00000000025b5365): kobject_add_internal: parent: 'tunl0', set: '' [ 1861.633040] kobject: 'loop1' (00000000835d4027): kobject_uevent_env [ 1861.639940] kobject: 'loop1' (00000000835d4027): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1861.640868] kobject: 'queues' (00000000025b5365): kobject_uevent_env [ 1861.660054] kobject: 'queues' (00000000025b5365): kobject_uevent_env: filter function caused the event to drop! [ 1861.670607] kobject: 'rx-0' (0000000027cdd430): kobject_add_internal: parent: 'queues', set: 'queues' [ 1861.681190] kobject: 'rx-0' (0000000027cdd430): kobject_uevent_env [ 1861.687792] kobject: 'rx-0' (0000000027cdd430): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 1861.698274] kobject: 'tx-0' (00000000de3a4e8e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1861.707112] overlayfs: failed to resolve './file1': -2 [ 1861.708038] kobject: 'loop2' (00000000eef5efaf): kobject_uevent_env [ 1861.717701] kobject: 'tx-0' (00000000de3a4e8e): kobject_uevent_env [ 1861.725759] kobject: 'loop2' (00000000eef5efaf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1861.739184] kobje