il}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:05 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0xff}, 0x20) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r2, r1) 01:44:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xa000000]}}]}]}, 0xac}}, 0x0) 01:44:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891116105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:05 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0xff}, 0x20) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r2, r1) 01:44:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xf0]}}]}]}, 0xac}}, 0x0) [ 1416.993505] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1417.025721] ldm_validate_partition_table(): Disk read failed. 01:44:05 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) socket$nl_xfrm(0x10, 0x3, 0x6) dup2(0xffffffffffffffff, r1) [ 1417.085173] Dev loop0: unable to read RDB block 0 [ 1417.116456] loop0: unable to read partition table [ 1417.140683] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1417.163250] audit: type=1400 audit(1542764646.010:168): avc: denied { associate } for pid=10661 comm="syz-executor2" name="file1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 [ 1417.163432] overlayfs: './file0' not a directory 01:44:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x500]}}]}]}, 0xac}}, 0x0) [ 1417.247030] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:06 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) dup2(r2, 0xffffffffffffffff) 01:44:06 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000200), 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth0_to_bond\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x1d, r1}, 0x10, &(0x7f0000000380)={&(0x7f0000000300)={0x0, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}}, 0x0) 01:44:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891416105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xa00]}}]}]}, 0xac}}, 0x0) 01:44:06 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = gettid() getpid() kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) chdir(&(0x7f0000000280)='./file0\x00') ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, &(0x7f0000fff000/0x1000)=nil, 0x100000001}) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) 01:44:06 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x4000100, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='udf\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='^&em1\x00', 0x6, 0x0) [ 1417.655203] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1417.665447] UDF-fs: Scanning with blocksize 512 failed [ 1417.681836] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1417.691940] UDF-fs: Scanning with blocksize 1024 failed [ 1417.699833] ldm_validate_partition_table(): Disk read failed. 01:44:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x2]}}]}]}, 0xac}}, 0x0) [ 1417.714529] Dev loop0: unable to read RDB block 0 [ 1417.719871] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1417.727366] UDF-fs: Scanning with blocksize 2048 failed [ 1417.744352] loop0: unable to read partition table [ 1417.754543] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 01:44:06 executing program 0: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000240)={0x8000a0}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) fcntl$setstatus(r0, 0x4, 0x40000) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) [ 1417.761479] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1417.796134] UDF-fs: Scanning with blocksize 4096 failed 01:44:06 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = gettid() getpid() kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) chdir(&(0x7f0000000280)='./file0\x00') ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, &(0x7f0000fff000/0x1000)=nil, 0x100000001}) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) [ 1417.814188] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1417.825355] UDF-fs: Scanning with blocksize 512 failed [ 1417.831271] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1417.838937] UDF-fs: Scanning with blocksize 1024 failed [ 1417.868917] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1417.898144] UDF-fs: Scanning with blocksize 2048 failed 01:44:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x4]}}]}]}, 0xac}}, 0x0) 01:44:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:06 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x4000100, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='udf\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='^&em1\x00', 0x6, 0x0) [ 1417.946942] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1417.978632] UDF-fs: Scanning with blocksize 4096 failed 01:44:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892716105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:06 executing program 0: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000240)={0x8000a0}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) fcntl$setstatus(r0, 0x4, 0x40000) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) [ 1418.088379] overlayfs: failed to resolve './file1': -2 01:44:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x1a0ffffffff]}}]}]}, 0xac}}, 0x0) [ 1418.163535] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1418.217694] ldm_validate_partition_table(): Disk read failed. [ 1418.236783] Dev loop0: unable to read RDB block 0 01:44:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xfffff000]}}]}]}, 0xac}}, 0x0) [ 1418.263039] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1418.264389] loop0: unable to read partition table [ 1418.284020] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1418.307883] UDF-fs: Scanning with blocksize 512 failed 01:44:07 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = gettid() getpid() kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) chdir(&(0x7f0000000280)='./file0\x00') ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, &(0x7f0000fff000/0x1000)=nil, 0x100000001}) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) 01:44:07 executing program 0: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000240)={0x8000a0}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) fcntl$setstatus(r0, 0x4, 0x40000) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) [ 1418.332523] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1418.394712] UDF-fs: Scanning with blocksize 1024 failed [ 1418.402032] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1418.434482] UDF-fs: Scanning with blocksize 2048 failed 01:44:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891a16105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xa0010000]}}]}]}, 0xac}}, 0x0) [ 1418.461163] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 01:44:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1418.553762] UDF-fs: Scanning with blocksize 4096 failed 01:44:07 executing program 0: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000240)={0x8000a0}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) fcntl$setstatus(r0, 0x4, 0x40000) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) 01:44:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xfffffffffffff000]}}]}]}, 0xac}}, 0x0) 01:44:07 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x4000100, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='udf\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='^&em1\x00', 0x6, 0x0) [ 1418.698218] ldm_validate_partition_table(): Disk read failed. [ 1418.705621] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1418.724056] print_req_error: 862 callbacks suppressed [ 1418.724066] print_req_error: I/O error, dev loop0, sector 0 [ 1418.729946] print_req_error: I/O error, dev loop0, sector 0 [ 1418.747052] print_req_error: I/O error, dev loop0, sector 0 [ 1418.766707] print_req_error: I/O error, dev loop0, sector 0 [ 1418.772765] Dev loop0: unable to read RDB block 0 [ 1418.805104] print_req_error: I/O error, dev loop0, sector 0 [ 1418.822791] print_req_error: I/O error, dev loop0, sector 0 [ 1418.839888] print_req_error: I/O error, dev loop0, sector 0 [ 1418.848237] print_req_error: I/O error, dev loop0, sector 0 01:44:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x40030000000000]}}]}]}, 0xac}}, 0x0) [ 1418.854332] loop0: unable to read partition table [ 1418.862308] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1418.915530] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1418.937166] UDF-fs: Scanning with blocksize 512 failed [ 1418.939229] print_req_error: I/O error, dev loop0, sector 0 01:44:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1418.963928] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1418.982005] UDF-fs: Scanning with blocksize 1024 failed [ 1419.004584] print_req_error: I/O error, dev loop0, sector 0 [ 1419.013024] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 01:44:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891716105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xf0ffffff00000000]}}]}]}, 0xac}}, 0x0) [ 1419.041950] UDF-fs: Scanning with blocksize 2048 failed [ 1419.065871] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1419.086415] UDF-fs: Scanning with blocksize 4096 failed 01:44:08 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = gettid() getpid() kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) chdir(&(0x7f0000000280)='./file0\x00') ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, &(0x7f0000fff000/0x1000)=nil, 0x100000001}) 01:44:08 executing program 0: ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0xc0185500, &(0x7f0000000240)={0x8000a0}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) fcntl$setstatus(r0, 0x4, 0x40000) bind$can_raw(r1, &(0x7f0000000140), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) 01:44:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xb00000000000000]}}]}]}, 0xac}}, 0x0) 01:44:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:08 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x4000100, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='udf\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='^&em1\x00', 0x6, 0x0) [ 1419.226550] ldm_validate_partition_table(): Disk read failed. [ 1419.272109] Dev loop0: unable to read RDB block 0 [ 1419.286149] loop0: unable to read partition table [ 1419.291364] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x13000000]}}]}]}, 0xac}}, 0x0) 01:44:08 executing program 0: socket$inet(0x2, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0), &(0x7f0000000540)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) 01:44:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891c16105829576914e70bfeb59800f97c97644ab8a7"}) [ 1419.396013] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1419.436111] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1419.442922] UDF-fs: Scanning with blocksize 512 failed 01:44:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1419.526590] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1419.533402] UDF-fs: Scanning with blocksize 1024 failed 01:44:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x500000000000000]}}]}]}, 0xac}}, 0x0) [ 1419.605513] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1419.626773] ldm_validate_partition_table(): Disk read failed. [ 1419.645992] UDF-fs: Scanning with blocksize 2048 failed 01:44:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x1000000000000000]}}]}]}, 0xac}}, 0x0) [ 1419.652089] Dev loop0: unable to read RDB block 0 [ 1419.673560] loop0: unable to read partition table [ 1419.679427] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1419.693883] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:08 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x4000100, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='udf\x00', 0x0, 0x0) [ 1419.705065] UDF-fs: Scanning with blocksize 4096 failed [ 1419.809776] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1419.860895] UDF-fs: Scanning with blocksize 512 failed 01:44:08 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = gettid() getpid() kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) chdir(&(0x7f0000000280)='./file0\x00') ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 01:44:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116896316105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:08 executing program 0: capset(&(0x7f0000000280)={0x19980330}, &(0x7f0000804000)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) get_robust_list(r1, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0), 0x0, &(0x7f0000000080)={&(0x7f0000000000)}}, &(0x7f0000000200)=0x18) 01:44:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x30000]}}]}]}, 0xac}}, 0x0) [ 1419.905021] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1419.928826] UDF-fs: Scanning with blocksize 1024 failed [ 1419.937018] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 01:44:08 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='udf\x00', 0x0, 0x0) [ 1419.971257] UDF-fs: Scanning with blocksize 2048 failed [ 1419.983251] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1419.993147] UDF-fs: Scanning with blocksize 4096 failed 01:44:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xf000000]}}]}]}, 0xac}}, 0x0) 01:44:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)="7374617475730042236739c16d17f90dc22322c94f133520785e91ea85ae107cc3819819c263540b1de1ba201e6de4b75a50115091eed530aa482e36594601ceb5d169c5baf41b35d8a5a09a82496613d86023865b57ef269f90d304969f687df53b611b40a44291b5a882208fbb835e54a41310a3b481d5bdbb0981742909a63b7cd1a18d405e5b011bfbe5a4d5bf299447e4c0dd4b63a367211c0078238b509d614100d33a5584aa3b3cb9b99e6e5f84719294d41b27117c47fb4f2b2be475eb25d5f69b6d10cf8422cade570c087b03f6b1818bc97077db23") sendfile(r0, r1, &(0x7f0000000040), 0x4) [ 1420.064353] buffer_io_error: 870 callbacks suppressed [ 1420.064362] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.103320] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.122851] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.132514] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1420.133396] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.147363] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.155099] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.162766] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1420.166294] UDF-fs: Scanning with blocksize 512 failed [ 1420.170728] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.182577] ldm_validate_partition_table(): Disk read failed. [ 1420.195398] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.212536] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found 01:44:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xf000]}}]}]}, 0xac}}, 0x0) [ 1420.213565] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.238100] UDF-fs: Scanning with blocksize 1024 failed [ 1420.264477] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1420.266471] Dev loop0: unable to read RDB block 0 [ 1420.284439] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1420.291866] loop0: unable to read partition table [ 1420.299993] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1420.314645] UDF-fs: Scanning with blocksize 2048 failed 01:44:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xf]}}]}]}, 0xac}}, 0x0) [ 1420.352882] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1420.383477] UDF-fs: Scanning with blocksize 4096 failed 01:44:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:09 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = gettid() getpid() kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) chdir(&(0x7f0000000280)='./file0\x00') 01:44:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891316105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:09 executing program 4: clone(0x4000100, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='udf\x00', 0x0, 0x0) 01:44:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x81, &(0x7f0000000080), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000280)=@in6={0xa, 0x0, 0x4, @loopback}, 0x80, &(0x7f0000000080), 0x1, &(0x7f0000000000), 0x142}}], 0x2, 0x0) 01:44:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x300]}}]}]}, 0xac}}, 0x0) 01:44:09 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='udf\x00', 0x0, 0x0) [ 1420.647377] ldm_validate_partition_table(): Disk read failed. [ 1420.660846] Dev loop0: unable to read RDB block 0 [ 1420.675758] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1420.699959] loop0: unable to read partition table 01:44:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1420.724426] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:09 executing program 0: socket$inet6(0xa, 0x803, 0x3) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) ftruncate(r0, 0x8000) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0xffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x220802, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)=0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x41f, &(0x7f0000000000)=[{}]}, 0x10) r3 = socket$unix(0x1, 0x3, 0x0) bind$unix(r3, &(0x7f000000f000)=@abs={0x1}, 0x8) 01:44:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x1200000000000000]}}]}]}, 0xac}}, 0x0) 01:44:09 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = gettid() getpid() kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893016105829576914e70bfeb59800f97c97644ab8a7"}) [ 1420.846760] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1420.895548] UDF-fs: Scanning with blocksize 512 failed 01:44:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x1000000]}}]}]}, 0xac}}, 0x0) [ 1420.978004] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1421.006730] ldm_validate_partition_table(): Disk read failed. [ 1421.017507] Dev loop0: unable to read RDB block 0 [ 1421.022443] UDF-fs: Scanning with blocksize 1024 failed [ 1421.043791] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1421.058031] loop0: unable to read partition table [ 1421.075262] UDF-fs: Scanning with blocksize 2048 failed [ 1421.078042] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xf0ffff]}}]}]}, 0xac}}, 0x0) [ 1421.100119] UDF-fs: warning (device nullb0): udf_load_vrs: No VRS found [ 1421.133121] UDF-fs: Scanning with blocksize 4096 failed [ 1421.149473] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xb000000]}}]}]}, 0xac}}, 0x0) 01:44:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:10 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"c68cd86f5f8703a886fb70c1d8f9a120"}}}}, 0xa0) 01:44:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116894116105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x1a0]}}]}]}, 0xac}}, 0x0) 01:44:10 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x0, 0xffffffffffffffff, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"c68cd86f5f8703a886fb70c1d8f9a120"}}}}, 0xa0) [ 1421.673753] ldm_validate_partition_table(): Disk read failed. [ 1421.700787] Dev loop0: unable to read RDB block 0 [ 1421.745827] loop0: unable to read partition table [ 1421.768725] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:10 executing program 0: r0 = msgget$private(0x0, 0x40) msgrcv(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1, 0x1, 0x1000) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7) 01:44:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:10 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 01:44:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x4c03]}}]}]}, 0xac}}, 0x0) 01:44:10 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = gettid() getpid() kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) 01:44:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893216105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x8]}}]}]}, 0xac}}, 0x0) 01:44:11 executing program 4: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") socketpair$unix(0x1, 0x100000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) recvfrom$unix(r1, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000580)=@abs, 0xffffffffffffffdb) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_misc(r2, &(0x7f0000000240)={'syz0'}, 0x4) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x0) dup3(r1, r0, 0x0) [ 1422.103409] overlayfs: failed to resolve './file1': -2 [ 1422.167665] ldm_validate_partition_table(): Disk read failed. [ 1422.188523] Dev loop0: unable to read RDB block 0 [ 1422.206067] loop0: unable to read partition table 01:44:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x34c]}}]}]}, 0xac}}, 0x0) [ 1422.210430] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1422.227065] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:11 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = gettid() getpid() kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116890716105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:11 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1422.612008] ldm_validate_partition_table(): Disk read failed. [ 1422.625563] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1422.645080] Dev loop0: unable to read RDB block 0 [ 1422.656143] loop0: unable to read partition table [ 1422.674190] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='dctcp\x00', 0x6) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000140)=""/101, 0xffffffffffffff26, 0x700, 0x0, 0x20000) 01:44:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x34000]}}]}]}, 0xac}}, 0x0) 01:44:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891916105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) r2 = socket$inet_sctp(0x2, 0x100000001, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) recvmmsg(r1, &(0x7f0000001b00)=[{{&(0x7f00000002c0)=@alg, 0x80, &(0x7f0000000340), 0x0, &(0x7f0000000480)=""/158, 0x9e}}], 0x1, 0x0, &(0x7f0000001b80)={0x77359400}) 01:44:11 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = gettid() getpid() kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x9]}}]}]}, 0xac}}, 0x0) [ 1422.933153] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:44:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x9effffff00000000]}}]}]}, 0xac}}, 0x0) [ 1422.986158] ldm_validate_partition_table(): Disk read failed. [ 1423.011330] Dev loop0: unable to read RDB block 0 01:44:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:11 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = gettid() getpid() kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1423.034817] loop0: unable to read partition table [ 1423.049095] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x10000000]}}]}]}, 0xac}}, 0x0) 01:44:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116890d16105829576914e70bfeb59800f97c97644ab8a7"}) [ 1423.347082] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1423.456930] ldm_validate_partition_table(): Disk read failed. [ 1423.474221] Dev loop0: unable to read RDB block 0 [ 1423.512276] loop0: unable to read partition table [ 1423.544535] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891816105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x11]}}]}]}, 0xac}}, 0x0) 01:44:12 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) gettid() getpid() mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='dctcp\x00', 0x6) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom(r0, &(0x7f0000000140)=""/101, 0xffffffffffffff26, 0x700, 0x0, 0x20000) 01:44:12 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000002c0)={@mcast2, 0x800, 0x2, 0x0, 0x0, 0xa4ffffff, 0xfffffffffffff001}, 0x38) 01:44:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x900000000000000]}}]}]}, 0xac}}, 0x0) 01:44:12 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0a5c2d023c126285718070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000020feffff7a0af0fff8ffffff79a4f0ff00000000b70600000018d1fe2d6402000000000045040400010000000704000000000000b7040000100000006a0a00fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000280)="c2066dd644ec01d752677f9c2d5fd0e7fa3d32003d"}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x1e, 0xf5, &(0x7f0000000540)="f5bd0d58f2eee8c01f6c60abd3da9d292eb383790cd8901974245102b702", &(0x7f0000000440)=""/245, 0x55f}, 0x28) [ 1423.895441] print_req_error: 950 callbacks suppressed [ 1423.895451] print_req_error: I/O error, dev loop0, sector 0 [ 1423.927409] print_req_error: I/O error, dev loop0, sector 0 [ 1423.937090] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1423.970276] print_req_error: I/O error, dev loop0, sector 0 [ 1424.004602] print_req_error: I/O error, dev loop0, sector 0 [ 1424.024787] print_req_error: I/O error, dev loop0, sector 0 [ 1424.035148] print_req_error: I/O error, dev loop0, sector 0 [ 1424.045929] print_req_error: I/O error, dev loop0, sector 0 [ 1424.056648] print_req_error: I/O error, dev loop0, sector 0 [ 1424.062496] ldm_validate_partition_table(): Disk read failed. 01:44:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x1300]}}]}]}, 0xac}}, 0x0) [ 1424.074265] print_req_error: I/O error, dev loop0, sector 0 [ 1424.098568] print_req_error: I/O error, dev loop0, sector 0 [ 1424.115729] Dev loop0: unable to read RDB block 0 [ 1424.136264] loop0: unable to read partition table [ 1424.163967] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:13 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) gettid() mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xa]}}]}]}, 0xac}}, 0x0) 01:44:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116890816105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:13 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000340)={0x0, 0x7}) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000280)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f00000003c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)}}], 0x0, 0x0, &(0x7f0000000580)}) 01:44:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x13]}}]}]}, 0xac}}, 0x0) [ 1424.496743] ldm_validate_partition_table(): Disk read failed. [ 1424.526058] Dev loop0: unable to read RDB block 0 [ 1424.533968] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1424.545074] loop0: unable to read partition table [ 1424.559660] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001900010200000000000000001d0100002c000200217b266f6c6f2e2c47504c276370757365746e6f64657621285d76626f786e65743123bf5e5b00"], 0x1}}, 0x0) 01:44:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x3000000]}}]}]}, 0xac}}, 0x0) [ 1424.606326] binder: 11240:11248 got transaction to invalid handle [ 1424.616606] binder: 11240:11248 transaction failed 29201/-22, size 0-0 line 2834 01:44:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892a16105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:13 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x5000000]}}]}]}, 0xac}}, 0x0) [ 1424.886176] ldm_validate_partition_table(): Disk read failed. [ 1424.900960] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1424.912121] Dev loop0: unable to read RDB block 0 [ 1424.923333] loop0: unable to read partition table [ 1424.932454] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x11000000]}}]}]}, 0xac}}, 0x0) 01:44:13 executing program 0: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000240)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000140)='./file0\x00', 0x0) 01:44:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116890f16105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:13 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1425.214870] buffer_io_error: 1102 callbacks suppressed [ 1425.214880] Buffer I/O error on dev loop0, logical block 0, async page read [ 1425.228716] Buffer I/O error on dev loop0, logical block 0, async page read [ 1425.236468] Buffer I/O error on dev loop0, logical block 0, async page read [ 1425.246254] Buffer I/O error on dev loop0, logical block 0, async page read [ 1425.254963] Buffer I/O error on dev loop0, logical block 0, async page read [ 1425.269766] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1425.278415] Buffer I/O error on dev loop0, logical block 0, async page read [ 1425.286507] Buffer I/O error on dev loop0, logical block 0, async page read [ 1425.305304] Buffer I/O error on dev loop0, logical block 0, async page read [ 1425.312739] ldm_validate_partition_table(): Disk read failed. [ 1425.325154] Buffer I/O error on dev loop0, logical block 0, async page read [ 1425.334166] binder: BINDER_SET_CONTEXT_MGR already set [ 1425.339481] Buffer I/O error on dev loop0, logical block 0, async page read [ 1425.339491] binder: 11240:11248 ioctl 40046207 0 returned -16 [ 1425.343037] binder: 11240:11303 got transaction to invalid handle [ 1425.353801] Dev loop0: unable to read RDB block 0 [ 1425.370977] loop0: unable to read partition table [ 1425.378595] binder: 11240:11303 transaction failed 29201/-22, size 0-0 line 2834 [ 1425.380901] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1425.412609] binder: undelivered TRANSACTION_ERROR: 29201 01:44:14 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x4000) shmctl$SHM_UNLOCK(r0, 0xc) 01:44:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x4c030000]}}]}]}, 0xac}}, 0x0) 01:44:14 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1425.459938] binder: undelivered TRANSACTION_ERROR: 29201 01:44:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x1200]}}]}]}, 0xac}}, 0x0) 01:44:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892816105829576914e70bfeb59800f97c97644ab8a7"}) [ 1425.594429] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x10]}}]}]}, 0xac}}, 0x0) 01:44:14 executing program 4: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r0, 0xb) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) shmat(r0, &(0x7f0000ffb000/0x3000)=nil, 0x4000) shmctl$SHM_UNLOCK(r0, 0xc) 01:44:14 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1425.815872] ldm_validate_partition_table(): Disk read failed. [ 1425.840630] Dev loop0: unable to read RDB block 0 [ 1425.858151] loop0: unable to read partition table [ 1425.863448] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1425.929754] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1425.955805] audit: type=1804 audit(1542764654.810:169): pid=11289 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="file0" dev="sda1" ino=17553 res=1 01:44:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000004100), 0x2a37, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 01:44:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xa00000000000000]}}]}]}, 0xac}}, 0x0) 01:44:14 executing program 4: openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x44, 0x0, &(0x7f0000000180)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f0000000580)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000280)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f00000003c0)=[@transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0)}}], 0x0, 0x0, &(0x7f0000000580)}) 01:44:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891516105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:14 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1426.093038] binder_alloc: 11357: binder_alloc_buf, no vma [ 1426.114097] binder: 11357:11359 transaction failed 29189/-3, size 0-0 line 2973 01:44:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x600000000000000]}}]}]}, 0xac}}, 0x0) [ 1426.156289] ldm_validate_partition_table(): Disk read failed. [ 1426.189203] Dev loop0: unable to read RDB block 0 01:44:15 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)=ANY=[@ANYBLOB="06"]}) [ 1426.223983] binder: release 11357:11359 transaction 24 in, still active [ 1426.235400] loop0: unable to read partition table [ 1426.240466] binder: send failed reply for transaction 24 to 11357:11359 [ 1426.254439] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1426.265834] binder: undelivered TRANSACTION_ERROR: 29189 [ 1426.276777] binder: undelivered TRANSACTION_COMPLETE [ 1426.286681] binder: undelivered TRANSACTION_ERROR: 29189 01:44:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x800000000000000]}}]}]}, 0xac}}, 0x0) 01:44:15 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000240)=""/184) bind$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa) [ 1426.339941] overlayfs: failed to resolve './file1': -2 01:44:15 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893116105829576914e70bfeb59800f97c97644ab8a7"}) [ 1426.576265] ldm_validate_partition_table(): Disk read failed. [ 1426.608014] Dev loop0: unable to read RDB block 0 [ 1426.629077] loop0: unable to read partition table [ 1426.653901] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:15 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x100040000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="28000000000000002900000039000000270202018000000600000000000000000000000000000000"], 0x28}, 0x0) 01:44:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x9000000]}}]}]}, 0xac}}, 0x0) 01:44:15 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:15 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892916105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x5]}}]}]}, 0xac}}, 0x0) 01:44:15 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:15 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0xfffffffffffffff8, 0x3, 0x40, 0x0, 0xdf87, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0xffffffff, 0x1, 0x80, 0x0, 0x3ff, 0x0, 0xffffffff, 0x0, 0x6, 0x1, 0x4, 0x0, 0x3, 0x0, 0x3a53, 0x0, 0x1, 0x7, 0x8, 0xf6, 0x9, 0x0, 0x2, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000280), 0x1}, 0x2300, 0x1000000000, 0x109, 0x0, 0x1, 0x8}, r1, 0xd, r0, 0x8) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7}, 0x7) sched_getscheduler(r1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 1426.887598] ldm_validate_partition_table(): Disk read failed. [ 1426.919650] Dev loop0: unable to read RDB block 0 [ 1426.991027] loop0: unable to read partition table 01:44:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x200000000000000]}}]}]}, 0xac}}, 0x0) 01:44:15 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1427.011944] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893316105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:16 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1427.309150] ldm_validate_partition_table(): Disk read failed. [ 1427.329166] Dev loop0: unable to read RDB block 0 [ 1427.347248] loop0: unable to read partition table [ 1427.353036] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1427.380860] __ntfs_error: 2 callbacks suppressed [ 1427.380872] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x4c03000000000000]}}]}]}, 0xac}}, 0x0) 01:44:16 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:16 executing program 0: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000340)) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000040)) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x80000, 0x0, 0x5}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:44:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116890216105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:16 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xffffff7f00000000]}}]}]}, 0xac}}, 0x0) 01:44:16 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000640), 0x0) syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x0, 0xa712b6a4a26e809a) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000540)={&(0x7f0000000500)=[0x0], 0x1, 0x0, 0x7fffffff, 0xe85, 0x9, 0xffffffffffffff80, {0x80, 0x0, 0x5, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1fd3a74d, 0x9, 0x8, 0x0, 0x0, "f4b04567a8bd086a9431b7db53bbf2f5ab4815770d0643115500ff88afd1accd"}}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x4e23, 0x0, 0x2, 0x80, 0x80, 0xae}, {0x31b1, 0x0, 0x10001, 0x0, 0x8001, 0x9, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x2}, 0x20, 0x6e6bbb, 0x0, 0x1}, {{@in=@multicast1, 0x4d5}, 0xa, @in6=@mcast1, 0x0, 0x4, 0x3, 0x0, 0x3, 0x5, 0x6}}, 0xe8) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) poll(&(0x7f0000000800), 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x400000, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000004c0)={0x0, 0xc0, 0x3, 0x3, 0x1, 0x9, 0x6, 0x7fffffff, 0x4}) modify_ldt$read_default(0x2, &(0x7f0000000400)=""/184, 0xb8) umount2(&(0x7f0000000180)='./file0\x00', 0x600000000000000) lchown(&(0x7f0000000200)='./file0\x00', r0, r1) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000140), &(0x7f00000001c0)=0x4) [ 1427.706305] ldm_validate_partition_table(): Disk read failed. [ 1427.744467] Dev loop0: unable to read RDB block 0 01:44:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x12000000]}}]}]}, 0xac}}, 0x0) [ 1427.794442] loop0: unable to read partition table [ 1427.803894] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:16 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891216105829576914e70bfeb59800f97c97644ab8a7"}) [ 1427.989265] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1428.107341] minix_free_inode: bit 1 already cleared [ 1428.185784] ldm_validate_partition_table(): Disk read failed. [ 1428.197778] Dev loop0: unable to read RDB block 0 [ 1428.204369] loop0: unable to read partition table [ 1428.209681] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x2000000]}}]}]}, 0xac}}, 0x0) 01:44:17 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000200)="6c6f67696e7569640039dad3c444de4a35f0fd223db6aa1e2fdd63c9f35f389e4669e0af6522c225bbb645ae9e0f46c87cd44db4919c1a34ab1d00bb4157f79b23912e9b96566ebf23618dfdd331fcacfeccdb938974f48d420c49e5b37f94bdb651b9c102659034f4192f") sendfile(r3, r4, &(0x7f00000000c0), 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:17 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892216105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:17 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xffffffffa0010000]}}]}]}, 0xac}}, 0x0) [ 1428.614802] ldm_validate_partition_table(): Disk read failed. [ 1428.645811] overlayfs: failed to resolve './file1': -2 [ 1428.646611] Dev loop0: unable to read RDB block 0 01:44:17 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xff60}, 0xe3c7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@rand_addr, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) ioprio_get$uid(0x3, r1) chown(&(0x7f00000002c0)='./file0\x00', r1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) socket$alg(0x26, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) mount(&(0x7f0000000040)=@nullb='::,0:nullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)="50f073656c696e75786367726f757000") [ 1428.679102] loop0: unable to read partition table 01:44:17 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1428.702760] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x6]}}]}]}, 0xac}}, 0x0) 01:44:17 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891616105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xffffffff00000000]}}]}]}, 0xac}}, 0x0) [ 1428.923273] libceph: parse_ips bad ip '::,0:nullb' 01:44:17 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:17 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xff60}, 0xe3c7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@rand_addr, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) ioprio_get$uid(0x3, r1) chown(&(0x7f00000002c0)='./file0\x00', r1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) socket$alg(0x26, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) mount(&(0x7f0000000040)=@nullb='::,0:nullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)="50f073656c696e75786367726f757000") [ 1429.006854] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:17 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x8000000]}}]}]}, 0xac}}, 0x0) [ 1429.056404] print_req_error: 1196 callbacks suppressed [ 1429.056415] print_req_error: I/O error, dev loop0, sector 0 [ 1429.079889] print_req_error: I/O error, dev loop0, sector 0 [ 1429.109313] print_req_error: I/O error, dev loop0, sector 0 [ 1429.130609] print_req_error: I/O error, dev loop0, sector 0 [ 1429.148584] print_req_error: I/O error, dev loop0, sector 0 [ 1429.167515] print_req_error: I/O error, dev loop0, sector 0 [ 1429.190750] print_req_error: I/O error, dev loop0, sector 0 [ 1429.208567] print_req_error: I/O error, dev loop0, sector 0 01:44:18 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:18 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x400300]}}]}]}, 0xac}}, 0x0) [ 1429.214595] ldm_validate_partition_table(): Disk read failed. [ 1429.235724] print_req_error: I/O error, dev loop0, sector 0 [ 1429.253435] print_req_error: I/O error, dev loop0, sector 0 [ 1429.272049] Dev loop0: unable to read RDB block 0 [ 1429.304149] loop0: unable to read partition table [ 1429.313783] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1429.422248] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1429.516735] libceph: parse_ips bad ip '::,0:nullb' 01:44:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xffffff9e]}}]}]}, 0xac}}, 0x0) 01:44:18 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892d16105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:18 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xff60}, 0xe3c7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@rand_addr, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) ioprio_get$uid(0x3, r1) chown(&(0x7f00000002c0)='./file0\x00', r1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) socket$alg(0x26, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) mount(&(0x7f0000000040)=@nullb='::,0:nullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)="50f073656c696e75786367726f757000") 01:44:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:18 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xf00000000000000]}}]}]}, 0xac}}, 0x0) 01:44:18 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1429.820683] ldm_validate_partition_table(): Disk read failed. [ 1429.859539] overlayfs: failed to resolve './file1': -2 [ 1429.871673] Dev loop0: unable to read RDB block 0 01:44:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x1300000000000000]}}]}]}, 0xac}}, 0x0) [ 1429.894986] loop0: unable to read partition table [ 1429.906341] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1429.981392] libceph: parse_ips bad ip '::,0:nullb' 01:44:18 executing program 4: socket$inet6(0xa, 0x803, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:18 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116890e16105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:18 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xff60}, 0xe3c7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@rand_addr, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) ioprio_get$uid(0x3, r1) chown(&(0x7f00000002c0)='./file0\x00', r1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) socket$alg(0x26, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) mount(&(0x7f0000000040)=@nullb='::,0:nullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)="50f073656c696e75786367726f757000") 01:44:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xf0ffffffffffff]}}]}]}, 0xac}}, 0x0) 01:44:18 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:19 executing program 4: socket$inet6(0xa, 0x803, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:19 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() getrusage(0x0, &(0x7f0000000400)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1430.235120] buffer_io_error: 1036 callbacks suppressed [ 1430.235129] Buffer I/O error on dev loop0, logical block 0, async page read [ 1430.271933] Buffer I/O error on dev loop0, logical block 0, async page read [ 1430.297179] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1430.306923] Buffer I/O error on dev loop0, logical block 0, async page read [ 1430.361972] Buffer I/O error on dev loop0, logical block 0, async page read [ 1430.396461] Buffer I/O error on dev loop0, logical block 0, async page read [ 1430.449074] Buffer I/O error on dev loop0, logical block 0, async page read [ 1430.466334] libceph: parse_ips bad ip '::,0:nullb' [ 1430.496176] Buffer I/O error on dev loop0, logical block 0, async page read [ 1430.529316] Buffer I/O error on dev loop0, logical block 0, async page read [ 1430.537498] ldm_validate_partition_table(): Disk read failed. [ 1430.559363] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1430.570175] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x6000000]}}]}]}, 0xac}}, 0x0) 01:44:19 executing program 4: socket$inet6(0xa, 0x803, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:19 executing program 0: socket$inet6(0xa, 0x803, 0x3) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) ftruncate(r0, 0x8000) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0xffff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)=0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x41f, &(0x7f0000000000)=[{}]}, 0x10) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = socket$unix(0x1, 0x3, 0x0) bind$unix(r2, &(0x7f000000f000)=@abs={0x1}, 0x8) [ 1430.601375] Buffer I/O error on dev loop0, logical block 0, async page read [ 1430.640708] Dev loop0: unable to read RDB block 0 01:44:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xf00]}}]}]}, 0xac}}, 0x0) [ 1430.663859] loop0: unable to read partition table [ 1430.679544] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:19 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892616105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:19 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xfffffff0]}}]}]}, 0xac}}, 0x0) 01:44:19 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x300000000000000]}}]}]}, 0xac}}, 0x0) 01:44:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1431.071183] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1431.087094] ldm_validate_partition_table(): Disk read failed. [ 1431.144399] Dev loop0: unable to read RDB block 0 01:44:20 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1431.177203] loop0: unable to read partition table 01:44:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x900]}}]}]}, 0xac}}, 0x0) [ 1431.198368] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:20 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1431.535605] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:20 executing program 0: socket$inet6(0xa, 0x803, 0x3) epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) ftruncate(r0, 0x8000) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0xffff) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)=0x2) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x41f, &(0x7f0000000000)=[{}]}, 0x10) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = socket$unix(0x1, 0x3, 0x0) bind$unix(r2, &(0x7f000000f000)=@abs={0x1}, 0x8) 01:44:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893416105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:20 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x1100]}}]}]}, 0xac}}, 0x0) 01:44:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:20 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0xb]}}]}]}, 0xac}}, 0x0) [ 1431.899864] ldm_validate_partition_table(): Disk read failed. [ 1431.912295] Dev loop0: unable to read RDB block 0 01:44:20 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1431.944013] loop0: unable to read partition table 01:44:20 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xf]}}]}]}, 0xac}}, 0x0) [ 1431.979857] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:21 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:21 executing program 0: 01:44:21 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893635105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x13000000]}}]}]}, 0xac}}, 0x0) 01:44:21 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:21 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xb00]}}]}]}, 0xac}}, 0x0) [ 1432.926161] ldm_validate_partition_table(): Disk read failed. [ 1432.965698] Dev loop0: unable to read RDB block 0 01:44:21 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40096102, 0x0) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:21 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1300000000000000]}}]}]}, 0xac}}, 0x0) [ 1432.987089] loop0: unable to read partition table 01:44:21 executing program 0: [ 1433.017312] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xb000000]}}]}]}, 0xac}}, 0x0) 01:44:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893636105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:22 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:22 executing program 0: [ 1433.210029] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='dctcp\x00', 0x6) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, r0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000640)=ANY=[@ANYBLOB], 0x1, 0x2) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x20010, r0, 0x100000000) recvfrom(r0, &(0x7f0000000140)=""/101, 0xffffffffffffff26, 0x700, 0x0, 0x20000) 01:44:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x12]}}]}]}, 0xac}}, 0x0) [ 1433.366633] ldm_validate_partition_table(): Disk read failed. [ 1433.385913] Dev loop0: unable to read RDB block 0 [ 1433.405916] loop0: unable to read partition table 01:44:22 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1433.411453] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:22 executing program 4: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xffffff9e]}}]}]}, 0xac}}, 0x0) 01:44:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893641105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:22 executing program 4: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:22 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 1433.734707] ldm_validate_partition_table(): Disk read failed. [ 1433.748212] Dev loop0: unable to read RDB block 0 [ 1433.764248] loop0: unable to read partition table 01:44:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xb]}}]}]}, 0xac}}, 0x0) [ 1433.778333] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:22 executing program 4: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='dctcp\x00', 0x6) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, r0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000640)=ANY=[@ANYBLOB], 0x1, 0x2) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x20010, r0, 0x100000000) recvfrom(r0, &(0x7f0000000140)=""/101, 0xffffffffffffff26, 0x700, 0x0, 0x20000) 01:44:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x2]}}]}]}, 0xac}}, 0x0) 01:44:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616025829576914e70bfeb59800f97c97644ab8a7"}) 01:44:23 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 01:44:23 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x500000000000000]}}]}]}, 0xac}}, 0x0) [ 1434.434877] print_req_error: 694 callbacks suppressed [ 1434.434887] print_req_error: I/O error, dev loop0, sector 0 [ 1434.435818] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1434.447749] print_req_error: I/O error, dev loop0, sector 0 01:44:23 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1434.476764] print_req_error: I/O error, dev loop0, sector 0 [ 1434.526453] print_req_error: I/O error, dev loop0, sector 0 01:44:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xffffffff00000000]}}]}]}, 0xac}}, 0x0) [ 1434.574251] print_req_error: I/O error, dev loop0, sector 0 01:44:23 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1434.638189] print_req_error: I/O error, dev loop0, sector 0 01:44:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x8000000]}}]}]}, 0xac}}, 0x0) 01:44:23 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000140)={0x1d, r1}, 0x10) setsockopt(r0, 0x65, 0x1, &(0x7f0000000080), 0x1d0) [ 1434.684021] print_req_error: I/O error, dev loop0, sector 0 [ 1434.702210] print_req_error: I/O error, dev loop0, sector 0 [ 1434.708339] ldm_validate_partition_table(): Disk read failed. [ 1434.716153] print_req_error: I/O error, dev loop0, sector 0 [ 1434.722919] print_req_error: I/O error, dev loop0, sector 0 [ 1434.734835] Dev loop0: unable to read RDB block 0 [ 1434.745891] loop0: unable to read partition table [ 1434.770677] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:24 executing program 0: 01:44:24 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x600000000000000]}}]}]}, 0xac}}, 0x0) 01:44:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)=ANY=[@ANYBLOB='\r']}) 01:44:24 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616055829576914e70bfeb59800f97c97644ab8a7"}) 01:44:24 executing program 0: 01:44:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1300]}}]}]}, 0xac}}, 0x0) [ 1435.364742] buffer_io_error: 606 callbacks suppressed [ 1435.364751] Buffer I/O error on dev loop0, logical block 0, async page read [ 1435.385415] Buffer I/O error on dev loop0, logical block 0, async page read [ 1435.392834] Buffer I/O error on dev loop0, logical block 0, async page read [ 1435.400338] Buffer I/O error on dev loop0, logical block 0, async page read [ 1435.407811] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:24 executing program 1: 01:44:24 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1435.415270] Buffer I/O error on dev loop0, logical block 0, async page read [ 1435.422741] Buffer I/O error on dev loop0, logical block 0, async page read [ 1435.440593] Buffer I/O error on dev loop0, logical block 0, async page read [ 1435.447880] ldm_validate_partition_table(): Disk read failed. [ 1435.454340] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1435.461725] Buffer I/O error on dev loop0, logical block 0, async page read [ 1435.469482] Dev loop0: unable to read RDB block 0 [ 1435.509459] loop0: unable to read partition table [ 1435.524258] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x3000000]}}]}]}, 0xac}}, 0x0) 01:44:24 executing program 1: 01:44:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:24 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff41168936160b5829576914e70bfeb59800f97c97644ab8a7"}) 01:44:24 executing program 0: 01:44:24 executing program 1: [ 1435.729119] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x4]}}]}]}, 0xac}}, 0x0) 01:44:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:24 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:24 executing program 1: 01:44:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x3]}}]}]}, 0xac}}, 0x0) 01:44:24 executing program 0: [ 1435.957661] ldm_validate_partition_table(): Disk read failed. [ 1435.978745] Dev loop0: unable to read RDB block 0 [ 1436.000219] loop0: unable to read partition table 01:44:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1436.021936] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1436.082037] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff41168936160e5829576914e70bfeb59800f97c97644ab8a7"}) 01:44:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x10]}}]}]}, 0xac}}, 0x0) 01:44:25 executing program 1: 01:44:25 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:25 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xb00000000000000]}}]}]}, 0xac}}, 0x0) 01:44:25 executing program 0: 01:44:25 executing program 1: [ 1436.355617] ldm_validate_partition_table(): Disk read failed. [ 1436.376015] Dev loop0: unable to read RDB block 0 [ 1436.404727] loop0: unable to read partition table [ 1436.417332] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1436.437647] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:25 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1a0ffffffff]}}]}]}, 0xac}}, 0x0) 01:44:25 executing program 1: 01:44:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616115829576914e70bfeb59800f97c97644ab8a7"}) 01:44:25 executing program 0: [ 1436.487407] overlayfs: workdir and upperdir must reside under the same mount 01:44:25 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:25 executing program 1: 01:44:25 executing program 0: 01:44:25 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1000000000000000]}}]}]}, 0xac}}, 0x0) [ 1436.756725] ldm_validate_partition_table(): Disk read failed. [ 1436.790856] Dev loop0: unable to read RDB block 0 [ 1436.811846] loop0: unable to read partition table 01:44:25 executing program 1: [ 1436.833138] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1436.841351] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xf0ffff]}}]}]}, 0xac}}, 0x0) 01:44:25 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:25 executing program 0: 01:44:25 executing program 1: 01:44:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616365829576914e70bfeb59800f97c97644ab8a7"}) 01:44:26 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:26 executing program 0: 01:44:26 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xf00]}}]}]}, 0xac}}, 0x0) 01:44:26 executing program 1: [ 1437.228851] ldm_validate_partition_table(): Disk read failed. [ 1437.259164] Dev loop0: unable to read RDB block 0 01:44:26 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:26 executing program 0: [ 1437.294140] loop0: unable to read partition table [ 1437.312748] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x900]}}]}]}, 0xac}}, 0x0) [ 1437.354659] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:26 executing program 1: 01:44:26 executing program 0: 01:44:26 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:26 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616085829576914e70bfeb59800f97c97644ab8a7"}) 01:44:26 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xa]}}]}]}, 0xac}}, 0x0) 01:44:26 executing program 0: 01:44:26 executing program 1: 01:44:26 executing program 0: 01:44:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x2000000]}}]}]}, 0xac}}, 0x0) [ 1437.686286] ldm_validate_partition_table(): Disk read failed. 01:44:26 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1437.731669] Dev loop0: unable to read RDB block 0 [ 1437.745119] loop0: unable to read partition table [ 1437.765733] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:26 executing program 1: [ 1437.781450] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x30000]}}]}]}, 0xac}}, 0x0) 01:44:26 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:26 executing program 0: 01:44:26 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff41168936160a5829576914e70bfeb59800f97c97644ab8a7"}) 01:44:26 executing program 2: mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:26 executing program 1: 01:44:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xffffff7f]}}]}]}, 0xac}}, 0x0) 01:44:26 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:26 executing program 0: 01:44:27 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='ip6gretap0\x00', 0x10) sendto$inet(r0, &(0x7f0000000240), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x18004e20, @multicast1}, 0x10) 01:44:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xf0]}}]}]}, 0xac}}, 0x0) [ 1438.136112] ldm_validate_partition_table(): Disk read failed. [ 1438.190814] Dev loop0: unable to read RDB block 0 01:44:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)=ANY=[@ANYBLOB="11"]}) 01:44:27 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1438.214281] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1438.228250] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 1438.251793] loop0: unable to read partition table 01:44:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x34000]}}]}]}, 0xac}}, 0x0) [ 1438.271330] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:27 executing program 1: r0 = socket$inet(0x2, 0x3, 0x6) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000000580)=@nl=@unspec, 0x80, &(0x7f0000002a40), 0x0, &(0x7f0000000040)}}], 0x1, 0x0) 01:44:27 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff41168936160c5829576914e70bfeb59800f97c97644ab8a7"}) 01:44:27 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:27 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xff60}, 0xe3c7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@rand_addr, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) ioprio_get$uid(0x3, r1) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getegid() chown(&(0x7f00000002c0)='./file0\x00', r1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) socket$alg(0x26, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) mount(&(0x7f0000000040)=@nullb='::,0:nullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)="50f073656c696e75786367726f757000") 01:44:27 executing program 2: mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x400000000000000]}}]}]}, 0xac}}, 0x0) [ 1438.470104] raw_sendmsg: syz-executor1 forgot to set AF_INET. Fix it! 01:44:27 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) ftruncate(r0, 0x8000) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x41f, &(0x7f0000000000)=[{}]}, 0x10) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f000000f000)=@abs, 0x8) [ 1438.527444] ldm_validate_partition_table(): Disk read failed. [ 1438.550332] Dev loop0: unable to read RDB block 0 01:44:27 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1438.610491] loop0: unable to read partition table 01:44:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x200000000000000]}}]}]}, 0xac}}, 0x0) [ 1438.668145] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1438.698436] libceph: parse_ips bad ip '::,0:nullb' 01:44:27 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1438.753488] libceph: parse_ips bad ip '::,0:nullb' [ 1438.759544] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:27 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff41168936162f5829576914e70bfeb59800f97c97644ab8a7"}) 01:44:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x13]}}]}]}, 0xac}}, 0x0) 01:44:27 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xff60}, 0xe3c7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@rand_addr, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) ioprio_get$uid(0x3, r1) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getegid() chown(&(0x7f00000002c0)='./file0\x00', r1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) socket$alg(0x26, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) mount(&(0x7f0000000040)=@nullb='::,0:nullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)="50f073656c696e75786367726f757000") 01:44:27 executing program 2: mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1438.935998] ldm_validate_partition_table(): Disk read failed. [ 1438.967870] Dev loop0: unable to read RDB block 0 01:44:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x11]}}]}]}, 0xac}}, 0x0) 01:44:27 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1438.983004] loop0: unable to read partition table [ 1439.000211] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xa000000]}}]}]}, 0xac}}, 0x0) [ 1439.124246] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616415829576914e70bfeb59800f97c97644ab8a7"}) [ 1439.250998] libceph: parse_ips bad ip '::,0:nullb' [ 1439.346056] ldm_validate_partition_table(): Disk read failed. [ 1439.359836] Dev loop0: unable to read RDB block 0 [ 1439.367451] loop0: unable to read partition table [ 1439.372689] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:28 executing program 1: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:28 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:28 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xff60}, 0xe3c7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@rand_addr, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) ioprio_get$uid(0x3, r1) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000440)=""/91, 0x5b, 0x0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getegid() chown(&(0x7f00000002c0)='./file0\x00', r1, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000005c0)={0x0, &(0x7f0000000580)}) socket$alg(0x26, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) mount(&(0x7f0000000040)=@nullb='::,0:nullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)="50f073656c696e75786367726f757000") 01:44:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616065829576914e70bfeb59800f97c97644ab8a7"}) 01:44:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1000000]}}]}]}, 0xac}}, 0x0) 01:44:28 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1439.467565] print_req_error: 933 callbacks suppressed [ 1439.467577] print_req_error: I/O error, dev loop0, sector 0 [ 1439.488662] print_req_error: I/O error, dev loop0, sector 0 [ 1439.498367] print_req_error: I/O error, dev loop0, sector 0 [ 1439.531843] print_req_error: I/O error, dev loop0, sector 0 [ 1439.562885] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1439.573837] print_req_error: I/O error, dev loop0, sector 0 01:44:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x100000000000000]}}]}]}, 0xac}}, 0x0) [ 1439.592458] print_req_error: I/O error, dev loop0, sector 0 01:44:28 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1439.635064] print_req_error: I/O error, dev loop0, sector 0 [ 1439.642197] print_req_error: I/O error, dev loop0, sector 0 [ 1439.670239] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 01:44:28 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1439.680838] libceph: parse_ips bad ip '::,0:nullb' [ 1439.698143] print_req_error: I/O error, dev loop0, sector 0 01:44:28 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff41168936160d5829576914e70bfeb59800f97c97644ab8a7"}) [ 1439.730741] overlayfs: workdir and upperdir must reside under the same mount [ 1439.731909] print_req_error: I/O error, dev loop0, sector 0 01:44:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1100000000000000]}}]}]}, 0xac}}, 0x0) [ 1439.896708] ldm_validate_partition_table(): Disk read failed. [ 1439.905576] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1439.918329] Dev loop0: unable to read RDB block 0 [ 1439.927275] loop0: unable to read partition table 01:44:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:28 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x4c030000]}}]}]}, 0xac}}, 0x0) [ 1439.939482] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1300]}}]}]}, 0xac}}, 0x0) 01:44:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616035829576914e70bfeb59800f97c97644ab8a7"}) 01:44:28 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:28 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116892d16105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:28 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xf0ffffff]}}]}]}, 0xac}}, 0x0) 01:44:28 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1440.137301] ldm_validate_partition_table(): Disk read failed. [ 1440.175064] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1440.178414] Dev loop0: unable to read RDB block 0 01:44:29 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xf000]}}]}]}, 0xac}}, 0x0) [ 1440.247887] loop0: unable to read partition table 01:44:29 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1440.296411] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:29 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x8]}}]}]}, 0xac}}, 0x0) 01:44:29 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616045829576914e70bfeb59800f97c97644ab8a7"}) [ 1440.417536] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1440.454306] buffer_io_error: 1046 callbacks suppressed [ 1440.454317] Buffer I/O error on dev loop0, logical block 0, async page read [ 1440.494088] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:29 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:29 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:29 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116891216105829576914e70bfeb59800f97c97644ab8a7"}) [ 1440.555935] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x800000000000000]}}]}]}, 0xac}}, 0x0) [ 1440.598479] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:29 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1440.641985] Buffer I/O error on dev loop0, logical block 0, async page read [ 1440.659588] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6]}}]}]}, 0xac}}, 0x0) 01:44:29 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1440.714391] Buffer I/O error on dev loop0, logical block 0, async page read [ 1440.726748] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616125829576914e70bfeb59800f97c97644ab8a7"}) 01:44:29 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1440.780341] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:29 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x4000100, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) mount(&(0x7f0000000200)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='udf\x00', 0x0, 0x0) 01:44:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x9effffff00000000]}}]}]}, 0xac}}, 0x0) [ 1440.831517] Buffer I/O error on dev loop0, logical block 0, async page read [ 1440.864052] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:29 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:29 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:29 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616075829576914e70bfeb59800f97c97644ab8a7"}) 01:44:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xf0ffffff00000000]}}]}]}, 0xac}}, 0x0) [ 1441.085571] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 01:44:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xfffff000]}}]}]}, 0xac}}, 0x0) 01:44:30 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:30 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1441.183209] ldm_validate_partition_table(): Disk read failed. [ 1441.209579] Dev loop0: unable to read RDB block 0 01:44:30 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x12000000]}}]}]}, 0xac}}, 0x0) 01:44:30 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) [ 1441.247942] loop0: unable to read partition table [ 1441.264100] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:30 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x4000000]}}]}]}, 0xac}}, 0x0) 01:44:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616355829576914e70bfeb59800f97c97644ab8a7"}) 01:44:30 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:30 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x600]}}]}]}, 0xac}}, 0x0) 01:44:30 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[]) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:30 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000080)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0xff, 0xb, 0x0, 0xff}, 0x20) 01:44:30 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:30 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1441.656200] ldm_validate_partition_table(): Disk read failed. [ 1441.684515] Dev loop0: unable to read RDB block 0 [ 1441.725033] loop0: unable to read partition table 01:44:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x5]}}]}]}, 0xac}}, 0x0) 01:44:30 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1441.748098] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1441.775309] overlayfs: unrecognized mount option "" or missing value 01:44:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x34c]}}]}]}, 0xac}}, 0x0) 01:44:30 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616095829576914e70bfeb59800f97c97644ab8a7"}) 01:44:30 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB]) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:30 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:30 executing program 0: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000000)='\n') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000240)={'ipvs\x00'}, &(0x7f0000000280)=0x1e) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f00000000c0)="c744240000000000c74424024f000000c7442406000000000f011c24c4427d180508000000c4c245ae08c4e2850108b9800000c00f3235004000000f30d3559e67470f224205c814000066b89d000f00d0c423a95f2518410000e1", 0x5b}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:44:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xffffff7f00000000]}}]}]}, 0xac}}, 0x0) [ 1442.069607] overlayfs: unrecognized mount option "" or missing value 01:44:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:31 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:31 executing program 1: socket$inet6(0xa, 0x803, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:31 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1ff, &(0x7f0000000300)="0a5c80505798acacc70e5a6e69918b91cbcba11b599d01667330d0cc1970e5e910b723f6084cc332b77b6595d6d924a3cded068dd67b") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xf85, 0x400000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000280)={@loopback, 0x800, 0x2, 0x3, 0x4, 0x2, 0x0, 0x3}, 0x20) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000100)) write$P9_RVERSION(r3, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x100000001, 0x8, '9P2000.L'}, 0x15) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)) dup2(r2, r4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x8000, 0x0) syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x1, 0x8000) gettid() mlockall(0x1) mmap(&(0x7f0000428000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x8032, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') 01:44:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x10000000]}}]}]}, 0xac}}, 0x0) [ 1442.177659] ldm_validate_partition_table(): Disk read failed. [ 1442.189783] Dev loop0: unable to read RDB block 0 [ 1442.205147] loop0: unable to read partition table [ 1442.210372] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:31 executing program 1: socket$inet6(0xa, 0x803, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616106029576914e70bfeb59800f97c97644ab8a7"}) 01:44:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x6000000]}}]}]}, 0xac}}, 0x0) [ 1442.392549] overlayfs: unrecognized mount option "lowerdir" or missing value 01:44:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1442.500500] ldm_validate_partition_table(): Disk read failed. [ 1442.539515] Dev loop0: unable to read RDB block 0 01:44:31 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,wor']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:31 executing program 1: socket$inet6(0xa, 0x803, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1442.578049] loop0: unable to read partition table [ 1442.592545] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xa00000000000000]}}]}]}, 0xac}}, 0x0) 01:44:31 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105864576914e70bfeb59800f97c97644ab8a7"}) [ 1442.806683] overlayfs: unrecognized mount option "wor" or missing value [ 1443.016942] ldm_validate_partition_table(): Disk read failed. [ 1443.038224] Dev loop0: unable to read RDB block 0 [ 1443.064970] loop0: unable to read partition table [ 1443.076719] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:32 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1ff, &(0x7f0000000300)="0a5c80505798acacc70e5a6e69918b91cbcba11b599d01667330d0cc1970e5e910b723f6084cc332b77b6595d6d924a3cded068dd67b") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xf85, 0x400000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000280)={@loopback, 0x800, 0x2, 0x3, 0x4, 0x2, 0x0, 0x3}, 0x20) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000100)) write$P9_RVERSION(r3, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x100000001, 0x8, '9P2000.L'}, 0x15) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)) dup2(r2, r4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x8000, 0x0) syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x1, 0x8000) gettid() mlockall(0x1) mmap(&(0x7f0000428000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x8032, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') 01:44:32 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x5000000]}}]}]}, 0xac}}, 0x0) 01:44:32 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:32 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=.']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105868576914e70bfeb59800f97c97644ab8a7"}) 01:44:33 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1444.169747] __ntfs_error: 5 callbacks suppressed [ 1444.169755] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1444.207063] ldm_validate_partition_table(): Disk read failed. 01:44:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x400300]}}]}]}, 0xac}}, 0x0) [ 1444.215730] overlayfs: workdir and upperdir must be separate subtrees 01:44:33 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1444.245870] Dev loop0: unable to read RDB block 0 [ 1444.293436] loop0: unable to read partition table 01:44:33 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e"], 0x18) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1444.339737] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:33 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./fi']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:33 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1444.638904] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1444.700019] overlayfs: failed to resolve './fi': -2 01:44:34 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1ff, &(0x7f0000000300)="0a5c80505798acacc70e5a6e69918b91cbcba11b599d01667330d0cc1970e5e910b723f6084cc332b77b6595d6d924a3cded068dd67b") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0xff, 0x100000000000001}, 0x20) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xf85, 0x400000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000080)="2f6578650000000000000f1ce3000000000000000000000000") mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000280)={@loopback, 0x800, 0x2, 0x3, 0x4, 0x2, 0x0, 0x3}, 0x20) pread64(r3, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000480)=0x60) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000007c0)) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_flowlabel\x00') r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000100)) write$P9_RVERSION(r3, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x100000001, 0x8, '9P2000.L'}, 0x15) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)) dup2(r2, r4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x8000, 0x0) syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x1, 0x8000) gettid() mlockall(0x1) mmap(&(0x7f0000428000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x8032, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') 01:44:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x500]}}]}]}, 0xac}}, 0x0) 01:44:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105841576914e70bfeb59800f97c97644ab8a7"}) 01:44:34 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f"], 0x1c) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:34 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:34 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x3) 01:44:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1200]}}]}]}, 0xac}}, 0x0) 01:44:34 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d"], 0x1e) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1445.916488] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1445.953577] overlayfs: failed to resolve './file': -2 01:44:34 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1445.975894] print_req_error: 647 callbacks suppressed [ 1445.975904] print_req_error: I/O error, dev loop0, sector 0 [ 1445.986954] buffer_io_error: 446 callbacks suppressed [ 1445.986963] Buffer I/O error on dev loop0, logical block 0, async page read [ 1446.042481] print_req_error: I/O error, dev loop0, sector 0 [ 1446.048474] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x4c03]}}]}]}, 0xac}}, 0x0) [ 1446.095416] print_req_error: I/O error, dev loop0, sector 0 [ 1446.101265] Buffer I/O error on dev loop0, logical block 0, async page read [ 1446.123547] print_req_error: I/O error, dev loop0, sector 0 [ 1446.129424] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:35 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) [ 1446.163886] print_req_error: I/O error, dev loop0, sector 0 [ 1446.169763] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:35 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1446.206303] print_req_error: I/O error, dev loop0, sector 0 [ 1446.212148] Buffer I/O error on dev loop0, logical block 0, async page read [ 1446.242405] print_req_error: I/O error, dev loop0, sector 0 [ 1446.248273] Buffer I/O error on dev loop0, logical block 0, async page read [ 1446.284671] print_req_error: I/O error, dev loop0, sector 0 [ 1446.290506] Buffer I/O error on dev loop0, logical block 0, async page read [ 1446.298014] ldm_validate_partition_table(): Disk read failed. [ 1446.355309] print_req_error: I/O error, dev loop0, sector 0 [ 1446.361167] Buffer I/O error on dev loop0, logical block 0, async page read [ 1446.414952] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1446.428497] print_req_error: I/O error, dev loop0, sector 0 [ 1446.434349] Buffer I/O error on dev loop0, logical block 0, async page read [ 1446.468574] Dev loop0: unable to read RDB block 0 [ 1446.481663] loop0: unable to read partition table [ 1446.506481] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:36 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:36 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1e"], 0x1f) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xfffffffffffff000]}}]}]}, 0xac}}, 0x0) 01:44:36 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:36 executing program 2: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105856576914e70bfeb59800f97c97644ab8a7"}) 01:44:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xfffffff0]}}]}]}, 0xac}}, 0x0) 01:44:36 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1447.756907] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 1447.785484] ldm_validate_partition_table(): Disk read failed. 01:44:36 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1447.816133] Dev loop0: unable to read RDB block 0 01:44:36 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1447.837732] loop0: unable to read partition table 01:44:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1200000000000000]}}]}]}, 0xac}}, 0x0) [ 1447.862904] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105855576914e70bfeb59800f97c97644ab8a7"}) 01:44:36 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x4c03000000000000]}}]}]}, 0xac}}, 0x0) 01:44:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) 01:44:36 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:36 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1a0]}}]}]}, 0xac}}, 0x0) 01:44:37 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1448.178828] ldm_validate_partition_table(): Disk read failed. [ 1448.222976] Dev loop0: unable to read RDB block 0 01:44:37 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1448.244443] loop0: unable to read partition table [ 1448.249608] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x9000000]}}]}]}, 0xac}}, 0x0) 01:44:37 executing program 1: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:37 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0xff}, 0x20) 01:44:37 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105869576914e70bfeb59800f97c97644ab8a7"}) 01:44:37 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:37 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xa00]}}]}]}, 0xac}}, 0x0) 01:44:37 executing program 1: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:37 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0xff}, 0x20) [ 1448.589952] ldm_validate_partition_table(): Disk read failed. [ 1448.616528] Dev loop0: unable to read RDB block 0 01:44:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x9]}}]}]}, 0xac}}, 0x0) 01:44:37 executing program 2 (fault-call:8 fault-nth:0): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:37 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1448.647145] loop0: unable to read partition table [ 1448.654961] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1448.748030] FAULT_INJECTION: forcing a failure. [ 1448.748030] name failslab, interval 1, probability 0, space 0, times 0 [ 1448.773821] CPU: 1 PID: 13102 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #122 [ 1448.781235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1448.790604] Call Trace: [ 1448.793215] dump_stack+0x244/0x39d [ 1448.796857] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1448.802082] should_fail.cold.4+0xa/0x17 [ 1448.806165] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1448.811288] ? zap_class+0x640/0x640 [ 1448.815034] ? find_held_lock+0x36/0x1c0 [ 1448.819115] ? __lock_is_held+0xb5/0x140 [ 1448.823172] ? swsusp_write+0x758/0x9b0 [ 1448.827161] ? perf_trace_sched_process_exec+0x860/0x860 [ 1448.827179] ? print_usage_bug+0xc0/0xc0 [ 1448.836695] __should_failslab+0x124/0x180 [ 1448.840935] should_failslab+0x9/0x14 [ 1448.844751] __kmalloc+0x2e0/0x760 [ 1448.848295] ? sock_kmalloc+0x15a/0x1f0 [ 1448.852281] sock_kmalloc+0x15a/0x1f0 [ 1448.856103] ? __sk_mem_schedule+0xe0/0xe0 [ 1448.860352] ? trace_hardirqs_on+0xbd/0x310 [ 1448.864687] ? lock_release+0xa00/0xa00 [ 1448.868679] ? lock_sock_nested+0xe2/0x120 [ 1448.872928] ? trace_hardirqs_off_caller+0x310/0x310 [ 1448.878054] af_alg_alloc_areq+0x83/0x280 [ 1448.882227] ? alg_accept+0x60/0x60 [ 1448.885866] ? __local_bh_enable_ip+0x160/0x260 [ 1448.890554] skcipher_recvmsg+0x354/0x1780 01:44:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x3000000000000]}}]}]}, 0xac}}, 0x0) 01:44:37 executing program 4 (fault-call:7 fault-nth:0): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x900000000000000]}}]}]}, 0xac}}, 0x0) [ 1448.894818] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1448.899688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1448.905237] ? security_socket_recvmsg+0x9c/0xc0 [ 1448.910004] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1448.914866] sock_recvmsg+0xd0/0x110 [ 1448.918597] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1448.923620] ___sys_recvmsg+0x2b6/0x680 [ 1448.923646] ? ___sys_sendmsg+0x930/0x930 [ 1448.923667] ? lock_downgrade+0x900/0x900 [ 1448.923687] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1448.923704] ? proc_fail_nth_write+0x9e/0x210 [ 1448.923724] ? __fget_light+0x2e9/0x430 [ 1448.923739] ? fget_raw+0x20/0x20 [ 1448.923757] ? find_held_lock+0x36/0x1c0 [ 1448.957473] ? kasan_check_write+0x14/0x20 [ 1448.961724] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1448.966685] ? wait_for_completion+0x8a0/0x8a0 [ 1448.971293] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1448.976843] ? sockfd_lookup_light+0xc5/0x160 [ 1448.981355] __sys_recvmsg+0x11a/0x280 [ 1448.985258] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1448.989256] FAULT_INJECTION: forcing a failure. [ 1448.989256] name failslab, interval 1, probability 0, space 0, times 0 [ 1448.989855] ? __sb_end_write+0xd9/0x110 [ 1449.005101] ? fput+0x130/0x1a0 [ 1449.008390] ? do_syscall_64+0x9a/0x820 [ 1449.012370] ? do_syscall_64+0x9a/0x820 [ 1449.016361] ? trace_hardirqs_off_caller+0x310/0x310 [ 1449.021490] __x64_sys_recvmsg+0x78/0xb0 [ 1449.025570] do_syscall_64+0x1b9/0x820 [ 1449.029475] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1449.034853] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1449.039792] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.044649] ? trace_hardirqs_on_caller+0x310/0x310 [ 1449.049674] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1449.054702] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1449.054725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.054749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1449.064578] RIP: 0033:0x457569 [ 1449.064593] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1449.064601] RSP: 002b:00007fecba0eec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1449.064616] RAX: ffffffffffffffda RBX: 00007fecba0eec90 RCX: 0000000000457569 [ 1449.064624] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 [ 1449.064631] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1449.064639] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fecba0ef6d4 [ 1449.064648] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 [ 1449.072755] CPU: 1 PID: 13117 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1449.091946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1449.091953] Call Trace: [ 1449.091977] dump_stack+0x244/0x39d [ 1449.091997] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1449.092017] ? get_pid_task+0xd6/0x1a0 [ 1449.092049] should_fail.cold.4+0xa/0x17 [ 1449.092069] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1449.092093] ? __f_unlock_pos+0x19/0x20 [ 1449.092112] ? lock_downgrade+0x900/0x900 [ 1449.092133] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1449.092152] ? proc_fail_nth_write+0x9e/0x210 [ 1449.092166] ? proc_cwd_link+0x1d0/0x1d0 [ 1449.092185] ? find_held_lock+0x36/0x1c0 [ 1449.107170] ? perf_trace_sched_process_exec+0x860/0x860 [ 1449.136197] ? __lock_is_held+0xb5/0x140 [ 1449.172207] __should_failslab+0x124/0x180 [ 1449.172228] should_failslab+0x9/0x14 [ 1449.172245] __kmalloc_track_caller+0x2d1/0x760 [ 1449.193343] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1449.195449] ? strncpy_from_user+0x5a0/0x5a0 [ 1449.195469] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1449.195486] ? strndup_user+0x77/0xd0 [ 1449.195502] memdup_user+0x2c/0xa0 [ 1449.195516] strndup_user+0x77/0xd0 [ 1449.195535] ksys_mount+0x3c/0x140 [ 1449.258020] __x64_sys_mount+0xbe/0x150 [ 1449.261996] do_syscall_64+0x1b9/0x820 [ 1449.265871] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1449.271240] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1449.276157] ? trace_hardirqs_on_caller+0x310/0x310 [ 1449.281162] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1449.286163] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1449.292814] ? __switch_to_asm+0x40/0x70 [ 1449.296860] ? __switch_to_asm+0x34/0x70 [ 1449.300911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.305752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1449.310937] RIP: 0033:0x457569 [ 1449.314127] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1449.333026] RSP: 002b:00007f8eefc67c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1449.340730] RAX: ffffffffffffffda RBX: 00007f8eefc67c90 RCX: 0000000000457569 01:44:38 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xf0ffffffffffff]}}]}]}, 0xac}}, 0x0) 01:44:38 executing program 1: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105843576914e70bfeb59800f97c97644ab8a7"}) 01:44:38 executing program 2 (fault-call:8 fault-nth:1): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1449.347983] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1449.355246] RBP: 000000000072c040 R08: 0000000020000140 R09: 0000000000000000 [ 1449.362507] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc686d4 [ 1449.369757] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000005 [ 1449.447355] FAULT_INJECTION: forcing a failure. [ 1449.447355] name failslab, interval 1, probability 0, space 0, times 0 [ 1449.499545] CPU: 0 PID: 13127 Comm: syz-executor2 Not tainted 4.20.0-rc3+ #122 [ 1449.506954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1449.516315] Call Trace: [ 1449.518939] dump_stack+0x244/0x39d [ 1449.522597] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1449.527811] ? trace_hardirqs_on+0xbd/0x310 [ 1449.532144] ? kasan_check_read+0x11/0x20 [ 1449.536306] ? iov_iter_get_pages+0x2fa/0x12a0 [ 1449.540904] should_fail.cold.4+0xa/0x17 [ 1449.544984] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1449.550106] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1449.555133] ? get_user_pages_fast+0x2a9/0x450 [ 1449.559742] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1449.564513] ? __kernel_text_address+0xd/0x40 [ 1449.569040] ? unwind_get_return_address+0x61/0xa0 [ 1449.573983] ? zap_class+0x640/0x640 [ 1449.577722] ? __save_stack_trace+0x8d/0xf0 [ 1449.582059] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1449.587094] ? find_held_lock+0x36/0x1c0 [ 1449.591169] ? __lock_is_held+0xb5/0x140 [ 1449.595258] ? perf_trace_sched_process_exec+0x860/0x860 [ 1449.600722] ? find_held_lock+0x36/0x1c0 [ 1449.604808] __should_failslab+0x124/0x180 [ 1449.609061] should_failslab+0x9/0x14 [ 1449.612874] __kmalloc+0x2e0/0x760 [ 1449.616426] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1449.621456] ? iov_iter_advance+0x306/0x13f0 [ 1449.625876] ? sg_init_table+0x28/0x60 [ 1449.629774] ? sock_kmalloc+0x15a/0x1f0 [ 1449.633756] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1449.638785] sock_kmalloc+0x15a/0x1f0 [ 1449.642596] ? __sk_mem_schedule+0xe0/0xe0 [ 1449.646864] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1449.651900] af_alg_get_rsgl+0x1d7/0x920 [ 1449.655999] ? af_alg_make_sg+0x550/0x550 [ 1449.660163] ? lock_sock_nested+0xe2/0x120 [ 1449.664414] ? trace_hardirqs_off_caller+0x310/0x310 [ 1449.669533] ? af_alg_alloc_areq+0x1ec/0x280 [ 1449.673953] ? alg_accept+0x60/0x60 [ 1449.677599] ? __local_bh_enable_ip+0x160/0x260 [ 1449.682287] skcipher_recvmsg+0x3a2/0x1780 [ 1449.686545] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1449.691408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1449.696955] ? security_socket_recvmsg+0x9c/0xc0 [ 1449.701730] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1449.706586] sock_recvmsg+0xd0/0x110 [ 1449.710313] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1449.715345] ___sys_recvmsg+0x2b6/0x680 [ 1449.719358] ? ___sys_sendmsg+0x930/0x930 [ 1449.723543] ? lock_downgrade+0x900/0x900 [ 1449.727726] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1449.733274] ? proc_fail_nth_write+0x9e/0x210 [ 1449.737781] ? __fget_light+0x2e9/0x430 [ 1449.741854] ? fget_raw+0x20/0x20 [ 1449.745329] ? find_held_lock+0x36/0x1c0 [ 1449.749411] ? kasan_check_write+0x14/0x20 [ 1449.753664] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1449.758612] ? wait_for_completion+0x8a0/0x8a0 [ 1449.763220] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1449.768772] ? sockfd_lookup_light+0xc5/0x160 [ 1449.773287] __sys_recvmsg+0x11a/0x280 [ 1449.777190] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1449.781784] ? __sb_end_write+0xd9/0x110 [ 1449.785872] ? fput+0x130/0x1a0 [ 1449.789167] ? do_syscall_64+0x9a/0x820 [ 1449.793156] ? do_syscall_64+0x9a/0x820 [ 1449.797155] ? trace_hardirqs_off_caller+0x310/0x310 [ 1449.802274] __x64_sys_recvmsg+0x78/0xb0 [ 1449.806368] do_syscall_64+0x1b9/0x820 [ 1449.810290] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1449.815683] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1449.820621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.825478] ? trace_hardirqs_on_caller+0x310/0x310 [ 1449.830515] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1449.835560] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1449.840588] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1449.845538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1449.850732] RIP: 0033:0x457569 [ 1449.853932] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1449.873023] RSP: 002b:00007fecba0eec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1449.880743] RAX: ffffffffffffffda RBX: 00007fecba0eec90 RCX: 0000000000457569 [ 1449.888025] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 01:44:38 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:38 executing program 4 (fault-call:7 fault-nth:1): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x300000000000000]}}]}]}, 0xac}}, 0x0) 01:44:38 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1449.895300] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1449.902581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fecba0ef6d4 [ 1449.909855] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 [ 1449.990991] ldm_validate_partition_table(): Disk read failed. [ 1450.007899] Dev loop0: unable to read RDB block 0 01:44:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xf00000000000000]}}]}]}, 0xac}}, 0x0) 01:44:38 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1450.059374] loop0: unable to read partition table [ 1450.073809] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:39 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1450.129994] FAULT_INJECTION: forcing a failure. [ 1450.129994] name failslab, interval 1, probability 0, space 0, times 0 01:44:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xf000000]}}]}]}, 0xac}}, 0x0) 01:44:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff411689361610584d576914e70bfeb59800f97c97644ab8a7"}) [ 1450.211067] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1450.274257] CPU: 1 PID: 13176 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1450.281668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1450.291029] Call Trace: [ 1450.293635] dump_stack+0x244/0x39d [ 1450.297289] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1450.302501] ? debug_smp_processor_id+0x1c/0x20 [ 1450.307187] ? perf_trace_lock+0x14d/0x7a0 [ 1450.311455] should_fail.cold.4+0xa/0x17 [ 1450.315533] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1450.320638] ? lock_is_held_type+0x210/0x210 [ 1450.325059] ? save_stack+0x43/0xd0 [ 1450.325075] ? kasan_kmalloc+0xc7/0xe0 [ 1450.325090] ? __kmalloc_track_caller+0x157/0x760 [ 1450.325104] ? memdup_user+0x2c/0xa0 [ 1450.325125] ? do_syscall_64+0x1b9/0x820 [ 1450.341158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1450.341183] ? proc_fail_nth_write+0x9e/0x210 [ 1450.341207] ? find_held_lock+0x36/0x1c0 [ 1450.359222] ? aes_ctr_enc_128_avx_by8+0x7f8/0x1250 [ 1450.359257] ? perf_trace_sched_process_exec+0x860/0x860 [ 1450.369697] ? lock_release+0xa00/0xa00 [ 1450.373681] ? perf_trace_sched_process_exec+0x860/0x860 [ 1450.379164] __should_failslab+0x124/0x180 [ 1450.383422] should_failslab+0x9/0x14 [ 1450.387238] __kmalloc_track_caller+0x2d1/0x760 [ 1450.391930] ? strncpy_from_user+0x5a0/0x5a0 [ 1450.396349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1450.401895] ? strndup_user+0x77/0xd0 [ 1450.405725] memdup_user+0x2c/0xa0 [ 1450.409282] strndup_user+0x77/0xd0 [ 1450.412934] ksys_mount+0x73/0x140 [ 1450.416493] __x64_sys_mount+0xbe/0x150 [ 1450.420487] do_syscall_64+0x1b9/0x820 [ 1450.424381] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1450.429759] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1450.434702] ? trace_hardirqs_on_caller+0x310/0x310 [ 1450.439733] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1450.444762] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1450.451461] ? __switch_to_asm+0x40/0x70 [ 1450.455532] ? __switch_to_asm+0x34/0x70 [ 1450.459616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1450.464478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1450.469676] RIP: 0033:0x457569 01:44:39 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x300]}}]}]}, 0xac}}, 0x0) [ 1450.472877] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1450.491787] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1450.499503] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1450.506776] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1450.506786] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1450.506795] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1450.506805] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:39 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:39 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1450.597683] ldm_validate_partition_table(): Disk read failed. [ 1450.612886] Dev loop0: unable to read RDB block 0 [ 1450.635723] loop0: unable to read partition table 01:44:39 executing program 4 (fault-call:7 fault-nth:2): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:39 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xffffffffa0010000]}}]}]}, 0xac}}, 0x0) 01:44:39 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1450.647568] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:39 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000fffffdef, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x40030000000000]}}]}]}, 0xac}}, 0x0) 01:44:39 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff411689361610586d576914e70bfeb59800f97c97644ab8a7"}) 01:44:39 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000a0010000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:39 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1450.844657] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1450.844781] FAULT_INJECTION: forcing a failure. [ 1450.844781] name failslab, interval 1, probability 0, space 0, times 0 01:44:39 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0xa0010000]}}]}]}, 0xac}}, 0x0) [ 1450.994923] print_req_error: 662 callbacks suppressed [ 1450.994932] print_req_error: I/O error, dev loop0, sector 0 [ 1451.006002] buffer_io_error: 662 callbacks suppressed [ 1451.006016] Buffer I/O error on dev loop0, logical block 0, async page read [ 1451.077311] print_req_error: I/O error, dev loop0, sector 0 [ 1451.079035] CPU: 0 PID: 13222 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1451.083133] Buffer I/O error on dev loop0, logical block 0, async page read [ 1451.090437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.090447] Call Trace: [ 1451.090477] dump_stack+0x244/0x39d [ 1451.090508] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1451.118434] ? perf_trace_lock+0x4a7/0x7a0 [ 1451.122718] should_fail.cold.4+0xa/0x17 [ 1451.126816] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1451.131949] ? lock_is_held_type+0x210/0x210 [ 1451.135637] print_req_error: I/O error, dev loop0, sector 0 [ 1451.136387] ? __kmalloc_track_caller+0x157/0x760 [ 1451.142140] Buffer I/O error on dev loop0, logical block 0, async page read [ 1451.146917] ? zap_class+0x640/0x640 [ 1451.146933] ? do_syscall_64+0x1b9/0x820 [ 1451.146978] ? find_held_lock+0x36/0x1c0 [ 1451.165928] ? perf_trace_sched_process_exec+0x860/0x860 [ 1451.171398] ? lock_release+0xa00/0xa00 [ 1451.175400] ? perf_trace_sched_process_exec+0x860/0x860 [ 1451.180897] ? usercopy_warn+0x110/0x110 [ 1451.184993] __should_failslab+0x124/0x180 [ 1451.187733] print_req_error: I/O error, dev loop0, sector 0 [ 1451.189250] should_failslab+0x9/0x14 [ 1451.189273] kmem_cache_alloc_trace+0x2d7/0x750 [ 1451.189299] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1451.195035] Buffer I/O error on dev loop0, logical block 0, async page read [ 1451.198802] ? _copy_from_user+0xdf/0x150 [ 1451.208028] print_req_error: I/O error, dev loop0, sector 0 [ 1451.208992] copy_mount_options+0x5f/0x430 [ 1451.209015] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1451.209043] ksys_mount+0xd0/0x140 [ 1451.216166] Buffer I/O error on dev loop0, logical block 0, async page read [ 1451.220271] __x64_sys_mount+0xbe/0x150 [ 1451.226446] print_req_error: I/O error, dev loop0, sector 0 [ 1451.230194] do_syscall_64+0x1b9/0x820 [ 1451.230215] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1451.230238] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1451.235783] Buffer I/O error on dev loop0, logical block 0, async page read [ 1451.239298] ? trace_hardirqs_on_caller+0x310/0x310 [ 1451.239320] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1451.246789] print_req_error: I/O error, dev loop0, sector 0 [ 1451.250371] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1451.250394] ? __switch_to_asm+0x40/0x70 [ 1451.250408] ? __switch_to_asm+0x34/0x70 [ 1451.250438] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1451.256143] Buffer I/O error on dev loop0, logical block 0, async page read [ 1451.260012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1451.260029] RIP: 0033:0x457569 [ 1451.265757] print_req_error: I/O error, dev loop0, sector 0 [ 1451.270302] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1451.270315] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1451.270334] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1451.270348] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1451.277477] Buffer I/O error on dev loop0, logical block 0, async page read [ 1451.282442] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1451.287574] ldm_validate_partition_table(): Disk read failed. [ 1451.293146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1451.293158] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 [ 1451.410510] print_req_error: I/O error, dev loop0, sector 0 [ 1451.416319] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:40 executing program 4 (fault-call:7 fault-nth:3): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:40 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000fffffff0, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:40 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x11000000]}}]}]}, 0xac}}, 0x0) 01:44:40 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1451.425057] print_req_error: I/O error, dev loop0, sector 0 [ 1451.430770] Buffer I/O error on dev loop0, logical block 0, async page read [ 1451.438720] Dev loop0: unable to read RDB block 0 [ 1451.446228] loop0: unable to read partition table [ 1451.451481] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x9effffff]}}]}]}, 0xac}}, 0x0) 01:44:40 executing program 0: socket$inet6(0xa, 0x803, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105845576914e70bfeb59800f97c97644ab8a7"}) 01:44:40 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000020000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:40 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1451.691166] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:44:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x1100]}}]}]}, 0xac}}, 0x0) [ 1451.731437] FAULT_INJECTION: forcing a failure. [ 1451.731437] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1451.743314] CPU: 0 PID: 13280 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1451.750683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.760045] Call Trace: [ 1451.762671] dump_stack+0x244/0x39d [ 1451.766349] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1451.771600] should_fail.cold.4+0xa/0x17 [ 1451.775709] ? fault_create_debugfs_attr+0x1f0/0x1f0 01:44:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}]}]}, 0xac}}, 0x0) [ 1451.780892] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1451.786024] ? perf_trace_run_bpf_submit+0x267/0x330 [ 1451.791347] ? perf_tp_event+0xc20/0xc20 [ 1451.795432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.800997] ? check_preemption_disabled+0x48/0x280 [ 1451.806043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.811605] ? check_preemption_disabled+0x48/0x280 [ 1451.816656] ? memset+0x31/0x40 [ 1451.819978] ? perf_trace_lock+0x4a7/0x7a0 [ 1451.824257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1451.829838] ? should_fail+0x22d/0xd01 [ 1451.833751] ? lock_is_held_type+0x210/0x210 [ 1451.838205] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1451.843332] ? lock_is_held_type+0x210/0x210 [ 1451.847787] __alloc_pages_nodemask+0x366/0xea0 [ 1451.852507] ? __kmalloc_track_caller+0x157/0x760 [ 1451.857389] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1451.862451] ? find_held_lock+0x36/0x1c0 [ 1451.866594] ? trace_hardirqs_off+0xb8/0x310 [ 1451.871033] cache_grow_begin+0xa5/0x8c0 [ 1451.875120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1451.880683] ? check_preemption_disabled+0x48/0x280 [ 1451.885729] kmem_cache_alloc_trace+0x684/0x750 [ 1451.890424] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1451.896008] copy_mount_options+0x5f/0x430 [ 1451.900265] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1451.905854] ksys_mount+0xd0/0x140 [ 1451.909426] __x64_sys_mount+0xbe/0x150 [ 1451.913441] do_syscall_64+0x1b9/0x820 [ 1451.917353] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1451.922743] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1451.927710] ? trace_hardirqs_on_caller+0x310/0x310 [ 1451.932758] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1451.937831] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1451.944529] ? __switch_to_asm+0x40/0x70 [ 1451.948617] ? __switch_to_asm+0x34/0x70 [ 1451.952723] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1451.957610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1451.962834] RIP: 0033:0x457569 [ 1451.966047] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1451.984967] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1451.992701] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1451.999994] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1452.007288] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1452.014579] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1452.021872] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:41 executing program 4 (fault-call:7 fault-nth:4): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}}]}]}, 0xac}}, 0x0) 01:44:41 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x100000000000000f, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1452.076086] ldm_validate_partition_table(): Disk read failed. [ 1452.093859] Dev loop0: unable to read RDB block 0 [ 1452.104850] loop0: unable to read partition table [ 1452.109920] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:41 executing program 0: socket$inet6(0xa, 0x803, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:41 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105849576914e70bfeb59800f97c97644ab8a7"}) 01:44:41 executing program 0: socket$inet6(0xa, 0x803, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:41 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x9effffff00000000]}}]}]}, 0xac}}, 0x0) 01:44:41 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000ffffff8d, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1452.335227] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1452.393055] FAULT_INJECTION: forcing a failure. [ 1452.393055] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.421330] CPU: 1 PID: 13332 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1452.428757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1452.438119] Call Trace: [ 1452.440727] dump_stack+0x244/0x39d [ 1452.444389] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1452.449595] ? perf_trace_lock+0x4a7/0x7a0 [ 1452.453873] should_fail.cold.4+0xa/0x17 [ 1452.453905] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1452.463063] ? print_usage_bug+0xc0/0xc0 [ 1452.467153] ? lock_is_held_type+0x210/0x210 [ 1452.471571] ? zap_class+0x640/0x640 [ 1452.475297] ? is_bpf_text_address+0xd3/0x170 [ 1452.479811] ? find_held_lock+0x36/0x1c0 [ 1452.483914] ? perf_trace_sched_process_exec+0x860/0x860 01:44:41 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:41 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x200000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1452.489380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.494936] ? check_preemption_disabled+0x48/0x280 [ 1452.499979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.505629] __should_failslab+0x124/0x180 [ 1452.505652] should_failslab+0x9/0x14 [ 1452.505667] kmem_cache_alloc+0x2be/0x730 [ 1452.505698] alloc_vfsmnt+0xe9/0x990 [ 1452.505715] ? m_stop+0x20/0x20 [ 1452.524869] ? avc_has_extended_perms+0x15a0/0x15a0 [ 1452.529905] ? zap_class+0x640/0x640 [ 1452.533773] ? find_held_lock+0x36/0x1c0 [ 1452.537865] ? __get_fs_type+0x97/0xc0 [ 1452.541783] ? lock_downgrade+0x900/0x900 [ 1452.545944] ? lock_release+0xa00/0xa00 [ 1452.549939] ? selinux_mount+0x1dc/0x3c0 [ 1452.554033] vfs_kern_mount.part.35+0x90/0x4f0 [ 1452.558629] ? may_umount+0xb0/0xb0 [ 1452.562282] ? _raw_read_unlock+0x2c/0x50 [ 1452.566472] ? __get_fs_type+0x97/0xc0 [ 1452.566500] do_mount+0x581/0x31f0 [ 1452.566516] ? retint_kernel+0x1b/0x2d [ 1452.566536] ? trace_hardirqs_on+0x310/0x310 [ 1452.566555] ? copy_mount_string+0x40/0x40 [ 1452.566574] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1452.566595] ? retint_kernel+0x2d/0x2d [ 1452.566631] ? copy_mount_options+0x25c/0x430 [ 1452.566644] ? copy_mount_options+0x1e3/0x430 [ 1452.566663] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 1452.591336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1452.591358] ? copy_mount_options+0x315/0x430 [ 1452.591384] ksys_mount+0x12d/0x140 [ 1452.591403] __x64_sys_mount+0xbe/0x150 [ 1452.591426] do_syscall_64+0x1b9/0x820 [ 1452.630605] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1452.635991] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1452.640945] ? trace_hardirqs_on_caller+0x310/0x310 [ 1452.645988] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1452.651022] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1452.657708] ? __switch_to_asm+0x40/0x70 [ 1452.661794] ? __switch_to_asm+0x34/0x70 [ 1452.665878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1452.670751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1452.675952] RIP: 0033:0x457569 [ 1452.679153] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1452.698149] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1452.705863] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1452.705873] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1452.705882] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1452.705891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1452.705900] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 [ 1452.744861] ldm_validate_partition_table(): Disk read failed. [ 1452.751400] Dev loop0: unable to read RDB block 0 [ 1452.757529] loop0: unable to read partition table [ 1452.766506] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:41 executing program 4 (fault-call:7 fault-nth:5): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}}]}]}, 0xac}}, 0x0) 01:44:41 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:41 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0xe00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:41 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105872576914e70bfeb59800f97c97644ab8a7"}) 01:44:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x400300]}}]}]}, 0xac}}, 0x0) 01:44:41 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:41 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0xc00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:41 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1452.970221] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1453.018048] FAULT_INJECTION: forcing a failure. [ 1453.018048] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1453.029913] CPU: 1 PID: 13371 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1453.029926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1453.029933] Call Trace: [ 1453.029964] dump_stack+0x244/0x39d [ 1453.052898] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1453.058127] should_fail.cold.4+0xa/0x17 [ 1453.062217] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1453.067334] ? debug_smp_processor_id+0x1c/0x20 [ 1453.067355] ? perf_trace_lock+0x14d/0x7a0 [ 1453.067383] ? mark_held_locks+0x130/0x130 [ 1453.067402] ? print_usage_bug+0xc0/0xc0 [ 1453.084578] ? zap_class+0x640/0x640 [ 1453.088334] ? lock_is_held_type+0x210/0x210 [ 1453.092759] ? print_usage_bug+0xc0/0xc0 [ 1453.096831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.102380] ? check_preemption_disabled+0x48/0x280 [ 1453.107415] ? debug_smp_processor_id+0x1c/0x20 [ 1453.112094] ? perf_trace_lock+0x14d/0x7a0 01:44:41 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1453.116346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.116364] ? should_fail+0x22d/0xd01 [ 1453.116380] ? lock_is_held_type+0x210/0x210 [ 1453.116401] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1453.116419] ? is_bpf_text_address+0xac/0x170 [ 1453.116440] __alloc_pages_nodemask+0x366/0xea0 [ 1453.116454] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1453.116470] ? kasan_check_read+0x11/0x20 [ 1453.116490] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1453.116504] ? rcu_softirq_qs+0x20/0x20 [ 1453.116520] ? unwind_dump+0x190/0x190 01:44:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x13]}}]}]}, 0xac}}, 0x0) [ 1453.135430] ? find_held_lock+0x36/0x1c0 [ 1453.135477] ? trace_hardirqs_off+0xb8/0x310 [ 1453.175017] cache_grow_begin+0xa5/0x8c0 [ 1453.179094] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1453.184648] ? check_preemption_disabled+0x48/0x280 [ 1453.185480] ldm_validate_partition_table(): Disk read failed. [ 1453.189699] kmem_cache_alloc+0x66b/0x730 [ 1453.189724] ? find_held_lock+0x36/0x1c0 [ 1453.203805] getname_flags+0xd0/0x590 [ 1453.207629] user_path_at_empty+0x2d/0x50 [ 1453.211786] do_mount+0x177/0x31f0 [ 1453.215337] ? check_preemption_disabled+0x48/0x280 [ 1453.220371] ? copy_mount_string+0x40/0x40 [ 1453.224627] ? rcu_pm_notify+0xc0/0xc0 [ 1453.228534] ? copy_mount_options+0x5f/0x430 [ 1453.232947] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1453.237974] ? kmem_cache_alloc_trace+0x353/0x750 [ 1453.242843] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1453.246111] Dev loop0: unable to read RDB block 0 [ 1453.248402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.248423] ? copy_mount_options+0x315/0x430 [ 1453.248445] ksys_mount+0x12d/0x140 [ 1453.266912] __x64_sys_mount+0xbe/0x150 [ 1453.270914] do_syscall_64+0x1b9/0x820 [ 1453.274816] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1453.280192] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1453.284675] loop0: unable to read partition table [ 1453.285137] ? trace_hardirqs_on_caller+0x310/0x310 [ 1453.295073] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1453.300104] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1453.303930] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1453.306779] ? __switch_to_asm+0x40/0x70 [ 1453.306794] ? __switch_to_asm+0x34/0x70 [ 1453.306820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1453.306847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.334492] RIP: 0033:0x457569 [ 1453.337705] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1453.356622] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1453.364357] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1453.371637] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1453.379364] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1453.386647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1453.393936] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:42 executing program 4 (fault-call:7 fault-nth:6): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:42 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000a0008000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x300]}}]}]}, 0xac}}, 0x0) 01:44:42 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:42 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105836576914e70bfeb59800f97c97644ab8a7"}) 01:44:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xa00]}}]}]}, 0xac}}, 0x0) [ 1453.618144] ldm_validate_partition_table(): Disk read failed. [ 1453.641175] Dev loop0: unable to read RDB block 0 [ 1453.654056] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:44:42 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000effdffff, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:42 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}]}]}, 0xac}}, 0x0) [ 1453.675382] loop0: unable to read partition table [ 1453.688665] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1453.705879] FAULT_INJECTION: forcing a failure. [ 1453.705879] name failslab, interval 1, probability 0, space 0, times 0 [ 1453.747886] CPU: 1 PID: 13414 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1453.755291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1453.764655] Call Trace: [ 1453.767267] dump_stack+0x244/0x39d [ 1453.770917] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1453.776124] ? perf_trace_lock+0x4a7/0x7a0 [ 1453.780393] should_fail.cold.4+0xa/0x17 [ 1453.784481] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1453.789606] ? print_usage_bug+0xc0/0xc0 [ 1453.793707] ? lock_is_held_type+0x210/0x210 [ 1453.798142] ? zap_class+0x640/0x640 [ 1453.801869] ? is_bpf_text_address+0xd3/0x170 [ 1453.806394] ? find_held_lock+0x36/0x1c0 [ 1453.810507] ? perf_trace_sched_process_exec+0x860/0x860 [ 1453.815970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.821527] ? check_preemption_disabled+0x48/0x280 [ 1453.826567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.832152] __should_failslab+0x124/0x180 [ 1453.836410] should_failslab+0x9/0x14 [ 1453.840231] kmem_cache_alloc+0x2be/0x730 [ 1453.844418] alloc_vfsmnt+0xe9/0x990 01:44:42 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1007002000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x4c030000]}}]}]}, 0xac}}, 0x0) [ 1453.848152] ? m_stop+0x20/0x20 [ 1453.851448] ? avc_has_extended_perms+0x15a0/0x15a0 [ 1453.856488] ? zap_class+0x640/0x640 [ 1453.860242] ? find_held_lock+0x36/0x1c0 [ 1453.864336] ? __get_fs_type+0x97/0xc0 [ 1453.868243] ? lock_downgrade+0x900/0x900 [ 1453.872415] ? lock_release+0xa00/0xa00 [ 1453.876411] ? selinux_mount+0x1dc/0x3c0 [ 1453.880505] vfs_kern_mount.part.35+0x90/0x4f0 [ 1453.885112] ? may_umount+0xb0/0xb0 [ 1453.888764] ? _raw_read_unlock+0x2c/0x50 [ 1453.892930] ? __get_fs_type+0x97/0xc0 [ 1453.896847] do_mount+0x581/0x31f0 [ 1453.900405] ? check_preemption_disabled+0x48/0x280 [ 1453.905451] ? copy_mount_string+0x40/0x40 [ 1453.909714] ? copy_mount_options+0x5f/0x430 [ 1453.914140] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1453.919174] ? kmem_cache_alloc_trace+0x353/0x750 [ 1453.924039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1453.929608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1453.935164] ? copy_mount_options+0x315/0x430 [ 1453.939685] ksys_mount+0x12d/0x140 [ 1453.943339] __x64_sys_mount+0xbe/0x150 [ 1453.947335] do_syscall_64+0x1b9/0x820 [ 1453.951234] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1453.956623] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1453.961573] ? trace_hardirqs_on_caller+0x310/0x310 [ 1453.966631] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1453.971659] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1453.978340] ? __switch_to_asm+0x40/0x70 [ 1453.982408] ? __switch_to_asm+0x34/0x70 [ 1453.986476] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1453.986502] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1453.986515] RIP: 0033:0x457569 [ 1453.986530] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1453.986538] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1454.018644] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1454.018655] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1454.018664] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1454.018674] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1454.018683] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000003 01:44:42 executing program 4 (fault-call:7 fault-nth:7): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:42 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:42 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:42 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x2000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}]}]}, 0xac}}, 0x0) 01:44:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105873576914e70bfeb59800f97c97644ab8a7"}) 01:44:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x4000000]}}]}]}, 0xac}}, 0x0) 01:44:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x500000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:43 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1454.316553] ldm_validate_partition_table(): Disk read failed. [ 1454.333579] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1454.345060] Dev loop0: unable to read RDB block 0 [ 1454.356938] loop0: unable to read partition table 01:44:43 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf0]}}]}]}, 0xac}}, 0x0) [ 1454.365685] FAULT_INJECTION: forcing a failure. [ 1454.365685] name fail_page_alloc, interval 1, probability 0, space 0, times 0 01:44:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x700000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1454.409453] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1454.419505] CPU: 1 PID: 13469 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1454.426914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.436353] Call Trace: [ 1454.438965] dump_stack+0x244/0x39d [ 1454.442617] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1454.447830] ? perf_trace_lock+0x14d/0x7a0 [ 1454.452094] ? rcu_pm_notify+0xc0/0xc0 [ 1454.456014] should_fail.cold.4+0xa/0x17 [ 1454.460103] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1454.465224] ? pcpu_alloc+0x190/0x15e0 [ 1454.465245] ? zap_class+0x640/0x640 [ 1454.465283] ? find_held_lock+0x36/0x1c0 [ 1454.465366] ? xen_snd_front_alsa_init+0x11d0/0x16f0 [ 1454.465393] ? lock_release+0xa00/0xa00 [ 1454.486101] ? perf_trace_sched_process_exec+0x860/0x860 [ 1454.486117] ? __lockdep_init_map+0x105/0x590 [ 1454.486143] ? __might_sleep+0x95/0x190 [ 1454.486165] __alloc_pages_nodemask+0x366/0xea0 [ 1454.486187] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1454.486199] ? m_stop+0x20/0x20 [ 1454.486218] ? zap_class+0x640/0x640 [ 1454.516798] ? find_held_lock+0x36/0x1c0 [ 1454.520888] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1454.526508] alloc_pages_current+0x173/0x350 [ 1454.530945] get_zeroed_page+0x14/0x50 [ 1454.534852] mount_fs+0x20e/0x31d [ 1454.538337] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1454.542957] ? may_umount+0xb0/0xb0 [ 1454.546604] ? _raw_read_unlock+0x2c/0x50 [ 1454.550766] ? __get_fs_type+0x97/0xc0 [ 1454.554676] do_mount+0x581/0x31f0 [ 1454.558227] ? check_preemption_disabled+0x48/0x280 [ 1454.563263] ? copy_mount_string+0x40/0x40 [ 1454.567530] ? copy_mount_options+0x5f/0x430 [ 1454.571966] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1454.577000] ? kmem_cache_alloc_trace+0x353/0x750 [ 1454.581864] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1454.587421] ? _copy_from_user+0xdf/0x150 [ 1454.591598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1454.597145] ? copy_mount_options+0x315/0x430 [ 1454.597172] ksys_mount+0x12d/0x140 [ 1454.597193] __x64_sys_mount+0xbe/0x150 [ 1454.605306] do_syscall_64+0x1b9/0x820 [ 1454.605324] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1454.605342] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1454.605362] ? trace_hardirqs_on_caller+0x310/0x310 [ 1454.605379] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1454.605394] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1454.605406] ? __switch_to_asm+0x40/0x70 [ 1454.605422] ? __switch_to_asm+0x34/0x70 [ 1454.648361] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1454.648387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1454.658390] RIP: 0033:0x457569 [ 1454.658405] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1454.658413] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1454.658428] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1454.658437] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1454.658447] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1454.658457] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1454.658467] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:43 executing program 4 (fault-call:7 fault-nth:8): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:43 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x12000000]}}]}]}, 0xac}}, 0x0) 01:44:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000000001a0, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:43 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105842576914e70bfeb59800f97c97644ab8a7"}) 01:44:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000008000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:43 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x6000000]}}]}]}, 0xac}}, 0x0) [ 1455.008424] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1455.019259] ldm_validate_partition_table(): Disk read failed. [ 1455.035138] Dev loop0: unable to read RDB block 0 [ 1455.050584] loop0: unable to read partition table 01:44:43 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000002000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:43 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x4c03000000000000]}}]}]}, 0xac}}, 0x0) [ 1455.061833] FAULT_INJECTION: forcing a failure. [ 1455.061833] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1455.076983] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1455.125746] CPU: 1 PID: 13525 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1455.133169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1455.142529] Call Trace: [ 1455.142562] dump_stack+0x244/0x39d [ 1455.142586] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1455.153990] ? perf_trace_lock+0x14d/0x7a0 [ 1455.158257] ? rcu_pm_notify+0xc0/0xc0 [ 1455.162178] should_fail.cold.4+0xa/0x17 [ 1455.166258] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1455.171375] ? pcpu_alloc+0x190/0x15e0 [ 1455.175276] ? zap_class+0x640/0x640 [ 1455.179030] ? find_held_lock+0x36/0x1c0 [ 1455.183128] ? lock_release+0xa00/0xa00 [ 1455.187117] ? perf_trace_sched_process_exec+0x860/0x860 [ 1455.192577] ? __lockdep_init_map+0x105/0x590 [ 1455.197101] ? __might_sleep+0x95/0x190 [ 1455.201096] __alloc_pages_nodemask+0x366/0xea0 [ 1455.205790] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1455.210827] ? m_stop+0x20/0x20 [ 1455.214127] ? zap_class+0x640/0x640 [ 1455.217879] ? find_held_lock+0x36/0x1c0 [ 1455.221968] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1455.227538] alloc_pages_current+0x173/0x350 [ 1455.231973] get_zeroed_page+0x14/0x50 [ 1455.235873] mount_fs+0x20e/0x31d [ 1455.239352] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1455.243956] ? may_umount+0xb0/0xb0 [ 1455.247599] ? _raw_read_unlock+0x2c/0x50 [ 1455.251760] ? __get_fs_type+0x97/0xc0 [ 1455.255668] do_mount+0x581/0x31f0 [ 1455.259226] ? check_preemption_disabled+0x48/0x280 [ 1455.264280] ? copy_mount_string+0x40/0x40 [ 1455.268549] ? copy_mount_options+0x5f/0x430 [ 1455.272978] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1455.278022] ? kmem_cache_alloc_trace+0x353/0x750 [ 1455.282884] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1455.288451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.294022] ? copy_mount_options+0x315/0x430 [ 1455.298539] ksys_mount+0x12d/0x140 [ 1455.302188] __x64_sys_mount+0xbe/0x150 [ 1455.306182] do_syscall_64+0x1b9/0x820 [ 1455.310085] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1455.315485] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1455.320432] ? trace_hardirqs_on_caller+0x310/0x310 [ 1455.325466] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1455.330520] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1455.337201] ? __switch_to_asm+0x40/0x70 [ 1455.341274] ? __switch_to_asm+0x34/0x70 [ 1455.345362] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1455.350237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1455.355440] RIP: 0033:0x457569 [ 1455.358644] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1455.377556] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1455.385275] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1455.392555] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1455.399835] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1455.407110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1455.407121] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:44 executing program 4 (fault-call:7 fault-nth:9): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:44 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf0ffffff]}}]}]}, 0xac}}, 0x0) 01:44:44 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x300000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:44 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105878576914e70bfeb59800f97c97644ab8a7"}) 01:44:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x5]}}]}]}, 0xac}}, 0x0) 01:44:44 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000008, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:44 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1455.596535] ldm_validate_partition_table(): Disk read failed. [ 1455.615601] Dev loop0: unable to read RDB block 0 01:44:44 executing program 0: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1455.662319] loop0: unable to read partition table [ 1455.678935] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1a0ffffffff]}}]}]}, 0xac}}, 0x0) [ 1455.718271] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1455.757582] FAULT_INJECTION: forcing a failure. [ 1455.757582] name failslab, interval 1, probability 0, space 0, times 0 [ 1455.771862] CPU: 0 PID: 13581 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1455.779268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1455.788649] Call Trace: [ 1455.791266] dump_stack+0x244/0x39d [ 1455.794934] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1455.800162] ? perf_trace_lock+0x4a7/0x7a0 [ 1455.804456] should_fail.cold.4+0xa/0x17 [ 1455.808545] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1455.813680] ? lock_is_held_type+0x210/0x210 [ 1455.818153] ? find_held_lock+0x36/0x1c0 01:44:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105846576914e70bfeb59800f97c97644ab8a7"}) [ 1455.822301] ? perf_trace_sched_process_exec+0x860/0x860 [ 1455.827779] ? sget_userns+0x190/0xed0 [ 1455.831713] __should_failslab+0x124/0x180 [ 1455.835975] should_failslab+0x9/0x14 [ 1455.839785] kmem_cache_alloc_trace+0x2d7/0x750 [ 1455.844476] sget_userns+0x1b6/0xed0 [ 1455.848184] ? get_anon_bdev+0xc0/0xc0 [ 1455.852209] ? grab_super+0x400/0x400 [ 1455.856004] ? selinux_ipv4_output+0x50/0x50 [ 1455.860414] ? __free_pages+0x103/0x190 [ 1455.864390] ? selinux_sb_copy_data+0x602/0x740 [ 1455.869063] ? selinux_capable+0x36/0x40 [ 1455.873119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.878643] ? security_capable+0x99/0xc0 [ 1455.882782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.888307] ? ns_capable_common+0x13f/0x170 [ 1455.892708] ? get_anon_bdev+0xc0/0xc0 [ 1455.896589] sget+0x10b/0x150 [ 1455.899754] ? ovl_show_options+0x550/0x550 [ 1455.904071] mount_nodev+0x33/0x110 [ 1455.907690] ovl_mount+0x2c/0x40 [ 1455.911048] mount_fs+0xae/0x31d [ 1455.914416] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1455.919006] ? may_umount+0xb0/0xb0 [ 1455.922623] ? _raw_read_unlock+0x2c/0x50 [ 1455.926762] ? __get_fs_type+0x97/0xc0 [ 1455.930650] do_mount+0x581/0x31f0 [ 1455.934181] ? check_preemption_disabled+0x48/0x280 [ 1455.939193] ? copy_mount_string+0x40/0x40 [ 1455.943445] ? copy_mount_options+0x5f/0x430 [ 1455.947848] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1455.952857] ? kmem_cache_alloc_trace+0x353/0x750 [ 1455.957698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1455.963223] ? _copy_from_user+0xdf/0x150 [ 1455.967371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1455.972898] ? copy_mount_options+0x315/0x430 [ 1455.977393] ksys_mount+0x12d/0x140 [ 1455.981020] __x64_sys_mount+0xbe/0x150 [ 1455.985002] do_syscall_64+0x1b9/0x820 [ 1455.988890] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1455.994248] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1455.999171] ? trace_hardirqs_on_caller+0x310/0x310 [ 1456.004178] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1456.009186] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1456.015843] ? __switch_to_asm+0x40/0x70 [ 1456.019892] ? __switch_to_asm+0x34/0x70 [ 1456.023964] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1456.028807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.033989] RIP: 0033:0x457569 [ 1456.037177] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1456.056103] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1456.063804] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1456.071061] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1456.078320] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1456.085593] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1456.092851] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 [ 1456.214855] print_req_error: 838 callbacks suppressed [ 1456.214863] print_req_error: I/O error, dev loop0, sector 0 [ 1456.225930] buffer_io_error: 838 callbacks suppressed [ 1456.225940] Buffer I/O error on dev loop0, logical block 0, async page read [ 1456.245259] print_req_error: I/O error, dev loop0, sector 0 [ 1456.251013] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:45 executing program 4 (fault-call:7 fault-nth:10): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x100000000f000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:45 executing program 0: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:45 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x4c03]}}]}]}, 0xac}}, 0x0) [ 1456.264062] print_req_error: I/O error, dev loop0, sector 0 [ 1456.269805] Buffer I/O error on dev loop0, logical block 0, async page read [ 1456.303785] print_req_error: I/O error, dev loop0, sector 0 01:44:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000010000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x34000]}}]}]}, 0xac}}, 0x0) [ 1456.309583] Buffer I/O error on dev loop0, logical block 0, async page read [ 1456.326778] print_req_error: I/O error, dev loop0, sector 0 [ 1456.332581] Buffer I/O error on dev loop0, logical block 0, async page read [ 1456.349362] print_req_error: I/O error, dev loop0, sector 0 [ 1456.355181] Buffer I/O error on dev loop0, logical block 0, async page read [ 1456.385049] print_req_error: I/O error, dev loop0, sector 0 [ 1456.391241] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:45 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:45 executing program 0: socket$inet6(0xa, 0x803, 0x3) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r1, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1456.430650] print_req_error: I/O error, dev loop0, sector 0 [ 1456.436501] Buffer I/O error on dev loop0, logical block 0, async page read [ 1456.456445] ldm_validate_partition_table(): Disk read failed. 01:44:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}]}]}, 0xac}}, 0x0) [ 1456.479213] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1456.500339] print_req_error: I/O error, dev loop0, sector 0 [ 1456.506169] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x600000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1456.530435] FAULT_INJECTION: forcing a failure. [ 1456.530435] name failslab, interval 1, probability 0, space 0, times 0 [ 1456.555114] print_req_error: I/O error, dev loop0, sector 0 [ 1456.560929] Buffer I/O error on dev loop0, logical block 0, async page read [ 1456.571525] CPU: 1 PID: 13621 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1456.578924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.588299] Call Trace: [ 1456.590911] dump_stack+0x244/0x39d [ 1456.594570] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1456.599783] ? debug_smp_processor_id+0x1c/0x20 [ 1456.604478] ? perf_trace_lock+0x14d/0x7a0 [ 1456.608741] should_fail.cold.4+0xa/0x17 [ 1456.612826] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1456.617965] ? zap_class+0x640/0x640 [ 1456.621712] ? find_held_lock+0x36/0x1c0 [ 1456.625791] ? __lock_is_held+0xb5/0x140 [ 1456.629885] ? __lockdep_init_map+0x105/0x590 [ 1456.634403] ? perf_trace_sched_process_exec+0x860/0x860 [ 1456.639881] ? lockdep_init_map+0x9/0x10 [ 1456.643972] __should_failslab+0x124/0x180 [ 1456.648226] should_failslab+0x9/0x14 [ 1456.652036] __kmalloc+0x2e0/0x760 [ 1456.655601] ? __init_waitqueue_head+0x9e/0x150 [ 1456.660286] ? init_wait_entry+0x1c0/0x1c0 [ 1456.664532] ? prealloc_shrinker+0x172/0x340 [ 1456.668968] prealloc_shrinker+0x172/0x340 [ 1456.673228] sget_userns+0x945/0xed0 [ 1456.676954] ? get_anon_bdev+0xc0/0xc0 [ 1456.680875] ? grab_super+0x400/0x400 [ 1456.684699] ? selinux_ipv4_output+0x50/0x50 [ 1456.689129] ? __free_pages+0x103/0x190 [ 1456.693122] ? selinux_sb_copy_data+0x602/0x740 [ 1456.697821] ? selinux_capable+0x36/0x40 [ 1456.701903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.707453] ? security_capable+0x99/0xc0 [ 1456.711623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.717173] ? ns_capable_common+0x13f/0x170 [ 1456.721589] ? get_anon_bdev+0xc0/0xc0 [ 1456.725475] sget+0x10b/0x150 [ 1456.725497] ? ovl_show_options+0x550/0x550 [ 1456.725514] mount_nodev+0x33/0x110 [ 1456.725531] ovl_mount+0x2c/0x40 [ 1456.725549] mount_fs+0xae/0x31d [ 1456.743304] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1456.747915] ? may_umount+0xb0/0xb0 [ 1456.751557] ? _raw_read_unlock+0x2c/0x50 [ 1456.755722] ? __get_fs_type+0x97/0xc0 [ 1456.759633] do_mount+0x581/0x31f0 [ 1456.763177] ? check_preemption_disabled+0x48/0x280 [ 1456.768195] ? copy_mount_string+0x40/0x40 [ 1456.772512] ? copy_mount_options+0x5f/0x430 [ 1456.776908] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1456.781917] ? kmem_cache_alloc_trace+0x353/0x750 [ 1456.786765] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1456.792294] ? _copy_from_user+0xdf/0x150 [ 1456.796443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1456.802070] ? copy_mount_options+0x315/0x430 [ 1456.806559] ksys_mount+0x12d/0x140 [ 1456.810178] __x64_sys_mount+0xbe/0x150 [ 1456.814147] do_syscall_64+0x1b9/0x820 [ 1456.818026] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1456.823387] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1456.828324] ? trace_hardirqs_on_caller+0x310/0x310 [ 1456.833377] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1456.838398] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1456.845064] ? __switch_to_asm+0x40/0x70 [ 1456.849112] ? __switch_to_asm+0x34/0x70 [ 1456.853170] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1456.858009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1456.863188] RIP: 0033:0x457569 [ 1456.866372] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1456.885261] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1456.892962] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1456.900220] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1456.907477] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1456.914746] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1456.922020] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 [ 1456.930468] Dev loop0: unable to read RDB block 0 [ 1456.938407] loop0: unable to read partition table [ 1456.943787] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105861576914e70bfeb59800f97c97644ab8a7"}) 01:44:45 executing program 4 (fault-call:7 fault-nth:11): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:45 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x100000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf0ffff]}}]}]}, 0xac}}, 0x0) 01:44:45 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:45 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:46 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xa000000]}}]}]}, 0xac}}, 0x0) 01:44:46 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x800000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:46 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1457.176707] ldm_validate_partition_table(): Disk read failed. [ 1457.214731] Dev loop0: unable to read RDB block 0 [ 1457.242985] loop0: unable to read partition table [ 1457.256845] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1457.260576] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1457.317455] FAULT_INJECTION: forcing a failure. [ 1457.317455] name failslab, interval 1, probability 0, space 0, times 0 [ 1457.330605] CPU: 1 PID: 13670 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1457.337992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1457.347346] Call Trace: [ 1457.347375] dump_stack+0x244/0x39d [ 1457.347400] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1457.347422] ? debug_smp_processor_id+0x1c/0x20 [ 1457.347440] ? perf_trace_lock+0x14d/0x7a0 [ 1457.347462] should_fail.cold.4+0xa/0x17 [ 1457.347484] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1457.376931] ? zap_class+0x640/0x640 [ 1457.380674] ? find_held_lock+0x36/0x1c0 [ 1457.384761] ? __lock_is_held+0xb5/0x140 [ 1457.388859] ? __lockdep_init_map+0x105/0x590 [ 1457.393361] ? perf_trace_sched_process_exec+0x860/0x860 [ 1457.393380] ? lockdep_init_map+0x9/0x10 [ 1457.393410] __should_failslab+0x124/0x180 [ 1457.393435] should_failslab+0x9/0x14 [ 1457.410957] __kmalloc+0x2e0/0x760 [ 1457.414515] ? __init_waitqueue_head+0x9e/0x150 [ 1457.419199] ? init_wait_entry+0x1c0/0x1c0 [ 1457.423942] ? prealloc_shrinker+0x172/0x340 [ 1457.428370] prealloc_shrinker+0x172/0x340 [ 1457.432615] sget_userns+0x945/0xed0 [ 1457.432632] ? get_anon_bdev+0xc0/0xc0 [ 1457.432662] ? grab_super+0x400/0x400 [ 1457.444045] ? selinux_ipv4_output+0x50/0x50 [ 1457.448468] ? __free_pages+0x103/0x190 [ 1457.452454] ? selinux_sb_copy_data+0x602/0x740 [ 1457.457157] ? selinux_capable+0x36/0x40 [ 1457.461241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1457.466791] ? security_capable+0x99/0xc0 [ 1457.470967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1457.476519] ? ns_capable_common+0x13f/0x170 [ 1457.480940] ? get_anon_bdev+0xc0/0xc0 [ 1457.484826] sget+0x10b/0x150 [ 1457.484846] ? ovl_show_options+0x550/0x550 [ 1457.484863] mount_nodev+0x33/0x110 [ 1457.484880] ovl_mount+0x2c/0x40 [ 1457.484898] mount_fs+0xae/0x31d [ 1457.484918] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1457.484937] ? may_umount+0xb0/0xb0 [ 1457.510881] ? _raw_read_unlock+0x2c/0x50 [ 1457.515054] ? __get_fs_type+0x97/0xc0 [ 1457.518967] do_mount+0x581/0x31f0 [ 1457.522524] ? check_preemption_disabled+0x48/0x280 [ 1457.527567] ? copy_mount_string+0x40/0x40 [ 1457.531843] ? copy_mount_options+0x5f/0x430 [ 1457.536280] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1457.541315] ? kmem_cache_alloc_trace+0x353/0x750 [ 1457.546171] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1457.551724] ? _copy_from_user+0xdf/0x150 [ 1457.555897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1457.561456] ? copy_mount_options+0x315/0x430 01:44:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf000]}}]}]}, 0xac}}, 0x0) 01:44:46 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1457.565978] ksys_mount+0x12d/0x140 [ 1457.569625] __x64_sys_mount+0xbe/0x150 [ 1457.573616] do_syscall_64+0x1b9/0x820 [ 1457.573635] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1457.573653] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1457.573672] ? trace_hardirqs_on_caller+0x310/0x310 [ 1457.573689] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1457.573705] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1457.573717] ? __switch_to_asm+0x40/0x70 [ 1457.573728] ? __switch_to_asm+0x34/0x70 [ 1457.573748] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1457.573771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1457.573792] RIP: 0033:0x457569 [ 1457.583029] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1457.644902] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1457.652630] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1457.659911] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1457.667182] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1457.674440] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1457.681696] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105844576914e70bfeb59800f97c97644ab8a7"}) 01:44:46 executing program 4 (fault-call:7 fault-nth:12): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:46 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000010, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:46 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x4]}}]}]}, 0xac}}, 0x0) 01:44:46 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x0, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:46 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:46 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000f0ffffff, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x11]}}]}]}, 0xac}}, 0x0) 01:44:46 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1457.886259] ldm_validate_partition_table(): Disk read failed. [ 1457.894880] Dev loop0: unable to read RDB block 0 [ 1457.905511] loop0: unable to read partition table [ 1457.926013] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:44:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x11000000]}}]}]}, 0xac}}, 0x0) [ 1457.954712] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1457.971653] FAULT_INJECTION: forcing a failure. [ 1457.971653] name failslab, interval 1, probability 0, space 0, times 0 01:44:46 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0xd00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1458.034201] CPU: 0 PID: 13712 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1458.041637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1458.051001] Call Trace: [ 1458.053608] dump_stack+0x244/0x39d [ 1458.057277] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1458.062483] ? mark_held_locks+0x130/0x130 [ 1458.062500] ? rcu_softirq_qs+0x20/0x20 [ 1458.062526] should_fail.cold.4+0xa/0x17 [ 1458.062548] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1458.079904] ? kernel_text_address+0x79/0xf0 [ 1458.084337] ? __kernel_text_address+0xd/0x40 [ 1458.088844] ? __save_stack_trace+0x8d/0xf0 [ 1458.088865] ? zap_class+0x640/0x640 [ 1458.088890] ? find_held_lock+0x36/0x1c0 [ 1458.100979] ? __lock_is_held+0xb5/0x140 [ 1458.105064] ? perf_trace_sched_process_exec+0x860/0x860 [ 1458.110527] __should_failslab+0x124/0x180 [ 1458.110549] should_failslab+0x9/0x14 [ 1458.110564] kmem_cache_alloc_trace+0x2d7/0x750 [ 1458.110582] ? kasan_check_write+0x14/0x20 [ 1458.127493] ? __init_rwsem+0x1cc/0x2a0 [ 1458.131489] selinux_sb_alloc_security+0x9b/0x2f0 [ 1458.136344] ? selinux_inode_alloc_security+0x3a0/0x3a0 [ 1458.136365] ? down_write_nested+0x8e/0x130 [ 1458.136381] ? sget_userns+0x2c5/0xed0 [ 1458.136398] ? _down_write_nest_lock+0x130/0x130 [ 1458.154720] security_sb_alloc+0x4c/0xa0 [ 1458.158799] sget_userns+0x2cd/0xed0 [ 1458.162523] ? get_anon_bdev+0xc0/0xc0 [ 1458.166424] ? grab_super+0x400/0x400 [ 1458.170252] ? selinux_ipv4_output+0x50/0x50 [ 1458.174684] ? __free_pages+0x103/0x190 [ 1458.178718] ? selinux_sb_copy_data+0x602/0x740 [ 1458.183414] ? selinux_capable+0x36/0x40 [ 1458.187494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.193044] ? security_capable+0x99/0xc0 [ 1458.197221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.202775] ? ns_capable_common+0x13f/0x170 [ 1458.207192] ? get_anon_bdev+0xc0/0xc0 [ 1458.211095] sget+0x10b/0x150 [ 1458.214219] ? ovl_show_options+0x550/0x550 [ 1458.218556] mount_nodev+0x33/0x110 [ 1458.222190] ovl_mount+0x2c/0x40 [ 1458.225582] mount_fs+0xae/0x31d [ 1458.228964] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1458.233558] ? may_umount+0xb0/0xb0 [ 1458.237197] ? _raw_read_unlock+0x2c/0x50 [ 1458.241390] ? __get_fs_type+0x97/0xc0 [ 1458.245296] do_mount+0x581/0x31f0 [ 1458.248850] ? check_preemption_disabled+0x48/0x280 [ 1458.253883] ? copy_mount_string+0x40/0x40 [ 1458.258610] ? copy_mount_options+0x5f/0x430 [ 1458.263037] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1458.268066] ? kmem_cache_alloc_trace+0x353/0x750 [ 1458.272911] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1458.278465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.284026] ? copy_mount_options+0x315/0x430 [ 1458.288546] ksys_mount+0x12d/0x140 [ 1458.292192] __x64_sys_mount+0xbe/0x150 [ 1458.296215] do_syscall_64+0x1b9/0x820 [ 1458.300126] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1458.305517] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1458.310468] ? trace_hardirqs_on_caller+0x310/0x310 [ 1458.315504] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1458.320545] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1458.327244] ? __switch_to_asm+0x40/0x70 [ 1458.331317] ? __switch_to_asm+0x34/0x70 [ 1458.335403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1458.340279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1458.345479] RIP: 0033:0x457569 [ 1458.348684] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1458.367601] RSP: 002b:00007f8eefc67c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1458.375327] RAX: ffffffffffffffda RBX: 00007f8eefc67c90 RCX: 0000000000457569 01:44:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105867576914e70bfeb59800f97c97644ab8a7"}) 01:44:47 executing program 4 (fault-call:7 fault-nth:13): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:47 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:47 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x400000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:47 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x9000000]}}]}]}, 0xac}}, 0x0) [ 1458.382590] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1458.389846] RBP: 000000000072c040 R08: 0000000020000140 R09: 0000000000000000 [ 1458.397101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc686d4 [ 1458.404355] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000005 01:44:47 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0xb00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x30000]}}]}]}, 0xac}}, 0x0) 01:44:47 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1458.586985] ldm_validate_partition_table(): Disk read failed. [ 1458.601771] Dev loop0: unable to read RDB block 0 01:44:47 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1458.632287] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1458.649595] loop0: unable to read partition table [ 1458.672016] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:47 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x900000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1458.684291] FAULT_INJECTION: forcing a failure. [ 1458.684291] name failslab, interval 1, probability 0, space 0, times 0 01:44:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}]}]}, 0xac}}, 0x0) [ 1458.772525] CPU: 0 PID: 13758 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1458.779968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1458.789358] Call Trace: [ 1458.791989] dump_stack+0x244/0x39d [ 1458.795668] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1458.800893] ? perf_trace_lock+0x4a7/0x7a0 [ 1458.805197] should_fail.cold.4+0xa/0x17 [ 1458.809304] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1458.814465] ? zap_class+0x640/0x640 [ 1458.818252] ? find_held_lock+0x36/0x1c0 [ 1458.822334] ? __lock_is_held+0xb5/0x140 [ 1458.826426] ? __lockdep_init_map+0x105/0x590 [ 1458.830952] ? perf_trace_sched_process_exec+0x860/0x860 [ 1458.836407] ? lockdep_init_map+0x9/0x10 [ 1458.840490] __should_failslab+0x124/0x180 [ 1458.844744] should_failslab+0x9/0x14 [ 1458.848565] __kmalloc+0x2e0/0x760 [ 1458.852114] ? __init_waitqueue_head+0x9e/0x150 [ 1458.856779] ? init_wait_entry+0x1c0/0x1c0 [ 1458.861190] ? prealloc_shrinker+0x172/0x340 [ 1458.865606] prealloc_shrinker+0x172/0x340 [ 1458.869846] sget_userns+0x945/0xed0 [ 1458.873579] ? get_anon_bdev+0xc0/0xc0 [ 1458.877488] ? grab_super+0x400/0x400 [ 1458.881290] ? selinux_ipv4_output+0x50/0x50 [ 1458.885707] ? __free_pages+0x103/0x190 [ 1458.889678] ? selinux_sb_copy_data+0x602/0x740 [ 1458.894355] ? selinux_capable+0x36/0x40 [ 1458.898431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.903992] ? security_capable+0x99/0xc0 [ 1458.908168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.913717] ? ns_capable_common+0x13f/0x170 [ 1458.918134] ? get_anon_bdev+0xc0/0xc0 [ 1458.922025] sget+0x10b/0x150 [ 1458.925158] ? ovl_show_options+0x550/0x550 [ 1458.929519] mount_nodev+0x33/0x110 [ 1458.933171] ovl_mount+0x2c/0x40 [ 1458.936539] mount_fs+0xae/0x31d [ 1458.939907] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1458.944487] ? may_umount+0xb0/0xb0 [ 1458.948111] ? _raw_read_unlock+0x2c/0x50 [ 1458.952259] ? __get_fs_type+0x97/0xc0 [ 1458.956169] do_mount+0x581/0x31f0 [ 1458.959718] ? check_preemption_disabled+0x48/0x280 [ 1458.964741] ? copy_mount_string+0x40/0x40 [ 1458.968989] ? copy_mount_options+0x5f/0x430 [ 1458.973393] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1458.978406] ? kmem_cache_alloc_trace+0x353/0x750 [ 1458.983303] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1458.988849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1458.994384] ? copy_mount_options+0x315/0x430 [ 1458.998886] ksys_mount+0x12d/0x140 [ 1459.002518] __x64_sys_mount+0xbe/0x150 [ 1459.006491] do_syscall_64+0x1b9/0x820 [ 1459.010374] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1459.015762] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1459.020694] ? trace_hardirqs_on_caller+0x310/0x310 [ 1459.025710] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1459.030726] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1459.037394] ? __switch_to_asm+0x40/0x70 [ 1459.041460] ? __switch_to_asm+0x34/0x70 [ 1459.045536] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1459.050380] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1459.055561] RIP: 0033:0x457569 [ 1459.058758] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1459.077669] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1459.085398] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1459.092685] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1459.099951] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1459.107223] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1459.114486] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105862576914e70bfeb59800f97c97644ab8a7"}) 01:44:48 executing program 4 (fault-call:7 fault-nth:14): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:48 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:48 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000040000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:48 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf00]}}]}]}, 0xac}}, 0x0) [ 1459.306715] ldm_validate_partition_table(): Disk read failed. [ 1459.327515] Dev loop0: unable to read RDB block 0 [ 1459.345882] loop0: unable to read partition table 01:44:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf]}}]}]}, 0xac}}, 0x0) 01:44:48 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1459.350959] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:48 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x100000008dffffff, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105852576914e70bfeb59800f97c97644ab8a7"}) [ 1459.435406] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1459.508688] FAULT_INJECTION: forcing a failure. [ 1459.508688] name failslab, interval 1, probability 0, space 0, times 0 01:44:48 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xfffffff0]}}]}]}, 0xac}}, 0x0) 01:44:48 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1459.636046] ldm_validate_partition_table(): Disk read failed. [ 1459.661075] Dev loop0: unable to read RDB block 0 [ 1459.667386] CPU: 1 PID: 13807 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1459.674776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1459.684140] Call Trace: [ 1459.686757] dump_stack+0x244/0x39d [ 1459.690413] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1459.695650] ? debug_smp_processor_id+0x1c/0x20 [ 1459.700346] ? perf_trace_lock+0x14d/0x7a0 [ 1459.704615] should_fail.cold.4+0xa/0x17 [ 1459.708695] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1459.713819] ? kernel_text_address+0x79/0xf0 [ 1459.718245] ? unwind_get_return_address+0x61/0xa0 [ 1459.723187] ? __save_stack_trace+0x8d/0xf0 [ 1459.727525] ? zap_class+0x640/0x640 [ 1459.731267] ? find_held_lock+0x36/0x1c0 [ 1459.735344] ? __lock_is_held+0xb5/0x140 [ 1459.739441] ? perf_trace_sched_process_exec+0x860/0x860 [ 1459.744901] ? check_preemption_disabled+0x48/0x280 [ 1459.749944] __should_failslab+0x124/0x180 [ 1459.754191] should_failslab+0x9/0x14 [ 1459.758058] kmem_cache_alloc_trace+0x2d7/0x750 [ 1459.762748] ? __kmalloc_node+0x3c/0x70 [ 1459.766733] ? __kmalloc_node+0x3c/0x70 [ 1459.766755] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1459.766780] __memcg_init_list_lru_node+0x185/0x2d0 [ 1459.766798] ? kvfree_rcu+0x20/0x20 [ 1459.784406] ? __kmalloc_node+0x50/0x70 [ 1459.784435] __list_lru_init+0x4d6/0x840 [ 1459.784456] ? list_lru_destroy+0x500/0x500 [ 1459.784476] ? up_write+0x7b/0x220 [ 1459.784492] ? down_write_nested+0x130/0x130 [ 1459.784507] ? down_read+0x120/0x120 [ 1459.784527] ? init_wait_entry+0x1c0/0x1c0 [ 1459.804785] ? prealloc_shrinker+0x172/0x340 [ 1459.804818] sget_userns+0x975/0xed0 [ 1459.804835] ? get_anon_bdev+0xc0/0xc0 [ 1459.824781] ? grab_super+0x400/0x400 [ 1459.828612] ? selinux_ipv4_output+0x50/0x50 [ 1459.833048] ? __free_pages+0x103/0x190 [ 1459.837046] ? selinux_sb_copy_data+0x602/0x740 [ 1459.841751] ? selinux_capable+0x36/0x40 [ 1459.845835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1459.851390] ? security_capable+0x99/0xc0 [ 1459.855566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1459.861134] ? ns_capable_common+0x13f/0x170 [ 1459.865635] ? get_anon_bdev+0xc0/0xc0 [ 1459.865651] sget+0x10b/0x150 [ 1459.865672] ? ovl_show_options+0x550/0x550 [ 1459.865688] mount_nodev+0x33/0x110 [ 1459.865704] ovl_mount+0x2c/0x40 [ 1459.865721] mount_fs+0xae/0x31d [ 1459.865743] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1459.865760] ? may_umount+0xb0/0xb0 [ 1459.865774] ? _raw_read_unlock+0x2c/0x50 [ 1459.865790] ? __get_fs_type+0x97/0xc0 [ 1459.865819] do_mount+0x581/0x31f0 [ 1459.907205] ? check_preemption_disabled+0x48/0x280 [ 1459.912255] ? copy_mount_string+0x40/0x40 [ 1459.916527] ? copy_mount_options+0x5f/0x430 [ 1459.919582] loop0: unable to read partition table [ 1459.920952] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1459.920973] ? kmem_cache_alloc_trace+0x353/0x750 [ 1459.920995] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1459.921017] ? _copy_from_user+0xdf/0x150 [ 1459.926936] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1459.930955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1459.930974] ? copy_mount_options+0x315/0x430 [ 1459.931000] ksys_mount+0x12d/0x140 [ 1459.931022] __x64_sys_mount+0xbe/0x150 [ 1459.972690] do_syscall_64+0x1b9/0x820 [ 1459.976604] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1459.981994] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1459.986950] ? trace_hardirqs_on_caller+0x310/0x310 [ 1459.992000] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1459.997036] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1460.003720] ? __switch_to_asm+0x40/0x70 [ 1460.007791] ? __switch_to_asm+0x34/0x70 [ 1460.011880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1460.016749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1460.021949] RIP: 0033:0x457569 [ 1460.025158] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1460.044080] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1460.051808] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1460.059084] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1460.066346] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1460.073607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1460.080868] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:49 executing program 4 (fault-call:7 fault-nth:15): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}]}]}, 0xac}}, 0x0) 01:44:49 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:49 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:49 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000f00, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff411689361610584e576914e70bfeb59800f97c97644ab8a7"}) 01:44:49 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:49 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}]}]}, 0xac}}, 0x0) 01:44:49 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0xa00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1460.333548] ldm_validate_partition_table(): Disk read failed. [ 1460.341426] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1460.366738] Dev loop0: unable to read RDB block 0 [ 1460.379730] FAULT_INJECTION: forcing a failure. [ 1460.379730] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.391559] loop0: unable to read partition table [ 1460.405153] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1460.425944] CPU: 0 PID: 13860 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1460.433383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.442751] Call Trace: [ 1460.445359] dump_stack+0x244/0x39d [ 1460.445394] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1460.445424] ? perf_trace_lock+0x4a7/0x7a0 [ 1460.458520] should_fail.cold.4+0xa/0x17 [ 1460.462632] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1460.467806] ? zap_class+0x640/0x640 [ 1460.471544] ? save_stack+0xa9/0xd0 [ 1460.475208] ? save_stack+0x43/0xd0 [ 1460.478858] ? kasan_kmalloc+0xc7/0xe0 [ 1460.482774] ? __kmalloc+0x15b/0x760 [ 1460.486517] ? find_held_lock+0x36/0x1c0 [ 1460.490620] ? __lock_is_held+0xb5/0x140 [ 1460.494765] ? xen_remap_exchanged_ptes+0x838/0xee0 [ 1460.499836] ? perf_trace_sched_process_exec+0x860/0x860 [ 1460.505307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.505335] ? check_preemption_disabled+0x48/0x280 [ 1460.515902] __should_failslab+0x124/0x180 [ 1460.515936] should_failslab+0x9/0x14 [ 1460.515957] kmem_cache_alloc_node_trace+0x270/0x740 [ 1460.529114] __kmalloc_node+0x3c/0x70 01:44:49 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}]}]}, 0xac}}, 0x0) [ 1460.532955] kvmalloc_node+0x65/0xf0 [ 1460.536711] __list_lru_init+0x5d9/0x840 [ 1460.540815] ? list_lru_destroy+0x500/0x500 [ 1460.545175] ? up_write+0x7b/0x220 [ 1460.548748] ? down_write_nested+0x130/0x130 [ 1460.553186] ? down_read+0x120/0x120 [ 1460.556933] ? init_wait_entry+0x1c0/0x1c0 [ 1460.561196] ? prealloc_shrinker+0x172/0x340 [ 1460.565677] sget_userns+0x975/0xed0 [ 1460.569420] ? get_anon_bdev+0xc0/0xc0 [ 1460.573361] ? grab_super+0x400/0x400 [ 1460.577205] ? selinux_ipv4_output+0x50/0x50 [ 1460.581662] ? __free_pages+0x103/0x190 [ 1460.585676] ? selinux_sb_copy_data+0x602/0x740 [ 1460.590401] ? selinux_capable+0x36/0x40 [ 1460.594496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.600063] ? security_capable+0x99/0xc0 [ 1460.604249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.609818] ? ns_capable_common+0x13f/0x170 [ 1460.614260] ? get_anon_bdev+0xc0/0xc0 [ 1460.618178] sget+0x10b/0x150 [ 1460.621325] ? ovl_show_options+0x550/0x550 [ 1460.625669] mount_nodev+0x33/0x110 [ 1460.625693] ovl_mount+0x2c/0x40 [ 1460.625715] mount_fs+0xae/0x31d [ 1460.636129] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1460.640743] ? may_umount+0xb0/0xb0 [ 1460.640764] ? _raw_read_unlock+0x2c/0x50 [ 1460.640783] ? __get_fs_type+0x97/0xc0 [ 1460.652561] do_mount+0x581/0x31f0 [ 1460.652587] ? check_preemption_disabled+0x48/0x280 [ 1460.661156] ? copy_mount_string+0x40/0x40 [ 1460.661203] ? copy_mount_options+0x5f/0x430 [ 1460.669848] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1460.674905] ? kmem_cache_alloc_trace+0x353/0x750 [ 1460.679799] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1460.685396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1460.690974] ? copy_mount_options+0x315/0x430 [ 1460.695551] ksys_mount+0x12d/0x140 [ 1460.699229] __x64_sys_mount+0xbe/0x150 [ 1460.703251] do_syscall_64+0x1b9/0x820 [ 1460.707205] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1460.712602] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1460.717573] ? trace_hardirqs_on_caller+0x310/0x310 [ 1460.722615] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1460.727645] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1460.734328] ? __switch_to_asm+0x40/0x70 [ 1460.738404] ? __switch_to_asm+0x34/0x70 [ 1460.742496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1460.747357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1460.752553] RIP: 0033:0x457569 [ 1460.755750] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1460.774661] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1460.782392] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1460.789675] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1460.796947] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1460.804245] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1460.811528] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:49 executing program 4 (fault-call:7 fault-nth:16): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xfffff000]}}]}]}, 0xac}}, 0x0) 01:44:49 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541"], 0x8) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:49 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000008000a0, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105866576914e70bfeb59800f97c97644ab8a7"}) 01:44:49 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8000000]}}]}]}, 0xac}}, 0x0) [ 1461.006413] ldm_validate_partition_table(): Disk read failed. [ 1461.046164] Dev loop0: unable to read RDB block 0 01:44:49 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627da"], 0xc) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:49 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0xf00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:49 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c12628571") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1461.082506] loop0: unable to read partition table [ 1461.101733] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3000000]}}]}]}, 0xac}}, 0x0) 01:44:50 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1461.228475] FAULT_INJECTION: forcing a failure. [ 1461.228475] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.240694] print_req_error: 838 callbacks suppressed [ 1461.240704] print_req_error: I/O error, dev loop0, sector 0 [ 1461.251774] buffer_io_error: 838 callbacks suppressed [ 1461.251784] Buffer I/O error on dev loop0, logical block 0, async page read [ 1461.321961] print_req_error: I/O error, dev loop0, sector 0 [ 1461.327833] Buffer I/O error on dev loop0, logical block 0, async page read [ 1461.331533] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1461.352956] print_req_error: I/O error, dev loop0, sector 0 [ 1461.356033] CPU: 1 PID: 13904 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1461.358800] Buffer I/O error on dev loop0, logical block 0, async page read [ 1461.366088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.366096] Call Trace: [ 1461.366128] dump_stack+0x244/0x39d [ 1461.366150] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1461.366172] ? debug_smp_processor_id+0x1c/0x20 [ 1461.393265] print_req_error: I/O error, dev loop0, sector 0 [ 1461.394047] ? perf_trace_lock+0x14d/0x7a0 [ 1461.394077] should_fail.cold.4+0xa/0x17 [ 1461.394099] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1461.398797] Buffer I/O error on dev loop0, logical block 0, async page read [ 1461.404483] ? kernel_text_address+0x79/0xf0 [ 1461.404504] ? unwind_get_return_address+0x61/0xa0 [ 1461.404524] ? __save_stack_trace+0x8d/0xf0 [ 1461.413513] print_req_error: I/O error, dev loop0, sector 0 [ 1461.417914] ? zap_class+0x640/0x640 [ 1461.417965] ? find_held_lock+0x36/0x1c0 [ 1461.417989] ? __lock_is_held+0xb5/0x140 [ 1461.418022] ? perf_trace_sched_process_exec+0x860/0x860 [ 1461.425537] Buffer I/O error on dev loop0, logical block 0, async page read [ 1461.429911] ? check_preemption_disabled+0x48/0x280 [ 1461.439169] __should_failslab+0x124/0x180 [ 1461.448591] should_failslab+0x9/0x14 [ 1461.470199] print_req_error: I/O error, dev loop0, sector 0 [ 1461.474285] kmem_cache_alloc_trace+0x2d7/0x750 [ 1461.474301] ? __kmalloc_node+0x3c/0x70 [ 1461.474314] ? __kmalloc_node+0x3c/0x70 [ 1461.474332] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1461.474354] __memcg_init_list_lru_node+0x185/0x2d0 [ 1461.478586] Buffer I/O error on dev loop0, logical block 0, async page read [ 1461.482378] ? kvfree_rcu+0x20/0x20 [ 1461.505978] print_req_error: I/O error, dev loop0, sector 0 [ 1461.510717] ? __kmalloc_node+0x50/0x70 [ 1461.517858] Buffer I/O error on dev loop0, logical block 0, async page read [ 1461.521444] __list_lru_init+0x4d6/0x840 [ 1461.527785] print_req_error: I/O error, dev loop0, sector 0 [ 1461.531109] ? list_lru_destroy+0x500/0x500 [ 1461.538241] Buffer I/O error on dev loop0, logical block 0, async page read [ 1461.542259] ? up_write+0x7b/0x220 [ 1461.548520] print_req_error: I/O error, dev loop0, sector 0 [ 1461.552282] ? down_write_nested+0x130/0x130 [ 1461.559414] Buffer I/O error on dev loop0, logical block 0, async page read [ 1461.562935] ? down_read+0x120/0x120 [ 1461.570056] print_req_error: I/O error, dev loop0, sector 0 [ 1461.573044] ? init_wait_entry+0x1c0/0x1c0 [ 1461.580173] Buffer I/O error on dev loop0, logical block 0, async page read [ 1461.583834] ? prealloc_shrinker+0x172/0x340 [ 1461.583869] sget_userns+0x975/0xed0 [ 1461.609040] ? get_anon_bdev+0xc0/0xc0 [ 1461.612954] ? grab_super+0x400/0x400 [ 1461.616762] ? selinux_ipv4_output+0x50/0x50 [ 1461.621180] ? __free_pages+0x103/0x190 [ 1461.625161] ? selinux_sb_copy_data+0x602/0x740 [ 1461.629839] ? selinux_capable+0x36/0x40 [ 1461.633926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1461.639467] ? security_capable+0x99/0xc0 [ 1461.643628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1461.649165] ? ns_capable_common+0x13f/0x170 [ 1461.653579] ? get_anon_bdev+0xc0/0xc0 [ 1461.657475] sget+0x10b/0x150 [ 1461.660584] ? ovl_show_options+0x550/0x550 [ 1461.664923] mount_nodev+0x33/0x110 [ 1461.668552] ovl_mount+0x2c/0x40 [ 1461.671938] mount_fs+0xae/0x31d [ 1461.675313] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1461.679918] ? may_umount+0xb0/0xb0 [ 1461.683548] ? _raw_read_unlock+0x2c/0x50 [ 1461.687695] ? __get_fs_type+0x97/0xc0 [ 1461.691588] do_mount+0x581/0x31f0 [ 1461.695131] ? check_preemption_disabled+0x48/0x280 [ 1461.700184] ? copy_mount_string+0x40/0x40 [ 1461.704436] ? copy_mount_options+0x5f/0x430 [ 1461.708843] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1461.713858] ? kmem_cache_alloc_trace+0x353/0x750 [ 1461.718706] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1461.724247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1461.729786] ? copy_mount_options+0x315/0x430 [ 1461.734286] ksys_mount+0x12d/0x140 [ 1461.737933] __x64_sys_mount+0xbe/0x150 [ 1461.741929] do_syscall_64+0x1b9/0x820 [ 1461.745818] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1461.751181] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1461.756106] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1461.760954] ? trace_hardirqs_on_caller+0x310/0x310 [ 1461.765975] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1461.770991] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1461.776011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1461.780858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1461.786074] RIP: 0033:0x457569 [ 1461.789269] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1461.808168] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1461.815874] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1461.823165] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1461.830435] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1461.837711] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1461.845011] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:50 executing program 4 (fault-call:7 fault-nth:17): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105825576914e70bfeb59800f97c97644ab8a7"}) 01:44:50 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:50 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:50 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a"], 0xe) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xb]}}]}]}, 0xac}}, 0x0) 01:44:50 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x12]}}]}]}, 0xac}}, 0x0) 01:44:50 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:50 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58"], 0xf) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1462.046131] ldm_validate_partition_table(): Disk read failed. [ 1462.061338] Dev loop0: unable to read RDB block 0 [ 1462.122051] loop0: unable to read partition table [ 1462.144129] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1462.148111] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1462.195504] FAULT_INJECTION: forcing a failure. [ 1462.195504] name failslab, interval 1, probability 0, space 0, times 0 01:44:51 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c1262857180") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1462.259559] CPU: 1 PID: 13956 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1462.267118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1462.276494] Call Trace: [ 1462.279114] dump_stack+0x244/0x39d [ 1462.282777] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1462.287998] ? debug_smp_processor_id+0x1c/0x20 [ 1462.292695] ? perf_trace_lock+0x14d/0x7a0 [ 1462.296985] should_fail.cold.4+0xa/0x17 [ 1462.301084] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1462.306262] ? save_stack+0x43/0xd0 [ 1462.309917] ? kasan_kmalloc+0xc7/0xe0 [ 1462.313817] ? kmem_cache_alloc_trace+0x152/0x750 [ 1462.318701] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 1462.323907] ? __list_lru_init+0x4d6/0x840 [ 1462.328144] ? zap_class+0x640/0x640 [ 1462.331882] ? ovl_mount+0x2c/0x40 [ 1462.335508] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1462.340266] ? do_mount+0x581/0x31f0 [ 1462.343990] ? ksys_mount+0x12d/0x140 [ 1462.347817] ? __x64_sys_mount+0xbe/0x150 [ 1462.352060] ? do_syscall_64+0x1b9/0x820 [ 1462.356131] ? find_held_lock+0x36/0x1c0 [ 1462.360204] ? __lock_is_held+0xb5/0x140 [ 1462.364295] ? perf_trace_sched_process_exec+0x860/0x860 [ 1462.369763] __should_failslab+0x124/0x180 [ 1462.374002] should_failslab+0x9/0x14 [ 1462.377805] kmem_cache_alloc_trace+0x2d7/0x750 [ 1462.382493] ? __kmalloc_node+0x3c/0x70 [ 1462.386465] ? __kmalloc_node+0x3c/0x70 [ 1462.390442] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1462.395461] __memcg_init_list_lru_node+0x185/0x2d0 [ 1462.400490] ? kvfree_rcu+0x20/0x20 [ 1462.404125] ? __kmalloc_node+0x50/0x70 [ 1462.408105] __list_lru_init+0x4d6/0x840 [ 1462.412166] ? list_lru_destroy+0x500/0x500 [ 1462.416493] ? up_write+0x7b/0x220 [ 1462.420032] ? down_write_nested+0x130/0x130 [ 1462.424442] ? down_read+0x120/0x120 [ 1462.428160] ? init_wait_entry+0x1c0/0x1c0 [ 1462.432396] ? prealloc_shrinker+0x172/0x340 [ 1462.436945] sget_userns+0x975/0xed0 [ 1462.440659] ? get_anon_bdev+0xc0/0xc0 [ 1462.444550] ? grab_super+0x400/0x400 [ 1462.448361] ? selinux_ipv4_output+0x50/0x50 [ 1462.452786] ? __free_pages+0x103/0x190 [ 1462.456797] ? selinux_sb_copy_data+0x602/0x740 [ 1462.461503] ? selinux_capable+0x36/0x40 [ 1462.465596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1462.471137] ? security_capable+0x99/0xc0 [ 1462.475293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1462.480872] ? ns_capable_common+0x13f/0x170 [ 1462.485297] ? get_anon_bdev+0xc0/0xc0 [ 1462.489182] sget+0x10b/0x150 [ 1462.492289] ? ovl_show_options+0x550/0x550 [ 1462.496614] mount_nodev+0x33/0x110 [ 1462.500239] ovl_mount+0x2c/0x40 [ 1462.503615] mount_fs+0xae/0x31d [ 1462.506995] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1462.511579] ? may_umount+0xb0/0xb0 [ 1462.515205] ? _raw_read_unlock+0x2c/0x50 [ 1462.519449] ? __get_fs_type+0x97/0xc0 [ 1462.523354] do_mount+0x581/0x31f0 [ 1462.526907] ? check_preemption_disabled+0x48/0x280 [ 1462.531940] ? copy_mount_string+0x40/0x40 [ 1462.536185] ? copy_mount_options+0x5f/0x430 [ 1462.540596] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1462.545700] ? kmem_cache_alloc_trace+0x353/0x750 [ 1462.550561] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1462.556110] ? _copy_from_user+0xdf/0x150 [ 1462.560266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1462.565809] ? copy_mount_options+0x315/0x430 [ 1462.570338] ksys_mount+0x12d/0x140 [ 1462.573968] __x64_sys_mount+0xbe/0x150 [ 1462.577947] do_syscall_64+0x1b9/0x820 [ 1462.581856] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1462.587224] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1462.592159] ? trace_hardirqs_on_caller+0x310/0x310 [ 1462.597174] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1462.602192] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1462.608862] ? __switch_to_asm+0x40/0x70 [ 1462.612918] ? __switch_to_asm+0x34/0x70 [ 1462.616981] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1462.621857] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1462.627053] RIP: 0033:0x457569 [ 1462.630243] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1462.649142] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 01:44:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}}]}]}, 0xac}}, 0x0) [ 1462.656854] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1462.664119] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1462.671385] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1462.678653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1462.685919] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:51 executing program 4 (fault-call:7 fault-nth:18): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:51 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:51 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff411689361610584f576914e70bfeb59800f97c97644ab8a7"}) 01:44:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}]}]}, 0xac}}, 0x0) 01:44:51 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:51 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:51 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1462.989054] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1462.999146] ldm_validate_partition_table(): Disk read failed. [ 1463.023882] FAULT_INJECTION: forcing a failure. [ 1463.023882] name failslab, interval 1, probability 0, space 0, times 0 01:44:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xb000000]}}]}]}, 0xac}}, 0x0) 01:44:51 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1463.045886] Dev loop0: unable to read RDB block 0 [ 1463.065350] loop0: unable to read partition table 01:44:52 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1463.095850] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:44:52 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1463.163443] CPU: 1 PID: 13996 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1463.170884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1463.180286] Call Trace: [ 1463.182912] dump_stack+0x244/0x39d [ 1463.186576] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1463.191816] ? debug_smp_processor_id+0x1c/0x20 [ 1463.196509] ? perf_trace_lock+0x14d/0x7a0 [ 1463.200801] should_fail.cold.4+0xa/0x17 [ 1463.204894] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1463.210031] ? save_stack+0x43/0xd0 [ 1463.213680] ? kasan_kmalloc+0xc7/0xe0 [ 1463.217586] ? kmem_cache_alloc_trace+0x152/0x750 [ 1463.217604] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 1463.217618] ? __list_lru_init+0x4d6/0x840 [ 1463.217636] ? zap_class+0x640/0x640 [ 1463.227670] ? ovl_mount+0x2c/0x40 [ 1463.227686] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1463.227698] ? do_mount+0x581/0x31f0 [ 1463.227712] ? ksys_mount+0x12d/0x140 [ 1463.227725] ? __x64_sys_mount+0xbe/0x150 [ 1463.227741] ? do_syscall_64+0x1b9/0x820 [ 1463.227783] ? find_held_lock+0x36/0x1c0 [ 1463.227803] ? __lock_is_held+0xb5/0x140 [ 1463.227836] ? perf_trace_sched_process_exec+0x860/0x860 [ 1463.227863] __should_failslab+0x124/0x180 [ 1463.227883] should_failslab+0x9/0x14 [ 1463.227913] kmem_cache_alloc_trace+0x2d7/0x750 [ 1463.267999] ? __kmalloc_node+0x3c/0x70 [ 1463.268015] ? __kmalloc_node+0x3c/0x70 [ 1463.268034] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1463.268056] __memcg_init_list_lru_node+0x185/0x2d0 [ 1463.290206] ? kvfree_rcu+0x20/0x20 [ 1463.290226] ? __kmalloc_node+0x50/0x70 [ 1463.290249] __list_lru_init+0x4d6/0x840 [ 1463.315940] ? list_lru_destroy+0x500/0x500 [ 1463.320320] ? up_write+0x7b/0x220 [ 1463.323889] ? down_write_nested+0x130/0x130 [ 1463.328321] ? down_read+0x120/0x120 [ 1463.332063] ? init_wait_entry+0x1c0/0x1c0 [ 1463.336321] ? prealloc_shrinker+0x172/0x340 [ 1463.340783] sget_userns+0x975/0xed0 [ 1463.344516] ? get_anon_bdev+0xc0/0xc0 [ 1463.348433] ? grab_super+0x400/0x400 [ 1463.352282] ? selinux_ipv4_output+0x50/0x50 [ 1463.356724] ? __free_pages+0x103/0x190 [ 1463.360824] ? selinux_sb_copy_data+0x602/0x740 [ 1463.365527] ? selinux_capable+0x36/0x40 [ 1463.369608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1463.375162] ? security_capable+0x99/0xc0 [ 1463.379333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1463.384898] ? ns_capable_common+0x13f/0x170 [ 1463.389333] ? get_anon_bdev+0xc0/0xc0 [ 1463.393260] sget+0x10b/0x150 [ 1463.396396] ? ovl_show_options+0x550/0x550 [ 1463.400765] mount_nodev+0x33/0x110 [ 1463.404420] ovl_mount+0x2c/0x40 [ 1463.407819] mount_fs+0xae/0x31d [ 1463.411204] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1463.415804] ? may_umount+0xb0/0xb0 [ 1463.419456] ? _raw_read_unlock+0x2c/0x50 [ 1463.424119] ? __get_fs_type+0x97/0xc0 [ 1463.428042] do_mount+0x581/0x31f0 [ 1463.431609] ? check_preemption_disabled+0x48/0x280 [ 1463.436646] ? copy_mount_string+0x40/0x40 [ 1463.440891] ? copy_mount_options+0x5f/0x430 [ 1463.445312] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1463.450339] ? kmem_cache_alloc_trace+0x353/0x750 [ 1463.455271] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1463.460925] ? _copy_from_user+0xdf/0x150 [ 1463.465096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1463.470642] ? copy_mount_options+0x315/0x430 [ 1463.475153] ksys_mount+0x12d/0x140 [ 1463.478810] __x64_sys_mount+0xbe/0x150 [ 1463.482796] do_syscall_64+0x1b9/0x820 [ 1463.486693] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1463.492087] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1463.497018] ? trace_hardirqs_on_caller+0x310/0x310 [ 1463.502036] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1463.507053] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1463.513750] ? __switch_to_asm+0x40/0x70 [ 1463.517817] ? __switch_to_asm+0x34/0x70 [ 1463.521882] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1463.526752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1463.531947] RIP: 0033:0x457569 [ 1463.535150] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1463.554047] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1463.561768] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1463.569035] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1463.576316] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1463.583597] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1463.590869] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:52 executing program 4 (fault-call:7 fault-nth:19): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1a0]}}]}]}, 0xac}}, 0x0) 01:44:52 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff411689361610584b576914e70bfeb59800f97c97644ab8a7"}) 01:44:52 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:52 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x800000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xb00]}}]}]}, 0xac}}, 0x0) [ 1463.806262] ldm_validate_partition_table(): Disk read failed. [ 1463.827547] Dev loop0: unable to read RDB block 0 01:44:52 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1463.855650] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1463.885177] loop0: unable to read partition table 01:44:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1463.900084] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1463.916969] FAULT_INJECTION: forcing a failure. [ 1463.916969] name failslab, interval 1, probability 0, space 0, times 0 [ 1464.001059] CPU: 0 PID: 14043 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1464.008500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1464.017901] Call Trace: [ 1464.020536] dump_stack+0x244/0x39d [ 1464.024214] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1464.029451] ? perf_trace_lock+0x4a7/0x7a0 [ 1464.033777] should_fail.cold.4+0xa/0x17 [ 1464.037881] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1464.043038] ? save_stack+0x43/0xd0 [ 1464.046724] ? kmem_cache_alloc_trace+0x152/0x750 [ 1464.051599] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 1464.056819] ? __list_lru_init+0x4d6/0x840 [ 1464.061081] ? zap_class+0x640/0x640 [ 1464.064805] ? ovl_mount+0x2c/0x40 [ 1464.064826] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 1464.064843] ? do_mount+0x581/0x31f0 [ 1464.064864] ? ksys_mount+0x12d/0x140 [ 1464.080737] ? __x64_sys_mount+0xbe/0x150 [ 1464.084921] ? do_syscall_64+0x1b9/0x820 [ 1464.089032] ? find_held_lock+0x36/0x1c0 [ 1464.093139] ? __lock_is_held+0xb5/0x140 [ 1464.097272] ? perf_trace_sched_process_exec+0x860/0x860 [ 1464.102790] __should_failslab+0x124/0x180 [ 1464.107063] should_failslab+0x9/0x14 [ 1464.110895] kmem_cache_alloc_trace+0x2d7/0x750 [ 1464.115596] ? __kmalloc_node+0x3c/0x70 [ 1464.119602] ? __kmalloc_node+0x3c/0x70 [ 1464.123611] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1464.128700] __memcg_init_list_lru_node+0x185/0x2d0 [ 1464.133763] ? kvfree_rcu+0x20/0x20 [ 1464.137429] ? __kmalloc_node+0x50/0x70 [ 1464.141469] __list_lru_init+0x4d6/0x840 [ 1464.145571] ? list_lru_destroy+0x500/0x500 [ 1464.149931] ? up_write+0x7b/0x220 [ 1464.153505] ? down_write_nested+0x130/0x130 [ 1464.157938] ? down_read+0x120/0x120 [ 1464.161704] ? init_wait_entry+0x1c0/0x1c0 [ 1464.165977] ? prealloc_shrinker+0x172/0x340 [ 1464.170446] sget_userns+0x975/0xed0 [ 1464.174184] ? get_anon_bdev+0xc0/0xc0 [ 1464.178121] ? grab_super+0x400/0x400 [ 1464.181962] ? selinux_ipv4_output+0x50/0x50 [ 1464.186418] ? __free_pages+0x103/0x190 [ 1464.190455] ? selinux_sb_copy_data+0x602/0x740 [ 1464.195201] ? selinux_capable+0x36/0x40 [ 1464.199298] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1464.204855] ? security_capable+0x99/0xc0 [ 1464.204886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1464.204907] ? ns_capable_common+0x13f/0x170 [ 1464.214603] ? get_anon_bdev+0xc0/0xc0 [ 1464.214623] sget+0x10b/0x150 [ 1464.214653] ? ovl_show_options+0x550/0x550 [ 1464.230401] mount_nodev+0x33/0x110 [ 1464.234073] ovl_mount+0x2c/0x40 [ 1464.237481] mount_fs+0xae/0x31d [ 1464.240896] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1464.245517] ? may_umount+0xb0/0xb0 [ 1464.249223] ? _raw_read_unlock+0x2c/0x50 [ 1464.253421] ? __get_fs_type+0x97/0xc0 [ 1464.257749] do_mount+0x581/0x31f0 [ 1464.261318] ? check_preemption_disabled+0x48/0x280 [ 1464.266377] ? copy_mount_string+0x40/0x40 [ 1464.270699] ? copy_mount_options+0x5f/0x430 [ 1464.275133] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1464.275158] ? kmem_cache_alloc_trace+0x353/0x750 [ 1464.275185] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1464.275215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1464.285067] ? copy_mount_options+0x315/0x430 01:44:52 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1464.285101] ksys_mount+0x12d/0x140 [ 1464.285130] __x64_sys_mount+0xbe/0x150 [ 1464.308458] do_syscall_64+0x1b9/0x820 [ 1464.312384] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1464.317790] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1464.322756] ? trace_hardirqs_on_caller+0x310/0x310 [ 1464.327811] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1464.332850] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1464.339528] ? __switch_to_asm+0x40/0x70 [ 1464.343602] ? __switch_to_asm+0x34/0x70 [ 1464.347705] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1464.352562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1464.357757] RIP: 0033:0x457569 [ 1464.360966] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1464.379887] RSP: 002b:00007f8eefc88c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1464.387604] RAX: ffffffffffffffda RBX: 00007f8eefc88c90 RCX: 0000000000457569 [ 1464.394881] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1464.402156] RBP: 000000000072bfa0 R08: 0000000020000140 R09: 0000000000000000 [ 1464.409431] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc896d4 [ 1464.416730] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 01:44:53 executing program 4 (fault-call:7 fault-nth:20): mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:53 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x9]}}]}]}, 0xac}}, 0x0) 01:44:53 executing program 1 (fault-call:7 fault-nth:0): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105835576914e70bfeb59800f97c97644ab8a7"}) [ 1464.567828] FAULT_INJECTION: forcing a failure. [ 1464.567828] name failslab, interval 1, probability 0, space 0, times 0 [ 1464.604421] CPU: 1 PID: 14075 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #122 [ 1464.611847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1464.621217] Call Trace: [ 1464.623836] dump_stack+0x244/0x39d [ 1464.623860] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1464.623892] should_fail.cold.4+0xa/0x17 [ 1464.623913] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1464.632761] ? zap_class+0x640/0x640 [ 1464.645667] ? find_held_lock+0x36/0x1c0 [ 1464.649759] ? __lock_is_held+0xb5/0x140 [ 1464.653860] ? perf_trace_sched_process_exec+0x860/0x860 [ 1464.659331] ? print_usage_bug+0xc0/0xc0 [ 1464.663432] __should_failslab+0x124/0x180 [ 1464.667697] should_failslab+0x9/0x14 [ 1464.671523] __kmalloc+0x2e0/0x760 [ 1464.675083] ? sock_kmalloc+0x15a/0x1f0 [ 1464.679083] sock_kmalloc+0x15a/0x1f0 [ 1464.682906] ? __sk_mem_schedule+0xe0/0xe0 [ 1464.687166] ? trace_hardirqs_on+0xbd/0x310 [ 1464.691504] ? lock_release+0xa00/0xa00 [ 1464.695496] ? lock_sock_nested+0xe2/0x120 [ 1464.699761] ? trace_hardirqs_off_caller+0x310/0x310 [ 1464.704894] af_alg_alloc_areq+0x83/0x280 [ 1464.709056] ? alg_accept+0x60/0x60 [ 1464.709076] ? __local_bh_enable_ip+0x160/0x260 01:44:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:53 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1464.709105] skcipher_recvmsg+0x354/0x1780 [ 1464.717415] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1464.717437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1464.717456] ? security_socket_recvmsg+0x9c/0xc0 [ 1464.717472] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1464.717489] sock_recvmsg+0xd0/0x110 [ 1464.717507] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1464.736780] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1464.736872] ___sys_recvmsg+0x2b6/0x680 [ 1464.762403] ? ___sys_sendmsg+0x930/0x930 [ 1464.766570] ? lock_downgrade+0x900/0x900 [ 1464.770736] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1464.776282] ? proc_fail_nth_write+0x9e/0x210 [ 1464.780791] ? __fget_light+0x2e9/0x430 [ 1464.784769] ? fget_raw+0x20/0x20 [ 1464.788223] ? find_held_lock+0x36/0x1c0 [ 1464.792290] ? kasan_check_write+0x14/0x20 [ 1464.796554] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1464.801492] ? wait_for_completion+0x8a0/0x8a0 [ 1464.806094] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1464.811653] ? sockfd_lookup_light+0xc5/0x160 [ 1464.816162] __sys_recvmsg+0x11a/0x280 [ 1464.820055] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1464.824653] ? __sb_end_write+0xd9/0x110 [ 1464.828733] ? fput+0x130/0x1a0 [ 1464.832016] ? do_syscall_64+0x9a/0x820 [ 1464.835995] ? do_syscall_64+0x9a/0x820 [ 1464.839986] ? trace_hardirqs_off_caller+0x310/0x310 [ 1464.845102] __x64_sys_recvmsg+0x78/0xb0 [ 1464.849173] do_syscall_64+0x1b9/0x820 [ 1464.853067] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1464.858440] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1464.863370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1464.868218] ? trace_hardirqs_on_caller+0x310/0x310 [ 1464.873240] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1464.878263] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1464.883295] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1464.888154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1464.893347] RIP: 0033:0x457569 [ 1464.896570] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1464.915475] RSP: 002b:00007f1cece64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1464.923187] RAX: ffffffffffffffda RBX: 00007f1cece64c90 RCX: 0000000000457569 [ 1464.930457] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 [ 1464.937731] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1464.945001] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cece656d4 [ 1464.952269] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 [ 1464.963411] FAULT_INJECTION: forcing a failure. 01:44:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}]}]}, 0xac}}, 0x0) 01:44:53 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1464.963411] name failslab, interval 1, probability 0, space 0, times 0 [ 1464.991266] ldm_validate_partition_table(): Disk read failed. [ 1465.016977] Dev loop0: unable to read RDB block 0 [ 1465.024785] CPU: 1 PID: 14088 Comm: syz-executor4 Not tainted 4.20.0-rc3+ #122 [ 1465.030322] loop0: unable to read partition table [ 1465.032183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1465.032192] Call Trace: [ 1465.032225] dump_stack+0x244/0x39d [ 1465.032254] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1465.046671] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1465.049159] ? __kernel_text_address+0xd/0x40 [ 1465.049194] should_fail.cold.4+0xa/0x17 [ 1465.049222] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1465.049253] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1465.049276] ? zap_class+0x640/0x640 [ 1465.089875] ? error_exit+0xb/0x20 [ 1465.093465] ? find_held_lock+0x36/0x1c0 [ 1465.097567] ? __lock_is_held+0xb5/0x140 [ 1465.101702] ? perf_trace_sched_process_exec+0x860/0x860 [ 1465.107200] __should_failslab+0x124/0x180 [ 1465.111462] should_failslab+0x9/0x14 [ 1465.115292] kmem_cache_alloc_trace+0x2d7/0x750 [ 1465.119984] ? __kmalloc_node+0x3c/0x70 [ 1465.123980] ? __kmalloc_node+0x3c/0x70 [ 1465.127988] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1465.133042] __memcg_init_list_lru_node+0x185/0x2d0 [ 1465.138192] ? kvfree_rcu+0x20/0x20 01:44:54 executing program 1 (fault-call:7 fault-nth:1): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1465.141841] ? __kmalloc_node+0x50/0x70 [ 1465.145857] __list_lru_init+0x4d6/0x840 [ 1465.149951] ? list_lru_destroy+0x500/0x500 [ 1465.154309] ? up_write+0x7b/0x220 [ 1465.157872] ? down_write_nested+0x130/0x130 [ 1465.162334] ? down_read+0x120/0x120 [ 1465.166073] ? init_wait_entry+0x1c0/0x1c0 [ 1465.170332] ? prealloc_shrinker+0x172/0x340 [ 1465.174784] sget_userns+0x975/0xed0 [ 1465.178514] ? get_anon_bdev+0xc0/0xc0 [ 1465.182423] ? grab_super+0x400/0x400 [ 1465.186251] ? selinux_ipv4_output+0x50/0x50 [ 1465.190683] ? __free_pages+0x103/0x190 [ 1465.194667] ? selinux_sb_copy_data+0x602/0x740 [ 1465.199350] ? selinux_capable+0x36/0x40 [ 1465.203414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1465.208954] ? security_capable+0x99/0xc0 [ 1465.213110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1465.218654] ? ns_capable_common+0x13f/0x170 [ 1465.223072] ? get_anon_bdev+0xc0/0xc0 [ 1465.226965] sget+0x10b/0x150 [ 1465.230080] ? ovl_show_options+0x550/0x550 [ 1465.234413] mount_nodev+0x33/0x110 [ 1465.238045] ovl_mount+0x2c/0x40 [ 1465.241418] mount_fs+0xae/0x31d [ 1465.244805] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1465.249392] ? may_umount+0xb0/0xb0 [ 1465.253022] ? _raw_read_unlock+0x2c/0x50 [ 1465.257170] ? __get_fs_type+0x97/0xc0 [ 1465.261068] do_mount+0x581/0x31f0 [ 1465.264619] ? check_preemption_disabled+0x48/0x280 [ 1465.269648] ? copy_mount_string+0x40/0x40 [ 1465.273898] ? copy_mount_options+0x5f/0x430 [ 1465.278311] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1465.283332] ? kmem_cache_alloc_trace+0x353/0x750 [ 1465.288179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1465.293720] ? _copy_from_user+0xdf/0x150 [ 1465.297873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1465.303414] ? copy_mount_options+0x315/0x430 [ 1465.307923] ksys_mount+0x12d/0x140 [ 1465.311557] __x64_sys_mount+0xbe/0x150 [ 1465.315559] do_syscall_64+0x1b9/0x820 [ 1465.319468] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1465.324835] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1465.329777] ? trace_hardirqs_on_caller+0x310/0x310 [ 1465.334801] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1465.339826] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1465.346497] ? __switch_to_asm+0x40/0x70 [ 1465.350557] ? __switch_to_asm+0x34/0x70 [ 1465.354661] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1465.359517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1465.364708] RIP: 0033:0x457569 [ 1465.367908] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:44:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffff9e]}}]}]}, 0xac}}, 0x0) [ 1465.386808] RSP: 002b:00007f8eefc67c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1465.394521] RAX: ffffffffffffffda RBX: 00007f8eefc67c90 RCX: 0000000000457569 [ 1465.401793] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000000400000 [ 1465.409065] RBP: 000000000072c040 R08: 0000000020000140 R09: 0000000000000000 [ 1465.416339] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8eefc686d4 [ 1465.424178] R13: 00000000004c2c47 R14: 00000000004d49d8 R15: 0000000000000006 [ 1465.515714] FAULT_INJECTION: forcing a failure. [ 1465.515714] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.548377] CPU: 1 PID: 14104 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #122 [ 1465.555803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1465.565178] Call Trace: [ 1465.567796] dump_stack+0x244/0x39d [ 1465.571485] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1465.576710] ? debug_smp_processor_id+0x1c/0x20 [ 1465.581398] ? perf_trace_lock+0x14d/0x7a0 [ 1465.585669] should_fail.cold.4+0xa/0x17 [ 1465.589758] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1465.594878] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1465.599923] ? get_user_pages_fast+0x2a9/0x450 [ 1465.604524] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1465.609315] ? __kernel_text_address+0xd/0x40 [ 1465.613813] ? unwind_get_return_address+0x61/0xa0 [ 1465.618746] ? zap_class+0x640/0x640 [ 1465.622463] ? __save_stack_trace+0x8d/0xf0 [ 1465.626793] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1465.631819] ? find_held_lock+0x36/0x1c0 [ 1465.635912] ? __lock_is_held+0xb5/0x140 [ 1465.639994] ? perf_trace_sched_process_exec+0x860/0x860 [ 1465.645449] ? find_held_lock+0x36/0x1c0 [ 1465.649526] __should_failslab+0x124/0x180 [ 1465.653785] should_failslab+0x9/0x14 [ 1465.657587] __kmalloc+0x2e0/0x760 [ 1465.661134] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1465.666153] ? iov_iter_advance+0x306/0x13f0 [ 1465.670576] ? sg_init_table+0x28/0x60 [ 1465.674466] ? sock_kmalloc+0x15a/0x1f0 [ 1465.678444] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1465.683469] sock_kmalloc+0x15a/0x1f0 [ 1465.687276] ? __sk_mem_schedule+0xe0/0xe0 [ 1465.691518] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1465.696578] af_alg_get_rsgl+0x1d7/0x920 [ 1465.700661] ? af_alg_make_sg+0x550/0x550 [ 1465.704808] ? lock_sock_nested+0xe2/0x120 [ 1465.709052] ? trace_hardirqs_off_caller+0x310/0x310 [ 1465.714166] ? af_alg_alloc_areq+0x1ec/0x280 [ 1465.718596] ? alg_accept+0x60/0x60 [ 1465.722226] ? __local_bh_enable_ip+0x160/0x260 [ 1465.726907] skcipher_recvmsg+0x3a2/0x1780 [ 1465.731160] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1465.736010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1465.741567] ? security_socket_recvmsg+0x9c/0xc0 [ 1465.746324] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1465.751171] sock_recvmsg+0xd0/0x110 [ 1465.754887] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1465.759905] ___sys_recvmsg+0x2b6/0x680 [ 1465.763896] ? ___sys_sendmsg+0x930/0x930 [ 1465.768059] ? lock_downgrade+0x900/0x900 [ 1465.772216] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1465.777781] ? proc_fail_nth_write+0x9e/0x210 [ 1465.782287] ? __fget_light+0x2e9/0x430 [ 1465.786266] ? fget_raw+0x20/0x20 [ 1465.789720] ? find_held_lock+0x36/0x1c0 [ 1465.793793] ? kasan_check_write+0x14/0x20 [ 1465.798034] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1465.802977] ? wait_for_completion+0x8a0/0x8a0 [ 1465.807586] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1465.813144] ? sockfd_lookup_light+0xc5/0x160 [ 1465.817649] __sys_recvmsg+0x11a/0x280 [ 1465.821559] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1465.826147] ? __sb_end_write+0xd9/0x110 [ 1465.830229] ? fput+0x130/0x1a0 [ 1465.833512] ? do_syscall_64+0x9a/0x820 [ 1465.837509] ? do_syscall_64+0x9a/0x820 [ 1465.841533] ? trace_hardirqs_off_caller+0x310/0x310 [ 1465.846649] __x64_sys_recvmsg+0x78/0xb0 [ 1465.850883] do_syscall_64+0x1b9/0x820 [ 1465.854775] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1465.860140] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1465.865070] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1465.869919] ? trace_hardirqs_on_caller+0x310/0x310 [ 1465.874944] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1465.879971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1465.884825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1465.890014] RIP: 0033:0x457569 [ 1465.893215] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1465.912118] RSP: 002b:00007f1cece64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1465.919828] RAX: ffffffffffffffda RBX: 00007f1cece64c90 RCX: 0000000000457569 [ 1465.927099] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 [ 1465.934372] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1465.941643] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cece656d4 [ 1465.948913] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 01:44:54 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:54 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:54 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff411689361610580a576914e70bfeb59800f97c97644ab8a7"}) 01:44:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}]}]}, 0xac}}, 0x0) 01:44:54 executing program 1 (fault-call:7 fault-nth:2): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x2000000]}}]}]}, 0xac}}, 0x0) [ 1466.139345] FAULT_INJECTION: forcing a failure. [ 1466.139345] name failslab, interval 1, probability 0, space 0, times 0 [ 1466.186960] CPU: 0 PID: 14127 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #122 [ 1466.194393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1466.203772] Call Trace: [ 1466.206390] dump_stack+0x244/0x39d [ 1466.210055] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1466.215280] ? trace_hardirqs_on+0xbd/0x310 [ 1466.219633] ? iov_iter_get_pages+0x2fa/0x12a0 [ 1466.224248] should_fail.cold.4+0xa/0x17 [ 1466.228339] ? fault_create_debugfs_attr+0x1f0/0x1f0 01:44:55 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf000000]}}]}]}, 0xac}}, 0x0) [ 1466.233462] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1466.238534] ? get_user_pages_fast+0x2a9/0x450 [ 1466.243132] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1466.243149] ? kasan_kmalloc+0xc7/0xe0 [ 1466.243166] ? sock_kmalloc+0x15a/0x1f0 [ 1466.256267] ? af_alg_get_rsgl+0x1d7/0x920 [ 1466.260550] ? zap_class+0x640/0x640 [ 1466.264285] ? __sys_recvmsg+0x11a/0x280 [ 1466.268373] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1466.273418] ? find_held_lock+0x36/0x1c0 [ 1466.277550] ? __lock_is_held+0xb5/0x140 [ 1466.281654] ? perf_trace_sched_process_exec+0x860/0x860 [ 1466.287136] __should_failslab+0x124/0x180 [ 1466.291397] should_failslab+0x9/0x14 [ 1466.295221] __kmalloc+0x2e0/0x760 [ 1466.298780] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1466.303810] ? iov_iter_advance+0x306/0x13f0 [ 1466.308223] ? sg_init_table+0x28/0x60 [ 1466.312116] ? sock_kmalloc+0x15a/0x1f0 [ 1466.316092] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1466.321114] sock_kmalloc+0x15a/0x1f0 [ 1466.324927] ? __sk_mem_schedule+0xe0/0xe0 [ 1466.329169] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1466.334195] af_alg_get_rsgl+0x1d7/0x920 [ 1466.338276] ? af_alg_make_sg+0x550/0x550 [ 1466.342425] ? lock_sock_nested+0xe2/0x120 [ 1466.346677] ? trace_hardirqs_off_caller+0x310/0x310 [ 1466.351791] ? af_alg_alloc_areq+0x1ec/0x280 [ 1466.356201] ? alg_accept+0x60/0x60 [ 1466.359832] ? __local_bh_enable_ip+0x160/0x260 [ 1466.364526] skcipher_recvmsg+0x3a2/0x1780 [ 1466.368819] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1466.373672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1466.379210] ? security_socket_recvmsg+0x9c/0xc0 [ 1466.383972] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1466.388823] sock_recvmsg+0xd0/0x110 [ 1466.392542] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1466.397569] ___sys_recvmsg+0x2b6/0x680 [ 1466.401559] ? ___sys_sendmsg+0x930/0x930 [ 1466.405716] ? lock_downgrade+0x900/0x900 [ 1466.410222] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1466.415767] ? proc_fail_nth_write+0x9e/0x210 [ 1466.420271] ? __fget_light+0x2e9/0x430 [ 1466.424279] ? fget_raw+0x20/0x20 [ 1466.427756] ? find_held_lock+0x36/0x1c0 [ 1466.431856] ? kasan_check_write+0x14/0x20 [ 1466.436099] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1466.441038] ? wait_for_completion+0x8a0/0x8a0 [ 1466.445646] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1466.451188] ? sockfd_lookup_light+0xc5/0x160 [ 1466.455693] __sys_recvmsg+0x11a/0x280 [ 1466.459594] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1466.464178] ? __sb_end_write+0xd9/0x110 [ 1466.468250] ? fput+0x130/0x1a0 [ 1466.471536] ? do_syscall_64+0x9a/0x820 [ 1466.475517] ? do_syscall_64+0x9a/0x820 [ 1466.479521] ? trace_hardirqs_off_caller+0x310/0x310 [ 1466.484634] __x64_sys_recvmsg+0x78/0xb0 [ 1466.488718] do_syscall_64+0x1b9/0x820 [ 1466.492614] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1466.498077] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1466.503009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1466.507859] ? trace_hardirqs_on_caller+0x310/0x310 [ 1466.512878] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1466.517913] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1466.522940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1466.527795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1466.532988] RIP: 0033:0x457569 [ 1466.536189] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1466.555614] RSP: 002b:00007f1cece64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1466.563324] RAX: ffffffffffffffda RBX: 00007f1cece64c90 RCX: 0000000000457569 [ 1466.570593] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 [ 1466.577872] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 01:44:55 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1466.585146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cece656d4 [ 1466.592415] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 01:44:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x10000000]}}]}]}, 0xac}}, 0x0) [ 1466.630063] print_req_error: 486 callbacks suppressed [ 1466.630074] print_req_error: I/O error, dev loop0, sector 0 [ 1466.641119] buffer_io_error: 486 callbacks suppressed [ 1466.641129] Buffer I/O error on dev loop0, logical block 0, async page read [ 1466.659317] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1466.688981] print_req_error: I/O error, dev loop0, sector 0 [ 1466.694817] Buffer I/O error on dev loop0, logical block 0, async page read [ 1466.716520] print_req_error: I/O error, dev loop0, sector 0 [ 1466.722359] Buffer I/O error on dev loop0, logical block 0, async page read 01:44:55 executing program 1 (fault-call:7 fault-nth:3): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1466.747623] print_req_error: I/O error, dev loop0, sector 0 [ 1466.753467] Buffer I/O error on dev loop0, logical block 0, async page read [ 1466.789678] print_req_error: I/O error, dev loop0, sector 0 [ 1466.795533] Buffer I/O error on dev loop0, logical block 0, async page read [ 1466.823741] print_req_error: I/O error, dev loop0, sector 0 [ 1466.829554] Buffer I/O error on dev loop0, logical block 0, async page read [ 1466.839738] print_req_error: I/O error, dev loop0, sector 0 [ 1466.845548] Buffer I/O error on dev loop0, logical block 0, async page read [ 1466.854463] print_req_error: I/O error, dev loop0, sector 0 [ 1466.855967] FAULT_INJECTION: forcing a failure. [ 1466.855967] name failslab, interval 1, probability 0, space 0, times 0 [ 1466.860252] Buffer I/O error on dev loop0, logical block 0, async page read [ 1466.878847] ldm_validate_partition_table(): Disk read failed. [ 1466.885149] print_req_error: I/O error, dev loop0, sector 0 [ 1466.888197] CPU: 0 PID: 14152 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #122 [ 1466.890929] Buffer I/O error on dev loop0, logical block 0, async page read [ 1466.898243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1466.898250] Call Trace: [ 1466.898281] dump_stack+0x244/0x39d [ 1466.898307] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1466.905850] print_req_error: I/O error, dev loop0, sector 0 [ 1466.914783] ? trace_hardirqs_on+0xbd/0x310 [ 1466.914805] ? iov_iter_get_pages+0x2fa/0x12a0 [ 1466.914827] should_fail.cold.4+0xa/0x17 [ 1466.914846] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1466.917442] Buffer I/O error on dev loop0, logical block 0, async page read [ 1466.921059] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1466.921078] ? get_user_pages_fast+0x2a9/0x450 [ 1466.927042] Dev loop0: unable to read RDB block 0 [ 1466.931968] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1466.931986] ? kasan_kmalloc+0xc7/0xe0 [ 1466.931998] ? sock_kmalloc+0x15a/0x1f0 [ 1466.932015] ? af_alg_get_rsgl+0x1d7/0x920 [ 1466.939674] loop0: unable to read partition table [ 1466.940919] ? zap_class+0x640/0x640 [ 1466.940937] ? __sys_recvmsg+0x11a/0x280 [ 1466.940962] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1466.945206] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1466.950121] ? find_held_lock+0x36/0x1c0 [ 1466.950143] ? __lock_is_held+0xb5/0x140 [ 1466.950179] ? perf_trace_sched_process_exec+0x860/0x860 [ 1467.029514] __should_failslab+0x124/0x180 [ 1467.033776] should_failslab+0x9/0x14 [ 1467.037601] __kmalloc+0x2e0/0x760 [ 1467.041169] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1467.046212] ? iov_iter_advance+0x306/0x13f0 [ 1467.050644] ? sg_init_table+0x28/0x60 [ 1467.054550] ? sock_kmalloc+0x15a/0x1f0 [ 1467.058545] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1467.063599] sock_kmalloc+0x15a/0x1f0 [ 1467.067463] ? __sk_mem_schedule+0xe0/0xe0 [ 1467.071724] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1467.076767] af_alg_get_rsgl+0x1d7/0x920 [ 1467.080868] ? af_alg_make_sg+0x550/0x550 [ 1467.085037] ? lock_sock_nested+0xe2/0x120 [ 1467.089291] ? trace_hardirqs_off_caller+0x310/0x310 [ 1467.094446] ? af_alg_alloc_areq+0x1ec/0x280 [ 1467.098875] ? alg_accept+0x60/0x60 [ 1467.102525] ? __local_bh_enable_ip+0x160/0x260 [ 1467.107220] skcipher_recvmsg+0x3a2/0x1780 [ 1467.111505] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1467.116439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1467.122014] ? security_socket_recvmsg+0x9c/0xc0 [ 1467.126795] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1467.131673] sock_recvmsg+0xd0/0x110 [ 1467.135432] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1467.140477] ___sys_recvmsg+0x2b6/0x680 [ 1467.144487] ? ___sys_sendmsg+0x930/0x930 [ 1467.148664] ? lock_downgrade+0x900/0x900 [ 1467.152844] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1467.158446] ? proc_fail_nth_write+0x9e/0x210 [ 1467.162973] ? __fget_light+0x2e9/0x430 [ 1467.166971] ? fget_raw+0x20/0x20 [ 1467.170455] ? find_held_lock+0x36/0x1c0 [ 1467.174545] ? kasan_check_write+0x14/0x20 [ 1467.178809] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1467.183772] ? wait_for_completion+0x8a0/0x8a0 [ 1467.188390] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1467.193976] ? sockfd_lookup_light+0xc5/0x160 [ 1467.198504] __sys_recvmsg+0x11a/0x280 [ 1467.202442] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1467.207047] ? __sb_end_write+0xd9/0x110 [ 1467.211139] ? fput+0x130/0x1a0 [ 1467.214456] ? do_syscall_64+0x9a/0x820 [ 1467.218459] ? do_syscall_64+0x9a/0x820 [ 1467.222466] ? trace_hardirqs_off_caller+0x310/0x310 [ 1467.227600] __x64_sys_recvmsg+0x78/0xb0 [ 1467.231700] do_syscall_64+0x1b9/0x820 [ 1467.235615] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1467.241003] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1467.246006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1467.250895] ? trace_hardirqs_on_caller+0x310/0x310 [ 1467.255937] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1467.260979] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1467.266022] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1467.270898] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1467.276109] RIP: 0033:0x457569 [ 1467.279327] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1467.298249] RSP: 002b:00007f1cece64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1467.305981] RAX: ffffffffffffffda RBX: 00007f1cece64c90 RCX: 0000000000457569 [ 1467.313273] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 [ 1467.320562] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1467.327853] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cece656d4 01:44:56 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400008, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x500]}}]}]}, 0xac}}, 0x0) [ 1467.335142] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 01:44:56 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:56 executing program 1 (fault-call:7 fault-nth:4): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105847576914e70bfeb59800f97c97644ab8a7"}) 01:44:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3]}}]}]}, 0xac}}, 0x0) 01:44:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1467.451174] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:44:56 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1467.569985] overlayfs: filesystem on './file0' not supported as upperdir [ 1467.613082] FAULT_INJECTION: forcing a failure. [ 1467.613082] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.629336] CPU: 0 PID: 14192 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #122 [ 1467.636780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1467.636787] Call Trace: [ 1467.636815] dump_stack+0x244/0x39d [ 1467.636839] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1467.636861] ? debug_smp_processor_id+0x1c/0x20 [ 1467.636880] ? perf_trace_lock+0x14d/0x7a0 [ 1467.636903] should_fail.cold.4+0xa/0x17 [ 1467.636923] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1467.636939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1467.636955] ? check_preemption_disabled+0x48/0x280 [ 1467.636981] ? zap_class+0x640/0x640 [ 1467.637005] ? find_held_lock+0x36/0x1c0 [ 1467.637024] ? __lock_is_held+0xb5/0x140 [ 1467.649021] ? perf_trace_sched_process_exec+0x860/0x860 [ 1467.649039] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1467.649065] __should_failslab+0x124/0x180 [ 1467.658133] ldm_validate_partition_table(): Disk read failed. [ 1467.662545] should_failslab+0x9/0x14 [ 1467.662563] __kmalloc+0x2e0/0x760 [ 1467.662582] ? af_alg_make_sg+0x550/0x550 [ 1467.675321] Dev loop0: unable to read RDB block 0 [ 1467.675994] ? sock_kmalloc+0x15a/0x1f0 [ 1467.676018] sock_kmalloc+0x15a/0x1f0 [ 1467.676041] ? __sk_mem_schedule+0xe0/0xe0 [ 1467.684456] loop0: unable to read partition table [ 1467.686620] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1467.686637] ? af_alg_count_tsgl+0x1bc/0x250 [ 1467.686659] skcipher_recvmsg+0x505/0x1780 [ 1467.693846] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1467.694453] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1467.703954] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1467.703973] ? security_socket_recvmsg+0x9c/0xc0 [ 1467.703988] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1467.704008] sock_recvmsg+0xd0/0x110 [ 1467.752810] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1467.757416] ? __sock_recv_ts_and_drops+0x420/0x420 01:44:56 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1467.757436] ___sys_recvmsg+0x2b6/0x680 [ 1467.816429] ? ___sys_sendmsg+0x930/0x930 [ 1467.820591] ? lock_downgrade+0x900/0x900 [ 1467.824757] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1467.830302] ? proc_fail_nth_write+0x9e/0x210 [ 1467.834798] ? __fget_light+0x2e9/0x430 [ 1467.838771] ? fget_raw+0x20/0x20 [ 1467.842229] ? find_held_lock+0x36/0x1c0 [ 1467.846298] ? kasan_check_write+0x14/0x20 [ 1467.850682] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1467.855611] ? wait_for_completion+0x8a0/0x8a0 [ 1467.860198] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1467.865743] ? sockfd_lookup_light+0xc5/0x160 [ 1467.870256] __sys_recvmsg+0x11a/0x280 [ 1467.874152] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1467.878750] ? __sb_end_write+0xd9/0x110 [ 1467.882821] ? fput+0x130/0x1a0 [ 1467.886108] ? do_syscall_64+0x9a/0x820 [ 1467.890088] ? do_syscall_64+0x9a/0x820 [ 1467.894078] ? trace_hardirqs_off_caller+0x310/0x310 [ 1467.899183] __x64_sys_recvmsg+0x78/0xb0 [ 1467.903240] do_syscall_64+0x1b9/0x820 [ 1467.907122] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1467.912485] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1467.917408] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1467.922360] ? trace_hardirqs_on_caller+0x310/0x310 [ 1467.927388] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1467.932400] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1467.937415] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1467.942260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1467.947445] RIP: 0033:0x457569 01:44:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}}]}]}, 0xac}}, 0x0) 01:44:56 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1467.950642] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1467.969548] RSP: 002b:00007f1cece64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1467.977260] RAX: ffffffffffffffda RBX: 00007f1cece64c90 RCX: 0000000000457569 [ 1467.984529] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 [ 1467.991799] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1467.999065] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cece656d4 [ 1468.006365] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 01:44:57 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40003a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:57 executing program 1 (fault-call:7 fault-nth:5): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x600]}}]}]}, 0xac}}, 0x0) 01:44:57 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105853576914e70bfeb59800f97c97644ab8a7"}) 01:44:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}]}]}, 0xac}}, 0x0) [ 1468.297769] FAULT_INJECTION: forcing a failure. [ 1468.297769] name failslab, interval 1, probability 0, space 0, times 0 [ 1468.346342] CPU: 1 PID: 14228 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #122 [ 1468.353764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1468.353773] Call Trace: [ 1468.353801] dump_stack+0x244/0x39d [ 1468.353831] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1468.353852] ? is_bpf_text_address+0xac/0x170 [ 1468.353879] should_fail.cold.4+0xa/0x17 [ 1468.353900] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1468.353916] ? zap_class+0x640/0x640 [ 1468.353932] ? print_usage_bug+0xc0/0xc0 01:44:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1468.353947] ? zap_class+0x640/0x640 [ 1468.369565] ? zap_class+0x640/0x640 [ 1468.369584] ? find_held_lock+0x36/0x1c0 [ 1468.407711] ? find_held_lock+0x36/0x1c0 [ 1468.411809] ? __lock_is_held+0xb5/0x140 [ 1468.415918] ? perf_trace_sched_process_exec+0x860/0x860 [ 1468.421411] __should_failslab+0x124/0x180 [ 1468.425671] should_failslab+0x9/0x14 [ 1468.429493] __kmalloc+0x2e0/0x760 [ 1468.433053] ? __local_bh_enable_ip+0x160/0x260 [ 1468.437750] ? sock_kmalloc+0x15a/0x1f0 [ 1468.441746] sock_kmalloc+0x15a/0x1f0 01:44:57 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xa0010000]}}]}]}, 0xac}}, 0x0) [ 1468.445565] ? __sk_mem_schedule+0xe0/0xe0 [ 1468.449824] ? __init_waitqueue_head+0x150/0x150 [ 1468.454615] af_alg_alloc_areq+0x83/0x280 [ 1468.458789] ? alg_accept+0x60/0x60 [ 1468.462458] ? kasan_check_write+0x14/0x20 [ 1468.466709] ? sock_kfree_s+0x47/0x60 [ 1468.466738] skcipher_recvmsg+0x354/0x1780 [ 1468.474787] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1468.474816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1468.474833] ? security_socket_recvmsg+0x9c/0xc0 [ 1468.474851] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1468.494829] sock_recvmsg+0xd0/0x110 [ 1468.498565] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1468.503601] ___sys_recvmsg+0x2b6/0x680 [ 1468.507602] ? ___sys_sendmsg+0x930/0x930 [ 1468.511763] ? lock_downgrade+0x900/0x900 [ 1468.515925] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1468.521472] ? proc_fail_nth_write+0x9e/0x210 [ 1468.525982] ? __fget_light+0x2e9/0x430 [ 1468.529957] ? fget_raw+0x20/0x20 [ 1468.533411] ? find_held_lock+0x36/0x1c0 [ 1468.537481] ? kasan_check_write+0x14/0x20 [ 1468.541724] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1468.546689] ? wait_for_completion+0x8a0/0x8a0 [ 1468.551314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1468.556863] ? sockfd_lookup_light+0xc5/0x160 [ 1468.561368] __sys_recvmsg+0x11a/0x280 [ 1468.565261] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1468.569869] ? __sb_end_write+0xd9/0x110 [ 1468.573940] ? fput+0x130/0x1a0 [ 1468.577226] ? do_syscall_64+0x9a/0x820 [ 1468.581201] ? do_syscall_64+0x9a/0x820 [ 1468.585192] ? trace_hardirqs_off_caller+0x310/0x310 [ 1468.590326] __x64_sys_recvmsg+0x78/0xb0 [ 1468.594393] do_syscall_64+0x1b9/0x820 [ 1468.598300] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1468.603671] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1468.608600] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1468.613446] ? trace_hardirqs_on_caller+0x310/0x310 [ 1468.618467] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1468.623490] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1468.628517] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1468.633370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1468.638563] RIP: 0033:0x457569 [ 1468.641762] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1468.660664] RSP: 002b:00007f1cece64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1468.668375] RAX: ffffffffffffffda RBX: 00007f1cece64c90 RCX: 0000000000457569 [ 1468.675647] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 [ 1468.682919] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1468.690191] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cece656d4 [ 1468.697458] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 [ 1468.716940] ldm_validate_partition_table(): Disk read failed. 01:44:57 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1468.744221] Dev loop0: unable to read RDB block 0 [ 1468.750755] loop0: unable to read partition table [ 1468.766988] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1468.786077] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:44:57 executing program 1 (fault-call:7 fault-nth:6): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1468.915415] overlayfs: workdir and upperdir must reside under the same mount [ 1468.997821] overlayfs: failed to resolve './file1': -2 [ 1469.001913] FAULT_INJECTION: forcing a failure. [ 1469.001913] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.025934] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1469.036799] CPU: 1 PID: 14260 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #122 [ 1469.044190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1469.053586] Call Trace: [ 1469.056212] dump_stack+0x244/0x39d [ 1469.059902] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1469.065125] ? debug_smp_processor_id+0x1c/0x20 [ 1469.069822] ? perf_trace_lock+0x14d/0x7a0 [ 1469.074085] should_fail.cold.4+0xa/0x17 [ 1469.078175] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1469.083305] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1469.088336] ? get_user_pages_fast+0x2a9/0x450 [ 1469.092947] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1469.097723] ? __kernel_text_address+0xd/0x40 [ 1469.102266] ? unwind_get_return_address+0x61/0xa0 [ 1469.107216] ? zap_class+0x640/0x640 [ 1469.110982] ? __save_stack_trace+0x8d/0xf0 [ 1469.115330] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1469.120376] ? find_held_lock+0x36/0x1c0 [ 1469.124470] ? __lock_is_held+0xb5/0x140 [ 1469.128592] ? perf_trace_sched_process_exec+0x860/0x860 [ 1469.134072] ? find_held_lock+0x36/0x1c0 [ 1469.138168] __should_failslab+0x124/0x180 [ 1469.142432] should_failslab+0x9/0x14 [ 1469.146276] __kmalloc+0x2e0/0x760 [ 1469.149839] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1469.154883] ? iov_iter_advance+0x306/0x13f0 [ 1469.159372] ? sg_init_table+0x28/0x60 [ 1469.163284] ? sock_kmalloc+0x15a/0x1f0 [ 1469.167290] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1469.172337] sock_kmalloc+0x15a/0x1f0 [ 1469.176167] ? __sk_mem_schedule+0xe0/0xe0 [ 1469.180437] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1469.185477] af_alg_get_rsgl+0x1d7/0x920 [ 1469.189686] ? af_alg_make_sg+0x550/0x550 [ 1469.193867] ? af_alg_alloc_areq+0x1ec/0x280 [ 1469.198303] ? alg_accept+0x60/0x60 [ 1469.201960] ? kasan_check_write+0x14/0x20 [ 1469.206237] ? sock_kfree_s+0x47/0x60 [ 1469.210065] skcipher_recvmsg+0x3a2/0x1780 [ 1469.214344] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1469.219237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1469.224805] ? security_socket_recvmsg+0x9c/0xc0 [ 1469.229590] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1469.234468] sock_recvmsg+0xd0/0x110 [ 1469.238226] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1469.243269] ___sys_recvmsg+0x2b6/0x680 [ 1469.247282] ? ___sys_sendmsg+0x930/0x930 [ 1469.251459] ? lock_downgrade+0x900/0x900 [ 1469.255637] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1469.261199] ? proc_fail_nth_write+0x9e/0x210 [ 1469.265750] ? __fget_light+0x2e9/0x430 [ 1469.269757] ? fget_raw+0x20/0x20 [ 1469.273254] ? find_held_lock+0x36/0x1c0 [ 1469.277342] ? kasan_check_write+0x14/0x20 [ 1469.281601] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1469.286563] ? wait_for_completion+0x8a0/0x8a0 [ 1469.291179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1469.296768] ? sockfd_lookup_light+0xc5/0x160 [ 1469.301290] __sys_recvmsg+0x11a/0x280 [ 1469.305197] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1469.309826] ? __sb_end_write+0xd9/0x110 [ 1469.313915] ? fput+0x130/0x1a0 [ 1469.317237] ? do_syscall_64+0x9a/0x820 [ 1469.321255] ? do_syscall_64+0x9a/0x820 [ 1469.325275] ? trace_hardirqs_off_caller+0x310/0x310 [ 1469.330420] __x64_sys_recvmsg+0x78/0xb0 [ 1469.334508] do_syscall_64+0x1b9/0x820 [ 1469.338415] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1469.343804] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1469.348773] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1469.353638] ? trace_hardirqs_on_caller+0x310/0x310 [ 1469.358678] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1469.363739] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1469.368786] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1469.373660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1469.378871] RIP: 0033:0x457569 [ 1469.382083] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1469.401009] RSP: 002b:00007f1cece64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1469.408743] RAX: ffffffffffffffda RBX: 00007f1cece64c90 RCX: 0000000000457569 [ 1469.416030] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 [ 1469.423824] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1469.431115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cece656d4 [ 1469.438400] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 01:44:58 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400480, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:44:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x13000000]}}]}]}, 0xac}}, 0x0) 01:44:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829096914e70bfeb59800f97c97644ab8a7"}) 01:44:58 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:58 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:58 executing program 1 (fault-call:7 fault-nth:7): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1469.592563] FAULT_INJECTION: forcing a failure. [ 1469.592563] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.634596] CPU: 1 PID: 14296 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #122 [ 1469.642014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1469.642022] Call Trace: [ 1469.642050] dump_stack+0x244/0x39d [ 1469.642072] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1469.642092] ? trace_hardirqs_on+0xbd/0x310 [ 1469.642111] ? iov_iter_get_pages+0x2fa/0x12a0 [ 1469.642135] should_fail.cold.4+0xa/0x17 [ 1469.642153] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1469.642167] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1469.642209] ? get_user_pages_fast+0x2a9/0x450 [ 1469.642233] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1469.642252] ? kasan_kmalloc+0xc7/0xe0 [ 1469.642267] ? sock_kmalloc+0x15a/0x1f0 [ 1469.642282] ? af_alg_get_rsgl+0x1d7/0x920 [ 1469.642299] ? zap_class+0x640/0x640 [ 1469.642317] ? __sys_recvmsg+0x11a/0x280 [ 1469.642338] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1469.642359] ? find_held_lock+0x36/0x1c0 [ 1469.642383] ? __lock_is_held+0xb5/0x140 [ 1469.642414] ? perf_trace_sched_process_exec+0x860/0x860 [ 1469.642444] __should_failslab+0x124/0x180 [ 1469.642464] should_failslab+0x9/0x14 [ 1469.642476] __kmalloc+0x2e0/0x760 [ 1469.642495] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1469.750705] ? iov_iter_advance+0x306/0x13f0 [ 1469.755113] ? sg_init_table+0x28/0x60 [ 1469.758998] ? sock_kmalloc+0x15a/0x1f0 [ 1469.762978] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1469.767996] sock_kmalloc+0x15a/0x1f0 [ 1469.771798] ? __sk_mem_schedule+0xe0/0xe0 [ 1469.776036] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1469.781056] af_alg_get_rsgl+0x1d7/0x920 [ 1469.785131] ? af_alg_make_sg+0x550/0x550 [ 1469.789303] ? af_alg_alloc_areq+0x1ec/0x280 [ 1469.793709] ? alg_accept+0x60/0x60 [ 1469.797340] ? kasan_check_write+0x14/0x20 [ 1469.801570] ? sock_kfree_s+0x47/0x60 [ 1469.805374] skcipher_recvmsg+0x3a2/0x1780 [ 1469.809618] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1469.814462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1469.820007] ? security_socket_recvmsg+0x9c/0xc0 [ 1469.824765] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1469.829612] sock_recvmsg+0xd0/0x110 [ 1469.833328] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1469.838347] ___sys_recvmsg+0x2b6/0x680 [ 1469.842327] ? ___sys_sendmsg+0x930/0x930 [ 1469.846476] ? lock_downgrade+0x900/0x900 [ 1469.850716] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1469.856261] ? proc_fail_nth_write+0x9e/0x210 [ 1469.860759] ? __fget_light+0x2e9/0x430 [ 1469.864732] ? fget_raw+0x20/0x20 [ 1469.868193] ? find_held_lock+0x36/0x1c0 [ 1469.872259] ? kasan_check_write+0x14/0x20 [ 1469.876497] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1469.881425] ? wait_for_completion+0x8a0/0x8a0 [ 1469.886011] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1469.891549] ? sockfd_lookup_light+0xc5/0x160 [ 1469.896046] __sys_recvmsg+0x11a/0x280 [ 1469.899939] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1469.904519] ? __sb_end_write+0xd9/0x110 [ 1469.908586] ? fput+0x130/0x1a0 [ 1469.911867] ? do_syscall_64+0x9a/0x820 [ 1469.915868] ? do_syscall_64+0x9a/0x820 [ 1469.919852] ? trace_hardirqs_off_caller+0x310/0x310 [ 1469.924963] __x64_sys_recvmsg+0x78/0xb0 [ 1469.929026] do_syscall_64+0x1b9/0x820 [ 1469.932912] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1469.938286] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1469.943214] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1469.948057] ? trace_hardirqs_on_caller+0x310/0x310 [ 1469.953087] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1469.958106] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1469.963122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1469.967985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1469.973190] RIP: 0033:0x457569 [ 1469.976387] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1469.995284] RSP: 002b:00007f1cece64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1470.002992] RAX: ffffffffffffffda RBX: 00007f1cece64c90 RCX: 0000000000457569 [ 1470.010259] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 [ 1470.017528] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1470.024795] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cece656d4 01:44:58 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:58 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1470.032059] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 [ 1470.049187] ldm_validate_partition_table(): Disk read failed. [ 1470.060048] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:44:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x5000000]}}]}]}, 0xac}}, 0x0) [ 1470.098567] Dev loop0: unable to read RDB block 0 01:44:59 executing program 1 (fault-call:7 fault-nth:8): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1470.145550] overlayfs: failed to resolve './file1': -2 [ 1470.180840] loop0: unable to read partition table [ 1470.196099] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1470.199625] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1470.221736] FAULT_INJECTION: forcing a failure. 01:44:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1100]}}]}]}, 0xac}}, 0x0) 01:44:59 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1470.221736] name failslab, interval 1, probability 0, space 0, times 0 [ 1470.239889] CPU: 1 PID: 14318 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #122 [ 1470.247313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.257051] Call Trace: [ 1470.259653] dump_stack+0x244/0x39d [ 1470.263290] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1470.268499] ? trace_hardirqs_on+0xbd/0x310 [ 1470.272825] ? iov_iter_get_pages+0x2fa/0x12a0 [ 1470.277413] should_fail.cold.4+0xa/0x17 [ 1470.281477] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1470.286587] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1470.291607] ? get_user_pages_fast+0x2a9/0x450 [ 1470.296201] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1470.300959] ? kasan_kmalloc+0xc7/0xe0 [ 1470.304858] ? sock_kmalloc+0x15a/0x1f0 [ 1470.308837] ? af_alg_get_rsgl+0x1d7/0x920 [ 1470.313071] ? zap_class+0x640/0x640 [ 1470.316783] ? __sys_recvmsg+0x11a/0x280 [ 1470.320873] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1470.325893] ? find_held_lock+0x36/0x1c0 [ 1470.329955] ? __lock_is_held+0xb5/0x140 [ 1470.334026] ? perf_trace_sched_process_exec+0x860/0x860 [ 1470.339485] __should_failslab+0x124/0x180 [ 1470.343733] should_failslab+0x9/0x14 [ 1470.347533] __kmalloc+0x2e0/0x760 [ 1470.351081] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1470.356142] ? iov_iter_advance+0x306/0x13f0 [ 1470.360547] ? sg_init_table+0x28/0x60 [ 1470.364446] ? sock_kmalloc+0x15a/0x1f0 [ 1470.368427] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1470.373454] sock_kmalloc+0x15a/0x1f0 [ 1470.377263] ? __sk_mem_schedule+0xe0/0xe0 [ 1470.381535] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1470.386566] af_alg_get_rsgl+0x1d7/0x920 [ 1470.390649] ? af_alg_make_sg+0x550/0x550 [ 1470.394926] ? af_alg_alloc_areq+0x1ec/0x280 [ 1470.399332] ? alg_accept+0x60/0x60 [ 1470.402961] ? kasan_check_write+0x14/0x20 [ 1470.407197] ? sock_kfree_s+0x47/0x60 [ 1470.411073] skcipher_recvmsg+0x3a2/0x1780 [ 1470.415330] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1470.420239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.425790] ? security_socket_recvmsg+0x9c/0xc0 [ 1470.430611] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1470.435462] sock_recvmsg+0xd0/0x110 [ 1470.439180] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1470.444197] ___sys_recvmsg+0x2b6/0x680 [ 1470.448173] ? ___sys_sendmsg+0x930/0x930 [ 1470.452321] ? lock_downgrade+0x900/0x900 [ 1470.456468] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1470.462014] ? proc_fail_nth_write+0x9e/0x210 [ 1470.466511] ? __fget_light+0x2e9/0x430 [ 1470.470486] ? fget_raw+0x20/0x20 [ 1470.473940] ? find_held_lock+0x36/0x1c0 [ 1470.478005] ? kasan_check_write+0x14/0x20 [ 1470.482241] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1470.487172] ? wait_for_completion+0x8a0/0x8a0 [ 1470.491762] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1470.497293] ? sockfd_lookup_light+0xc5/0x160 [ 1470.501786] __sys_recvmsg+0x11a/0x280 [ 1470.505674] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1470.510261] ? __sb_end_write+0xd9/0x110 [ 1470.514321] ? fput+0x130/0x1a0 [ 1470.517703] ? do_syscall_64+0x9a/0x820 [ 1470.521691] ? do_syscall_64+0x9a/0x820 [ 1470.525755] ? trace_hardirqs_off_caller+0x310/0x310 [ 1470.530860] __x64_sys_recvmsg+0x78/0xb0 [ 1470.534922] do_syscall_64+0x1b9/0x820 [ 1470.538810] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1470.544171] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1470.549113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1470.553968] ? trace_hardirqs_on_caller+0x310/0x310 [ 1470.558995] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1470.564012] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1470.569035] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1470.573881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1470.579063] RIP: 0033:0x457569 [ 1470.582273] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1470.601171] RSP: 002b:00007f1cece64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1470.608881] RAX: ffffffffffffffda RBX: 00007f1cece64c90 RCX: 0000000000457569 [ 1470.616149] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 [ 1470.623415] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 01:44:59 executing program 1 (fault-call:7 fault-nth:9): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:44:59 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x403000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) [ 1470.630680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cece656d4 [ 1470.637955] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 [ 1470.761818] FAULT_INJECTION: forcing a failure. [ 1470.761818] name failslab, interval 1, probability 0, space 0, times 0 [ 1470.787857] CPU: 1 PID: 14334 Comm: syz-executor1 Not tainted 4.20.0-rc3+ #122 [ 1470.795278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.804632] Call Trace: [ 1470.807216] dump_stack+0x244/0x39d [ 1470.810840] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1470.816030] should_fail.cold.4+0xa/0x17 [ 1470.820103] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1470.825199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.830737] ? check_preemption_disabled+0x48/0x280 [ 1470.835748] ? zap_class+0x640/0x640 [ 1470.839457] ? find_held_lock+0x36/0x1c0 [ 1470.843639] ? __lock_is_held+0xb5/0x140 [ 1470.847704] ? perf_trace_sched_process_exec+0x860/0x860 [ 1470.853141] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1470.858150] __should_failslab+0x124/0x180 [ 1470.862374] should_failslab+0x9/0x14 [ 1470.866161] __kmalloc+0x2e0/0x760 [ 1470.869702] ? af_alg_make_sg+0x550/0x550 [ 1470.873837] ? sock_kmalloc+0x15a/0x1f0 [ 1470.877810] sock_kmalloc+0x15a/0x1f0 [ 1470.881604] ? __sk_mem_schedule+0xe0/0xe0 [ 1470.885828] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1470.891352] ? af_alg_count_tsgl+0x1bc/0x250 [ 1470.895757] ? sock_kfree_s+0x47/0x60 [ 1470.899547] skcipher_recvmsg+0x505/0x1780 [ 1470.903779] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1470.908611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1470.914139] ? security_socket_recvmsg+0x9c/0xc0 [ 1470.918897] ? skcipher_sendmsg_nokey+0x140/0x140 [ 1470.923731] sock_recvmsg+0xd0/0x110 [ 1470.927431] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1470.932441] ___sys_recvmsg+0x2b6/0x680 [ 1470.936406] ? ___sys_sendmsg+0x930/0x930 [ 1470.940552] ? lock_downgrade+0x900/0x900 [ 1470.944690] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1470.950220] ? proc_fail_nth_write+0x9e/0x210 [ 1470.954704] ? __fget_light+0x2e9/0x430 [ 1470.958663] ? fget_raw+0x20/0x20 [ 1470.962100] ? find_held_lock+0x36/0x1c0 [ 1470.966154] ? kasan_check_write+0x14/0x20 [ 1470.970380] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1470.975299] ? wait_for_completion+0x8a0/0x8a0 [ 1470.979872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1470.985395] ? sockfd_lookup_light+0xc5/0x160 [ 1470.989879] __sys_recvmsg+0x11a/0x280 [ 1470.993760] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1470.998337] ? __sb_end_write+0xd9/0x110 [ 1471.002391] ? fput+0x130/0x1a0 [ 1471.005669] ? do_syscall_64+0x9a/0x820 [ 1471.009639] ? do_syscall_64+0x9a/0x820 [ 1471.013622] ? trace_hardirqs_off_caller+0x310/0x310 [ 1471.018737] __x64_sys_recvmsg+0x78/0xb0 [ 1471.022785] do_syscall_64+0x1b9/0x820 [ 1471.026658] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1471.032018] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1471.036940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1471.041774] ? trace_hardirqs_on_caller+0x310/0x310 [ 1471.046789] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1471.051804] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1471.056821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1471.061686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1471.066869] RIP: 0033:0x457569 [ 1471.070066] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1471.088964] RSP: 002b:00007f1cece64c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1471.096689] RAX: ffffffffffffffda RBX: 00007f1cece64c90 RCX: 0000000000457569 [ 1471.103950] RDX: 0000000000000000 RSI: 0000000020000800 RDI: 0000000000000005 01:45:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829636914e70bfeb59800f97c97644ab8a7"}) 01:45:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x900]}}]}]}, 0xac}}, 0x0) 01:45:00 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:00 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1471.111212] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1471.118477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cece656d4 [ 1471.125731] R13: 00000000004c399f R14: 00000000004d5f38 R15: 0000000000000006 01:45:00 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:00 executing program 1 (fault-call:7 fault-nth:10): r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x8]}}]}]}, 0xac}}, 0x0) [ 1471.255125] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1471.285978] ldm_validate_partition_table(): Disk read failed. [ 1471.307335] Dev loop0: unable to read RDB block 0 01:45:00 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:00 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1471.361831] loop0: unable to read partition table [ 1471.372912] overlayfs: filesystem on './file0' not supported as upperdir [ 1471.384374] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:00 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}]}]}, 0xac}}, 0x0) 01:45:00 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400804, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829572514e70bfeb59800f97c97644ab8a7"}) 01:45:00 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:00 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x200000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000]}}]}]}, 0xac}}, 0x0) 01:45:00 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:00 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1471.665271] print_req_error: 1150 callbacks suppressed [ 1471.665280] print_req_error: I/O error, dev loop0, sector 0 [ 1471.676397] buffer_io_error: 1150 callbacks suppressed [ 1471.676407] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:00 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000040000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x9effffff]}}]}]}, 0xac}}, 0x0) [ 1471.742479] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1471.769119] print_req_error: I/O error, dev loop0, sector 0 [ 1471.774934] Buffer I/O error on dev loop0, logical block 0, async page read [ 1471.802984] print_req_error: I/O error, dev loop0, sector 0 [ 1471.808814] Buffer I/O error on dev loop0, logical block 0, async page read [ 1471.832845] print_req_error: I/O error, dev loop0, sector 0 [ 1471.838695] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:00 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x2]}}]}]}, 0xac}}, 0x0) [ 1471.847965] print_req_error: I/O error, dev loop0, sector 0 [ 1471.853851] Buffer I/O error on dev loop0, logical block 0, async page read [ 1471.873003] print_req_error: I/O error, dev loop0, sector 0 [ 1471.878822] Buffer I/O error on dev loop0, logical block 0, async page read [ 1471.929589] print_req_error: I/O error, dev loop0, sector 0 [ 1471.935428] Buffer I/O error on dev loop0, logical block 0, async page read [ 1471.953704] print_req_error: I/O error, dev loop0, sector 0 [ 1471.959471] Buffer I/O error on dev loop0, logical block 0, async page read [ 1471.966667] ldm_validate_partition_table(): Disk read failed. 01:45:00 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x100000000000000f, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1471.981128] print_req_error: I/O error, dev loop0, sector 0 [ 1471.986977] Buffer I/O error on dev loop0, logical block 0, async page read [ 1471.996298] print_req_error: I/O error, dev loop0, sector 0 [ 1472.002082] Buffer I/O error on dev loop0, logical block 0, async page read [ 1472.013841] Dev loop0: unable to read RDB block 0 [ 1472.040730] overlayfs: failed to resolve './file1': -2 [ 1472.053387] loop0: unable to read partition table [ 1472.062559] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}}]}]}, 0xac}}, 0x0) 01:45:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829570a14e70bfeb59800f97c97644ab8a7"}) 01:45:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x403a00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:01 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x100000008dffffff, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x3000000000000]}}]}]}, 0xac}}, 0x0) 01:45:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}]}]}, 0xac}}, 0x0) [ 1472.327210] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:01 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000008000a0, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1472.447737] ldm_validate_partition_table(): Disk read failed. [ 1472.467144] overlayfs: filesystem on './file0' not supported as upperdir [ 1472.483250] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1472.497887] Dev loop0: unable to read RDB block 0 01:45:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x6]}}]}]}, 0xac}}, 0x0) 01:45:01 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1472.518441] loop0: unable to read partition table [ 1472.529834] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576935e70bfeb59800f97c97644ab8a7"}) 01:45:01 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x700000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0xa0ffff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}]}]}, 0xac}}, 0x0) 01:45:01 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x2000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1472.756465] ldm_validate_partition_table(): Disk read failed. [ 1472.802431] Dev loop0: unable to read RDB block 0 01:45:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0x7ffff000}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1472.834898] loop0: unable to read partition table 01:45:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x34c]}}]}]}, 0xac}}, 0x0) [ 1472.856156] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1472.857146] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:01 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000010, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1472.948292] overlayfs: failed to resolve './file1': -2 01:45:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}]}]}, 0xac}}, 0x0) 01:45:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576936e70bfeb59800f97c97644ab8a7"}) 01:45:01 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0x120001222}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000ffffff8d, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:01 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}}]}]}, 0xac}}, 0x0) 01:45:02 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1473.195834] ldm_validate_partition_table(): Disk read failed. [ 1473.228116] Dev loop0: unable to read RDB block 0 01:45:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x4, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}}]}]}, 0xac}}, 0x0) 01:45:02 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541"], 0x8) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:02 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x400000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1473.277255] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1473.283257] loop0: unable to read partition table [ 1473.299930] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1473.372626] overlayfs: failed to resolve './file1': -2 01:45:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x10, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576941e70bfeb59800f97c97644ab8a7"}) 01:45:02 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400007, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:02 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627da"], 0xc) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1200]}}]}]}, 0xac}}, 0x0) 01:45:02 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000008000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x1300]}}]}]}, 0xac}}, 0x0) 01:45:02 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a"], 0xe) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x2, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1473.656380] ldm_validate_partition_table(): Disk read failed. [ 1473.666585] Dev loop0: unable to read RDB block 0 [ 1473.683199] loop0: unable to read partition table [ 1473.691163] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1473.714450] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:02 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x100000000f000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1473.760066] overlayfs: failed to resolve './file1': -2 01:45:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0xa]}}]}]}, 0xac}}, 0x0) 01:45:02 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400300, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e712feb59800f97c97644ab8a7"}) 01:45:02 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x800000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:02 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58"], 0xf) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x8, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x10]}}]}]}, 0xac}}, 0x0) [ 1474.016610] ldm_validate_partition_table(): Disk read failed. [ 1474.040079] Dev loop0: unable to read RDB block 0 [ 1474.056801] loop0: unable to read partition table 01:45:02 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x500, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0ffffffff]}}]}]}, 0xac}}, 0x0) 01:45:02 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0xa00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:02 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1474.069175] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1474.102928] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:03 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0xc00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1474.237670] overlayfs: failed to resolve './file1': -2 01:45:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x13000000]}}]}]}, 0xac}}, 0x0) 01:45:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70cfeb59800f97c97644ab8a7"}) 01:45:03 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x402000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x2000, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:03 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:03 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}}]}]}, 0xac}}, 0x0) [ 1474.466587] ldm_validate_partition_table(): Disk read failed. [ 1474.486558] Dev loop0: unable to read RDB block 0 [ 1474.505250] loop0: unable to read partition table [ 1474.523375] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}]}]}, 0xac}}, 0x0) 01:45:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x9}, 0x0) 01:45:03 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40010e, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:03 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:03 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x2000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}]}]}, 0xac}}, 0x0) 01:45:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e735feb59800f97c97644ab8a7"}) 01:45:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0xe}, 0x0) 01:45:03 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x40fc030000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1474.879662] overlayfs: failed to resolve './file1': -2 01:45:03 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9e]}}]}]}, 0xac}}, 0x0) 01:45:03 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x2}, 0x0) [ 1474.966796] ldm_validate_partition_table(): Disk read failed. [ 1474.984197] Dev loop0: unable to read RDB block 0 [ 1475.011467] loop0: unable to read partition table [ 1475.021999] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:03 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:03 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x900000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}]}]}, 0xac}}, 0x0) 01:45:04 executing program 0: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40003a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e736feb59800f97c97644ab8a7"}) 01:45:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0xa}, 0x0) 01:45:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff00000000]}}]}]}, 0xac}}, 0x0) 01:45:04 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x300000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1475.242506] __ntfs_error: 5 callbacks suppressed [ 1475.242516] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}]}]}, 0xac}}, 0x0) [ 1475.309740] overlayfs: failed to resolve './file1': -2 [ 1475.327967] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0xd}, 0x0) 01:45:04 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x600000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:04 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) [ 1475.455601] overlayfs: failed to resolve './file1': -2 [ 1475.461693] ldm_validate_partition_table(): Disk read failed. [ 1475.524907] Dev loop0: unable to read RDB block 0 01:45:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}]}]}, 0xac}}, 0x0) [ 1475.565187] loop0: unable to read partition table [ 1475.571196] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1475.589934] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:04 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0xe00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x4}, 0x0) 01:45:04 executing program 0: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40003a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c030000]}}]}]}, 0xac}}, 0x0) 01:45:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e741feb59800f97c97644ab8a7"}) [ 1475.759070] overlayfs: failed to resolve './file1': -2 01:45:04 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0xb00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:04 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x600000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}]}]}, 0xac}}, 0x0) 01:45:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0xb}, 0x0) [ 1475.923250] overlayfs: failed to resolve './file1': -2 [ 1475.930642] ldm_validate_partition_table(): Disk read failed. [ 1475.972260] Dev loop0: unable to read RDB block 0 [ 1476.005223] loop0: unable to read partition table 01:45:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}}]}]}, 0xac}}, 0x0) 01:45:04 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0xd00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:04 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x20000710}, 0x0) [ 1476.029291] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1476.040460] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:05 executing program 0: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40003a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1200]}}]}]}, 0xac}}, 0x0) 01:45:05 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000a0010000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0xf}, 0x0) 01:45:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb57c00f97c97644ab8a7"}) 01:45:05 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400009, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0xc}, 0x0) 01:45:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}]}]}, 0xac}}, 0x0) 01:45:05 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000fffffdef, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1476.407255] ldm_validate_partition_table(): Disk read failed. [ 1476.438627] Dev loop0: unable to read RDB block 0 [ 1476.452008] overlayfs: failed to resolve './file1': -2 [ 1476.472931] loop0: unable to read partition table [ 1476.480646] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1476.500105] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1300000000000000]}}]}]}, 0xac}}, 0x0) [ 1476.571328] overlayfs: failed to resolve './file1': -2 [ 1476.587012] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="4aff618a34", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f00000024c0)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRESOCT]], 0x8) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 01:45:05 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000008, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb598fcf97c97644ab8a7"}) 01:45:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x6}, 0x0) 01:45:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa0010000]}}]}]}, 0xac}}, 0x0) 01:45:05 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x80ffff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0]}}]}]}, 0xac}}, 0x0) 01:45:05 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000f0ffffff, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1476.916483] print_req_error: 1102 callbacks suppressed [ 1476.916493] print_req_error: I/O error, dev loop0, sector 0 [ 1476.927697] buffer_io_error: 1102 callbacks suppressed [ 1476.927706] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x5}, 0x0) 01:45:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}}]}]}, 0xac}}, 0x0) [ 1476.958539] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1477.017644] print_req_error: I/O error, dev loop0, sector 0 [ 1477.023471] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:05 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000effdffff, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1477.058982] print_req_error: I/O error, dev loop0, sector 0 [ 1477.064857] Buffer I/O error on dev loop0, logical block 0, async page read [ 1477.089082] print_req_error: I/O error, dev loop0, sector 0 [ 1477.094934] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:05 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x7}, 0x0) [ 1477.119460] print_req_error: I/O error, dev loop0, sector 0 [ 1477.125327] Buffer I/O error on dev loop0, logical block 0, async page read [ 1477.126165] overlayfs: failed to resolve './file1': -2 [ 1477.148204] print_req_error: I/O error, dev loop0, sector 0 [ 1477.154027] Buffer I/O error on dev loop0, logical block 0, async page read [ 1477.197369] print_req_error: I/O error, dev loop0, sector 0 [ 1477.203176] Buffer I/O error on dev loop0, logical block 0, async page read [ 1477.230033] print_req_error: I/O error, dev loop0, sector 0 [ 1477.235875] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}]}]}, 0xac}}, 0x0) 01:45:06 executing program 0: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) gettid() getpid() mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r3 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f0000000380)={0x0, 0x8001, 0x4, 0x2, &(0x7f0000fff000/0x1000)=nil, 0x100000001}) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) [ 1477.248361] ldm_validate_partition_table(): Disk read failed. [ 1477.260724] print_req_error: I/O error, dev loop0, sector 0 [ 1477.266567] Buffer I/O error on dev loop0, logical block 0, async page read [ 1477.274628] print_req_error: I/O error, dev loop0, sector 0 [ 1477.280395] Buffer I/O error on dev loop0, logical block 0, async page read [ 1477.289125] Dev loop0: unable to read RDB block 0 [ 1477.306233] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1477.319933] loop0: unable to read partition table [ 1477.336537] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59804f97c97644ab8a7"}) 01:45:06 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000f00, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:06 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x8}, 0x0) 01:45:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff0]}}]}]}, 0xac}}, 0x0) 01:45:06 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0xc0ffff, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) [ 1477.564557] overlayfs: failed to resolve './file1': -2 01:45:06 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0xf00000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:06 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x3}, 0x0) 01:45:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}]}]}, 0xac}}, 0x0) [ 1477.697571] ldm_validate_partition_table(): Disk read failed. [ 1477.744599] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1477.753333] Dev loop0: unable to read RDB block 0 [ 1477.781577] loop0: unable to read partition table 01:45:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}]}]}, 0xac}}, 0x0) [ 1477.814768] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}]}]}, 0xac}}, 0x0) 01:45:06 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x10}, 0x0) [ 1478.269102] overlayfs: failed to resolve './file0': -2 01:45:07 executing program 0: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x40096102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() getrusage(0x0, &(0x7f0000000400)) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000540)=ANY=[@ANYRESHEX]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='reno\x00', 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) gettid() getpid() mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r3 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f0000000380)={0x0, 0x8001, 0x4, 0x2, &(0x7f0000fff000/0x1000)=nil, 0x100000001}) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) 01:45:07 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1007002000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:07 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x800000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59806f97c97644ab8a7"}) 01:45:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xf00000000000000}, 0x0) 01:45:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}]}]}, 0xac}}, 0x0) 01:45:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}]}]}, 0xac}}, 0x0) 01:45:07 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x500000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:07 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x1000000000000000}, 0x0) [ 1478.701790] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1478.734790] ldm_validate_partition_table(): Disk read failed. [ 1478.774413] Dev loop0: unable to read RDB block 0 [ 1478.792202] loop0: unable to read partition table [ 1478.811893] overlayfs: failed to resolve './file1': -2 [ 1478.828027] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}}]}]}, 0xac}}, 0x0) 01:45:07 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400003, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:07 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000a0008000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1479.126015] overlayfs: failed to resolve './file1': -2 [ 1479.145768] overlayfs: failed to resolve './file1': -2 01:45:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000180)={'sy.', 0x1}, &(0x7f00000002c0)='syz', 0xffffffffffffffff) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000000)={0x16, 0x6f, 0x2, {0x1, [{0x0, 0x0, 0x7}]}}, 0x16) 01:45:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x8000a0ffffffff}, 0x0) 01:45:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb5986cf97c97644ab8a7"}) 01:45:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}}]}]}, 0xac}}, 0x0) 01:45:08 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x100000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:08 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400030, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}]}]}, 0xac}}, 0x0) 01:45:08 executing program 0: socketpair$inet6(0xa, 0x0, 0x200, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000001000)=""/4096, &(0x7f00000002c0)=0x1000) io_submit(0x0, 0x1, &(0x7f0000000fc0)=[&(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, 0x0, 0x1}]) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) getuid() r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x1f00, 0x0, 0x0, 0x6, 0x3f00000000000000]}}) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000200)) shutdown(0xffffffffffffffff, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@remote, @empty, @dev={0xfe, 0x80, [], 0x21}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0xffffffff80000801) socket$inet6(0xa, 0x807, 0x40) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)="0adc") openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) [ 1479.398465] cgroup: fork rejected by pids controller in /syz0 [ 1479.406903] ldm_validate_partition_table(): Disk read failed. [ 1479.437602] Dev loop0: unable to read RDB block 0 01:45:08 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000fffffff0, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xfffffdef}, 0x0) [ 1479.450201] loop0: unable to read partition table [ 1479.456265] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x34c]}}]}]}, 0xac}}, 0x0) 01:45:08 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40002c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:08 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x10000000000001a0, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xfffffff0}, 0x0) 01:45:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb5987af97c97644ab8a7"}) 01:45:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff00000000]}}]}]}, 0xac}}, 0x0) 01:45:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}}]}]}, 0xac}}, 0x0) [ 1479.846926] ldm_validate_partition_table(): Disk read failed. [ 1479.855926] Dev loop0: unable to read RDB block 0 [ 1479.866723] overlayfs: failed to resolve './file1': -2 [ 1479.877717] loop0: unable to read partition table 01:45:08 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000010000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:08 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x7ffffffff000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:08 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) ftruncate(r0, 0x8000) write(r0, &(0x7f0000000040)="06", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 01:45:08 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xeffdffff00000000}, 0x0) [ 1479.914396] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}]}]}, 0xac}}, 0x0) 01:45:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59803f97c97644ab8a7"}) 01:45:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}]}]}, 0xac}}, 0x0) 01:45:09 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:09 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xa0010000}, 0x0) 01:45:09 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x200000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) [ 1480.252552] ldm_validate_partition_table(): Disk read failed. [ 1480.277173] Dev loop0: unable to read RDB block 0 [ 1480.304716] loop0: unable to read partition table 01:45:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1300]}}]}]}, 0xac}}, 0x0) [ 1480.329055] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:09 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xffffff8d}, 0x0) 01:45:09 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}]}]}, 0xac}}, 0x0) [ 1480.525032] __ntfs_error: 5 callbacks suppressed [ 1480.525044] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:09 executing program 0: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000700)={&(0x7f00000001c0), 0xc, &(0x7f00000006c0)={&(0x7f0000000600)=@ipv4_delroute={0x1c, 0x19, 0x1}, 0x1c}}, 0x0) 01:45:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59868f97c97644ab8a7"}) 01:45:09 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x8dffffff00000000}, 0x0) 01:45:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c03000000000000]}}]}]}, 0xac}}, 0x0) 01:45:09 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:09 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400b00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x30000]}}]}]}, 0xac}}, 0x0) 01:45:09 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x800000000000000}, 0x0) [ 1480.982672] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) write$P9_RSETATTR(r1, &(0x7f0000000080)={0x7}, 0x2e9b) creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f00000001c0)={0x0, 0x0, 0x1000200000000}) write$binfmt_script(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYRESHEX, @ANYRESOCT, @ANYRESOCT], 0xfefd) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)) 01:45:09 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1481.031436] ldm_validate_partition_table(): Disk read failed. [ 1481.067010] overlayfs: failed to resolve './file1': -2 [ 1481.073735] Dev loop0: unable to read RDB block 0 [ 1481.113411] loop0: unable to read partition table [ 1481.120016] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x1a0}, 0x0) 01:45:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}}]}]}, 0xac}}, 0x0) 01:45:10 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x402c00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59823f97c97644ab8a7"}) 01:45:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xeffdffff}, 0x0) 01:45:10 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}]}]}, 0xac}}, 0x0) [ 1481.386919] overlayfs: failed to resolve './file1': -2 01:45:10 executing program 0: [ 1481.444541] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1481.458702] ldm_validate_partition_table(): Disk read failed. 01:45:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff]}}]}]}, 0xac}}, 0x0) [ 1481.487066] Dev loop0: unable to read RDB block 0 01:45:10 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x8000000}, 0x0) [ 1481.508917] overlayfs: failed to resolve './file1': -2 [ 1481.511424] loop0: unable to read partition table [ 1481.538157] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:10 executing program 0: 01:45:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59809f97c97644ab8a7"}) 01:45:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000000000]}}]}]}, 0xac}}, 0x0) 01:45:10 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400700, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xf00}, 0x0) 01:45:10 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}]}]}, 0xac}}, 0x0) 01:45:10 executing program 0: [ 1481.906316] ldm_validate_partition_table(): Disk read failed. [ 1481.935728] print_req_error: 630 callbacks suppressed [ 1481.935739] print_req_error: I/O error, dev loop0, sector 0 [ 1481.946820] buffer_io_error: 630 callbacks suppressed 01:45:10 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xf}, 0x0) [ 1481.946834] Buffer I/O error on dev loop0, logical block 0, async page read [ 1481.982575] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}}]}]}, 0xac}}, 0x0) 01:45:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x8}, 0x0) [ 1482.034215] print_req_error: I/O error, dev loop0, sector 0 [ 1482.040079] Buffer I/O error on dev loop0, logical block 0, async page read [ 1482.069914] print_req_error: I/O error, dev loop0, sector 0 [ 1482.075765] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}}]}]}, 0xac}}, 0x0) [ 1482.118825] print_req_error: I/O error, dev loop0, sector 0 [ 1482.124683] Buffer I/O error on dev loop0, logical block 0, async page read [ 1482.133841] Dev loop0: unable to read RDB block 0 [ 1482.164199] print_req_error: I/O error, dev loop0, sector 0 [ 1482.170037] Buffer I/O error on dev loop0, logical block 0, async page read [ 1482.196776] overlayfs: filesystem on './file0' not supported as upperdir [ 1482.208469] print_req_error: I/O error, dev loop0, sector 0 [ 1482.214301] Buffer I/O error on dev loop0, logical block 0, async page read [ 1482.231277] print_req_error: I/O error, dev loop0, sector 0 [ 1482.237116] Buffer I/O error on dev loop0, logical block 0, async page read [ 1482.251380] print_req_error: I/O error, dev loop0, sector 0 [ 1482.257650] Buffer I/O error on dev loop0, logical block 0, async page read [ 1482.265051] loop0: unable to read partition table [ 1482.270247] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1482.290011] print_req_error: I/O error, dev loop0, sector 0 [ 1482.295845] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x40000000000}, 0x0) 01:45:11 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:11 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x405c00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}]}]}, 0xac}}, 0x0) 01:45:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb5984cf97c97644ab8a7"}) 01:45:11 executing program 0: [ 1482.365892] print_req_error: I/O error, dev loop0, sector 0 [ 1482.371714] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}]}]}, 0xac}}, 0x0) 01:45:11 executing program 0: 01:45:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xf0ffffff}, 0x0) [ 1482.521741] overlayfs: failed to resolve './file1': -2 [ 1482.537357] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1482.551724] ldm_validate_partition_table(): Disk read failed. 01:45:11 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1482.584342] Dev loop0: unable to read RDB block 0 [ 1482.603319] loop0: unable to read partition table 01:45:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}]}]}, 0xac}}, 0x0) [ 1482.625170] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1482.638833] overlayfs: failed to resolve './file1': -2 [ 1482.658814] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:11 executing program 0: 01:45:11 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x8000a0}, 0x0) 01:45:11 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40000c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}]}]}, 0xac}}, 0x0) 01:45:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59805f97c97644ab8a7"}) 01:45:11 executing program 0: 01:45:11 executing program 0: 01:45:11 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xffffffffa0008000}, 0x0) 01:45:11 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}}]}]}, 0xac}}, 0x0) [ 1482.966679] ldm_validate_partition_table(): Disk read failed. [ 1482.996988] Dev loop0: unable to read RDB block 0 [ 1483.025114] loop0: unable to read partition table [ 1483.041293] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1483.049104] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}]}]}, 0xac}}, 0x0) [ 1483.120271] overlayfs: failed to resolve './file1': -2 01:45:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x40000}, 0x0) 01:45:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59874f97c97644ab8a7"}) 01:45:12 executing program 0: 01:45:12 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x401300, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:12 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}}]}]}, 0xac}}, 0x0) 01:45:12 executing program 0: 01:45:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xf000000}, 0x0) [ 1483.380425] ldm_validate_partition_table(): Disk read failed. [ 1483.431989] Dev loop0: unable to read RDB block 0 [ 1483.463748] loop0: unable to read partition table 01:45:12 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x8dffffff}, 0x0) 01:45:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}}]}]}, 0xac}}, 0x0) [ 1483.488235] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1483.497170] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:12 executing program 0: [ 1483.622249] overlayfs: failed to resolve './file1': -2 01:45:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000]}}]}]}, 0xac}}, 0x0) 01:45:12 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59807f97c97644ab8a7"}) [ 1483.678039] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xffffffffa0010000}, 0x0) 01:45:12 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}]}]}, 0xac}}, 0x0) 01:45:12 executing program 0: 01:45:12 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400900, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) [ 1483.888221] ldm_validate_partition_table(): Disk read failed. [ 1483.904905] Dev loop0: unable to read RDB block 0 01:45:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x2000000000000000}, 0x0) 01:45:12 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1483.937077] loop0: unable to read partition table [ 1483.953509] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}}]}]}, 0xac}}, 0x0) [ 1484.018872] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:12 executing program 0: 01:45:13 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59860f97c97644ab8a7"}) 01:45:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xa0008000}, 0x0) 01:45:13 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:13 executing program 0: 01:45:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x10000000}, 0x0) [ 1484.397309] ldm_validate_partition_table(): Disk read failed. [ 1484.412355] Dev loop0: unable to read RDB block 0 [ 1484.419085] loop0: unable to read partition table [ 1484.424857] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:13 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}}]}]}, 0xac}}, 0x0) 01:45:13 executing program 0: [ 1484.519701] overlayfs: filesystem on './file0' not supported as upperdir 01:45:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb5980af97c97644ab8a7"}) 01:45:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}}]}]}, 0xac}}, 0x0) 01:45:13 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400013, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:13 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x2000}, 0x0) 01:45:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}]}]}, 0xac}}, 0x0) 01:45:13 executing program 0: [ 1484.806627] ldm_validate_partition_table(): Disk read failed. 01:45:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0xf0ffffff00000000}, 0x0) 01:45:13 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}}]}]}, 0xac}}, 0x0) [ 1484.862968] Dev loop0: unable to read RDB block 0 [ 1484.875364] overlayfs: failed to resolve './file1': -2 [ 1484.924126] loop0: unable to read partition table [ 1484.929476] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:13 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x402200, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:13 executing program 0: 01:45:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59802f97c97644ab8a7"}) 01:45:13 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x1a0ffffffff}, 0x0) 01:45:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}]}]}, 0xac}}, 0x0) 01:45:13 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:14 executing program 0: 01:45:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x20000000}, 0x0) [ 1485.219500] overlayfs: filesystem on './file0' not supported as upperdir [ 1485.235978] ldm_validate_partition_table(): Disk read failed. 01:45:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}]}]}, 0xac}}, 0x0) [ 1485.294179] Dev loop0: unable to read RDB block 0 01:45:14 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40000b, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) [ 1485.347343] loop0: unable to read partition table [ 1485.353340] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:14 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}}]}]}, 0xac}}, 0x0) 01:45:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:14 executing program 0: 01:45:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59848f97c97644ab8a7"}) 01:45:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}]}]}, 0xac}}, 0x0) [ 1485.563105] overlayfs: failed to resolve './file1': -2 01:45:14 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:14 executing program 0: 01:45:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:14 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400408, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) [ 1485.760907] ldm_validate_partition_table(): Disk read failed. [ 1485.791792] Dev loop0: unable to read RDB block 0 01:45:14 executing program 0: 01:45:14 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}]}]}, 0xac}}, 0x0) 01:45:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) [ 1485.817080] loop0: unable to read partition table [ 1485.824240] __ntfs_error: 6 callbacks suppressed [ 1485.824251] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1485.825005] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f98c97644ab8a7"}) [ 1485.942866] overlayfs: failed to resolve './file1': -2 01:45:14 executing program 0: [ 1485.983076] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}}]}]}, 0xac}}, 0x0) 01:45:14 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:14 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:14 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x408004, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:14 executing program 0: 01:45:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f99897644ab8a7"}) 01:45:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}]}]}, 0xac}}, 0x0) 01:45:15 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:15 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:15 executing program 0: 01:45:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000]}}]}]}, 0xac}}, 0x0) [ 1486.356703] ldm_validate_partition_table(): Disk read failed. [ 1486.366231] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1486.396055] Dev loop0: unable to read RDB block 0 [ 1486.425486] loop0: unable to read partition table [ 1486.430736] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) [ 1486.452810] overlayfs: failed to resolve './file1': -2 01:45:15 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:15 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f91897644ab8a7"}) 01:45:15 executing program 0: sysfs$1(0x1, &(0x7f0000000080)) socket$kcm(0x29, 0xa, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000140), 0x0) socket$kcm(0x29, 0x5, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x14) openat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)={@local}, &(0x7f00000005c0)=0x14) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) getsockname$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000480)=0x10) clock_gettime(0x800000009, &(0x7f0000000340)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:45:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}}]}]}, 0xac}}, 0x0) 01:45:15 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40005c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:15 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}}]}]}, 0xac}}, 0x0) [ 1486.742624] ldm_validate_partition_table(): Disk read failed. [ 1486.774798] Dev loop0: unable to read RDB block 0 [ 1486.788095] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1486.801635] loop0: unable to read partition table [ 1486.846656] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:15 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1486.887840] overlayfs: failed to resolve './file1': -2 [ 1486.946319] print_req_error: 965 callbacks suppressed [ 1486.946330] print_req_error: I/O error, dev loop0, sector 0 [ 1486.957380] buffer_io_error: 964 callbacks suppressed [ 1486.957391] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:15 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) 01:45:15 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}]}]}, 0xac}}, 0x0) [ 1486.994862] print_req_error: I/O error, dev loop0, sector 0 [ 1487.000664] Buffer I/O error on dev loop0, logical block 0, async page read [ 1487.015019] print_req_error: I/O error, dev loop0, sector 0 [ 1487.020790] Buffer I/O error on dev loop0, logical block 0, async page read [ 1487.030038] print_req_error: I/O error, dev loop0, sector 0 [ 1487.035829] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:15 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f95097644ab8a7"}) 01:45:15 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:15 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400004, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) [ 1487.053773] print_req_error: I/O error, dev loop0, sector 0 [ 1487.059534] Buffer I/O error on dev loop0, logical block 0, async page read [ 1487.069784] print_req_error: I/O error, dev loop0, sector 0 [ 1487.075579] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:16 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1487.113860] print_req_error: I/O error, dev loop0, sector 0 [ 1487.119650] Buffer I/O error on dev loop0, logical block 0, async page read [ 1487.131981] audit: type=1800 audit(1542764715.990:171): pid=15935 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17799 res=0 01:45:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) sendmmsg(r1, &(0x7f0000002b40), 0x0, 0x4000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000280)={0x8, 0x0, 0x800000, 0x0, 0x3ff}) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=@routing, 0x8) 01:45:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}]}]}, 0xac}}, 0x0) 01:45:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) [ 1487.188885] print_req_error: I/O error, dev loop0, sector 0 [ 1487.194707] Buffer I/O error on dev loop0, logical block 0, async page read [ 1487.291002] print_req_error: I/O error, dev loop0, sector 0 [ 1487.296851] Buffer I/O error on dev loop0, logical block 0, async page read 01:45:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97754ab8a7"}) [ 1487.338896] print_req_error: I/O error, dev loop0, sector 0 [ 1487.344772] Buffer I/O error on dev loop0, logical block 0, async page read [ 1487.356123] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:16 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0x7ffff000}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c03]}}]}]}, 0xac}}, 0x0) 01:45:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) sendmmsg(r1, &(0x7f0000002b40), 0x0, 0x4000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000001c0)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000280)={0x8, 0x0, 0x800000, 0x0, 0x3ff}) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=@routing, 0x8) 01:45:16 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0x120001222}], 0x1, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:16 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97704ab8a7"}) 01:45:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}]}]}, 0xac}}, 0x0) 01:45:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:16 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x10, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1487.810488] ldm_validate_partition_table(): Disk read failed. 01:45:16 executing program 0: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000200)) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e00c462913878fe3e0f1110c442019dccd3196f") execve(&(0x7f0000000740)="e91f7189591e9233614b00", &(0x7f00000005c0), &(0x7f0000000700)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000380)="e91f7189591e9233614b00", 0x40) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x200001e4) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f00000001c0)={{0x0, @multicast1, 0x0, 0x0, 'sh\x00'}}, 0x44) creat(&(0x7f0000000180)="e91f7189591e9233614b00", 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) [ 1487.855928] Dev loop0: unable to read RDB block 0 [ 1487.872070] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1487.880479] loop0: unable to read partition table [ 1487.890420] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:16 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}]}]}, 0xac}}, 0x0) [ 1487.993593] overlayfs: failed to resolve './file1': -2 01:45:16 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x2, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97584ab8a7"}) 01:45:16 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:17 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400d00, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9effffff]}}]}]}, 0xac}}, 0x0) 01:45:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000540)={&(0x7f0000000500)=[0x0], 0x1, 0x0, 0x7fffffff, 0xe85, 0x9, 0xffffffffffffff80, {0x80, 0x0, 0x5, 0x0, 0x5, 0x0, 0x1, 0x18, 0x0, 0x1fd3a74d, 0x9, 0x8, 0x0, 0x0, "f4b04567a8bd086a9431b7db53bbf2f5ab4815770d0643115500ff88afd1accd"}}) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000004c0)={0x0, 0x0, 0x3, 0x3, 0x1, 0x9, 0x6, 0x7fffffff, 0x4}) modify_ldt$read_default(0x2, &(0x7f0000000400)=""/184, 0xb8) umount2(&(0x7f0000000180)='./file0\x00', 0x600000000000000) lchown(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000140), &(0x7f00000001c0)=0x4) 01:45:17 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x8, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1488.246371] ldm_validate_partition_table(): Disk read failed. [ 1488.265055] Dev loop0: unable to read RDB block 0 [ 1488.280383] loop0: unable to read partition table 01:45:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) [ 1488.299362] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 01:45:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x12]}}]}]}, 0xac}}, 0x0) [ 1488.345356] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 01:45:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c972d4ab8a7"}) 01:45:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}}]}]}, 0xac}}, 0x0) 01:45:17 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x4, &(0x7f00000007c0)=""/16, 0x10}, 0x0) [ 1488.476059] overlayfs: failed to resolve './file1': -2 01:45:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) 01:45:17 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') getpid() mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x400500, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_opaque(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='trusted.overlay.opaque\x00', &(0x7f0000000580)='y\x00', 0x2, 0x0) 01:45:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000040), 0xc, &(0x7f0000000480)={&(0x7f0000000800)=@migrate={0xac, 0x21, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in=@dev}}, [@migrate={0x5c, 0x11, [{@in=@rand_addr, @in6=@dev}, {@in6=@local, @in6=@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}}]}]}, 0xac}}, 0x0) 01:45:17 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a5824"], 0x10) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x500, &(0x7f00000007c0)=""/16, 0x10}, 0x0) 01:45:17 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="090049123b63c541e04627daf64a58242a02655abcbffe4e02bfd52f5d5d1eba"], 0x20) recvmsg(r2, &(0x7f0000000800)={0x0, 0x1000000000000000, &(0x7f0000000700)=[{&(0x7f00000013c0)=""/4096, 0xfffffe62}], 0x1, &(0x7f00000007c0)=""/16, 0x10, 0x0}, 0x0) [ 1488.758548] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 1488.879246] overlayfs: filesystem on './file0' not supported as upperdir [ 1645.463901] INFO: task syz-executor3:16080 blocked for more than 140 seconds. [ 1645.471236] Not tainted 4.20.0-rc3+ #122 [ 1645.477425] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1645.485453] syz-executor3 D23144 16080 6219 0x00000004 [ 1645.491328] Call Trace: [ 1645.493984] __schedule+0x8cf/0x21d0 [ 1645.497898] ? __sched_text_start+0x8/0x8 [ 1645.502062] ? zap_class+0x640/0x640 [ 1645.505826] ? print_usage_bug+0xc0/0xc0 [ 1645.510081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.515688] schedule+0xfe/0x460 [ 1645.519253] ? __schedule+0x21d0/0x21d0 [ 1645.523233] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1645.527881] ? trace_hardirqs_on+0xbd/0x310 [ 1645.532512] ? kasan_check_read+0x11/0x20 [ 1645.536715] ? rwsem_down_read_failed+0x342/0x710 [ 1645.541843] ? trace_hardirqs_off_caller+0x310/0x310 [ 1645.547764] ? debug_smp_processor_id+0x1c/0x20 [ 1645.552461] rwsem_down_read_failed+0x371/0x710 [ 1645.557196] ? rwsem_down_write_failed_killable+0x10/0x10 [ 1645.562927] ? zap_class+0x640/0x640 [ 1645.566701] ? __lock_is_held+0xb5/0x140 [ 1645.570943] ? lock_acquire+0x1ed/0x520 [ 1645.574975] ? __get_super.part.11+0x207/0x2e0 [ 1645.579734] ? perf_trace_sched_process_exec+0x860/0x860 [ 1645.585235] ? __get_super.part.11+0x107/0x2e0 [ 1645.589994] call_rwsem_down_read_failed+0x18/0x30 [ 1645.594982] down_read+0x9b/0x120 [ 1645.598606] ? __get_super.part.11+0x207/0x2e0 [ 1645.603194] ? __down_interruptible+0x700/0x700 [ 1645.608962] ? rwlock_bug.part.2+0x90/0x90 [ 1645.613218] __get_super.part.11+0x207/0x2e0 [ 1645.617675] get_super+0x2d/0x50 [ 1645.621223] fsync_bdev+0x17/0xc0 [ 1645.624733] invalidate_partition+0x35/0x60 [ 1645.629241] drop_partitions.isra.14+0xe1/0x200 [ 1645.633967] ? delete_partition+0x2c0/0x2c0 [ 1645.638562] ? trace_hardirqs_on+0xbd/0x310 [ 1645.642890] ? kasan_check_read+0x11/0x20 [ 1645.647089] ? __wake_up_common_lock+0x1d0/0x330 [ 1645.652029] rescan_partitions+0x72/0x8e0 [ 1645.656756] __blkdev_reread_part+0x1ad/0x230 [ 1645.661267] blkdev_reread_part+0x26/0x40 [ 1645.665710] loop_reread_partitions+0x163/0x190 [ 1645.670384] ? __loop_update_dio+0x6b0/0x6b0 [ 1645.675097] loop_set_status+0xb95/0x1010 [ 1645.679267] loop_set_status64+0xaa/0x100 [ 1645.683418] ? loop_set_status_old+0x920/0x920 [ 1645.688348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.694175] ? ns_capable_common+0x13f/0x170 [ 1645.698595] lo_ioctl+0x90e/0x1d60 [ 1645.702158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.708008] ? avc_has_extended_perms+0xab2/0x15a0 [ 1645.712950] ? lo_rw_aio+0x1ef0/0x1ef0 [ 1645.717145] blkdev_ioctl+0x98e/0x21b0 [ 1645.721046] ? blkpg_ioctl+0xc10/0xc10 [ 1645.725772] ? avc_ss_reset+0x190/0x190 [ 1645.729769] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1645.735887] ? kasan_check_read+0x11/0x20 [ 1645.740042] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1645.745609] ? rcu_softirq_qs+0x20/0x20 [ 1645.749615] ? perf_trace_sched_process_exec+0x860/0x860 [ 1645.755480] ? __might_fault+0x12b/0x1e0 [ 1645.759551] ? lock_downgrade+0x900/0x900 [ 1645.763987] block_ioctl+0xee/0x130 [ 1645.767617] ? blkdev_fallocate+0x400/0x400 [ 1645.771946] do_vfs_ioctl+0x1de/0x1790 [ 1645.776267] ? ioctl_preallocate+0x300/0x300 [ 1645.780687] ? selinux_file_mprotect+0x620/0x620 [ 1645.785749] ? rht_deferred_worker+0x1174/0x1de0 [ 1645.790516] ? __sanitizer_cov_trace_const_cmp4+0xb/0x20 [ 1645.796347] ? put_timespec64+0x10f/0x1b0 [ 1645.800504] ? nsecs_to_jiffies+0x30/0x30 [ 1645.804958] ? do_syscall_64+0x9a/0x820 [ 1645.808948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.815003] ? security_file_ioctl+0x94/0xc0 [ 1645.819425] ksys_ioctl+0xa9/0xd0 [ 1645.822888] __x64_sys_ioctl+0x73/0xb0 [ 1645.827101] do_syscall_64+0x1b9/0x820 [ 1645.831007] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1645.836668] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1645.841609] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1645.846745] ? trace_hardirqs_on_caller+0x310/0x310 [ 1645.851770] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1645.857067] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1645.862095] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1645.868251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1645.873450] RIP: 0033:0x457569 [ 1645.876944] Code: Bad RIP value. [ 1645.880307] RSP: 002b:00007f4337c61c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1645.888311] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1645.895849] RDX: 0000000020000380 RSI: 0000000000004c04 RDI: 0000000000000003 [ 1645.903142] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1645.910707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4337c626d4 [ 1645.918260] R13: 00000000004c07a8 R14: 00000000004d1288 R15: 00000000ffffffff [ 1645.925819] INFO: task syz-executor3:16119 blocked for more than 140 seconds. [ 1645.933092] Not tainted 4.20.0-rc3+ #122 [ 1645.937936] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1645.946147] syz-executor3 D24320 16119 6219 0x00000004 [ 1645.951790] Call Trace: [ 1645.954675] __schedule+0x8cf/0x21d0 [ 1645.958402] ? perf_trace_lock+0x14d/0x7a0 [ 1645.962646] ? __sched_text_start+0x8/0x8 [ 1645.967118] ? zap_class+0x640/0x640 [ 1645.970842] ? zap_class+0x640/0x640 [ 1645.974854] ? __lock_acquire+0x62f/0x4c20 [ 1645.979099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1645.984935] ? find_held_lock+0x36/0x1c0 [ 1645.989010] schedule+0xfe/0x460 [ 1645.992376] ? __mutex_lock+0xafa/0x16f0 [ 1645.997625] ? __schedule+0x21d0/0x21d0 [ 1646.001613] ? kasan_check_read+0x11/0x20 [ 1646.006044] ? do_raw_spin_unlock+0xa7/0x330 [ 1646.010459] ? do_raw_spin_trylock+0x270/0x270 [ 1646.015501] ? ww_mutex_lock.part.8+0xf0/0xf0 [ 1646.020005] ? mutex_destroy+0x200/0x200 [ 1646.024383] schedule_preempt_disabled+0x13/0x20 [ 1646.029149] __mutex_lock+0xaff/0x16f0 [ 1646.033045] ? __blkdev_get+0x19b/0x13c0 [ 1646.037431] ? mutex_trylock+0x2b0/0x2b0 [ 1646.041500] ? zap_class+0x640/0x640 [ 1646.045494] ? zap_class+0x640/0x640 [ 1646.049225] ? find_held_lock+0x36/0x1c0 [ 1646.053306] ? get_gendisk+0xd2/0x380 [ 1646.057420] ? lock_downgrade+0x900/0x900 [ 1646.061580] ? lock_release+0xa00/0xa00 [ 1646.065847] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1646.070786] ? get_disk_and_module+0xf0/0xf0 [ 1646.075495] ? kasan_check_write+0x14/0x20 [ 1646.079734] ? up_read+0x225/0x2c0 [ 1646.083280] ? down_read+0x8d/0x120 [ 1646.087224] ? up_read_non_owner+0x100/0x100 [ 1646.091639] ? __down_interruptible+0x700/0x700 [ 1646.096601] ? blkdev_ioctl+0x21b0/0x21b0 [ 1646.100761] mutex_lock_nested+0x16/0x20 [ 1646.105241] ? mutex_lock_nested+0x16/0x20 [ 1646.109485] __blkdev_get+0x19b/0x13c0 [ 1646.113385] ? check_disk_change+0x140/0x140 [ 1646.118136] blkdev_get+0xc1/0xb50 [ 1646.121690] ? bdget+0x5b0/0x5b0 [ 1646.126255] ? do_raw_spin_trylock+0x270/0x270 [ 1646.130849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.136681] ? errseq_sample+0xe5/0x130 [ 1646.140666] ? _copy_to_user+0x110/0x110 [ 1646.145036] ? _raw_spin_unlock+0x2c/0x50 [ 1646.149195] blkdev_open+0x1fb/0x280 [ 1646.152915] do_dentry_open+0x499/0x1250 [ 1646.157316] ? selinux_capable+0x40/0x40 [ 1646.161382] ? bd_acquire+0x2c0/0x2c0 [ 1646.165484] ? chown_common+0x730/0x730 [ 1646.169473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.175595] ? security_inode_permission+0xd2/0x100 [ 1646.180638] ? inode_permission+0xb2/0x560 [ 1646.185445] vfs_open+0xa0/0xd0 [ 1646.188739] path_openat+0x12bc/0x5150 [ 1646.192631] ? lock_is_held_type+0x210/0x210 [ 1646.197384] ? unwind_dump+0x190/0x190 [ 1646.201299] ? path_lookupat.isra.43+0xc00/0xc00 [ 1646.206359] ? unwind_get_return_address+0x61/0xa0 [ 1646.211386] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1646.216720] ? expand_files.part.8+0x571/0x9a0 [ 1646.221318] ? find_held_lock+0x36/0x1c0 [ 1646.225689] ? __alloc_fd+0x347/0x6e0 [ 1646.229503] ? lock_downgrade+0x900/0x900 [ 1646.234058] ? getname+0x19/0x20 [ 1646.237457] ? kasan_check_read+0x11/0x20 [ 1646.244124] ? do_raw_spin_unlock+0xa7/0x330 [ 1646.248539] ? do_raw_spin_trylock+0x270/0x270 [ 1646.253125] ? __lock_is_held+0xb5/0x140 [ 1646.258422] ? __check_object_size+0xb1/0x782 [ 1646.262934] ? _raw_spin_unlock+0x2c/0x50 [ 1646.267435] ? __alloc_fd+0x347/0x6e0 [ 1646.271257] do_filp_open+0x255/0x380 [ 1646.275352] ? may_open_dev+0x100/0x100 [ 1646.279348] ? get_unused_fd_flags+0x122/0x1a0 [ 1646.284226] ? __alloc_fd+0x6e0/0x6e0 [ 1646.288042] do_sys_open+0x568/0x700 [ 1646.291765] ? filp_open+0x80/0x80 [ 1646.295620] ? trace_hardirqs_off_caller+0x310/0x310 [ 1646.300737] __x64_sys_open+0x7e/0xc0 [ 1646.304834] do_syscall_64+0x1b9/0x820 [ 1646.308736] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1646.314418] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1646.319357] ? trace_hardirqs_on_caller+0x310/0x310 [ 1646.324681] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1646.329710] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1646.336825] ? __switch_to_asm+0x40/0x70 [ 1646.340891] ? __switch_to_asm+0x34/0x70 [ 1646.345431] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1646.350289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1646.355770] RIP: 0033:0x4111a1 [ 1646.358971] Code: 74 3b 44 89 f1 ba 00 33 44 00 44 89 f6 31 ff 31 c0 ff 15 aa 82 24 00 e9 90 fc ff ff c6 02 00 4c 8b 7c 24 28 49 89 ca 49 83 c7 <01> 4c 89 7c 24 28 e9 44 fb ff ff 4d 89 d7 e9 3c fb ff ff b9 40 95 [ 1646.378221] RSP: 002b:00007f4337c407a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1646.387127] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004111a1 [ 1646.394690] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f4337c40850 [ 1646.401961] RBP: 000000000072bfa0 R08: 000000000000000f R09: 0000000000000000 [ 1646.409532] R10: 00007f4337c419d0 R11: 0000000000000293 R12: 00007f4337c416d4 [ 1646.417108] R13: 00000000004c5412 R14: 00000000004d9250 R15: 00000000ffffffff [ 1646.424675] INFO: task blkid:16082 blocked for more than 140 seconds. [ 1646.431252] Not tainted 4.20.0-rc3+ #122 [ 1646.436103] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1646.444327] blkid D23848 16082 15338 0x00000004 [ 1646.449965] Call Trace: [ 1646.452567] __schedule+0x8cf/0x21d0 [ 1646.456607] ? perf_trace_lock+0x14d/0x7a0 [ 1646.460860] ? __sched_text_start+0x8/0x8 [ 1646.465327] ? zap_class+0x640/0x640 [ 1646.469049] ? zap_class+0x640/0x640 [ 1646.472783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.478867] ? find_held_lock+0x36/0x1c0 [ 1646.482961] schedule+0xfe/0x460 [ 1646.486691] ? __mutex_lock+0xafa/0x16f0 [ 1646.490764] ? __schedule+0x21d0/0x21d0 [ 1646.495042] ? kasan_check_read+0x11/0x20 [ 1646.499467] ? do_raw_spin_unlock+0xa7/0x330 [ 1646.504335] ? do_raw_spin_trylock+0x270/0x270 [ 1646.508931] ? ww_mutex_lock.part.8+0xf0/0xf0 [ 1646.513426] ? mutex_destroy+0x200/0x200 [ 1646.518699] schedule_preempt_disabled+0x13/0x20 [ 1646.523464] __mutex_lock+0xaff/0x16f0 [ 1646.527651] ? __blkdev_get+0x19b/0x13c0 [ 1646.531731] ? mutex_trylock+0x2b0/0x2b0 [ 1646.536099] ? zap_class+0x640/0x640 [ 1646.539820] ? zap_class+0x640/0x640 [ 1646.543549] ? find_held_lock+0x36/0x1c0 [ 1646.547923] ? get_gendisk+0xd2/0x380 [ 1646.551737] ? lock_downgrade+0x900/0x900 [ 1646.556192] ? lock_release+0xa00/0xa00 [ 1646.560171] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1646.565387] ? get_disk_and_module+0xf0/0xf0 [ 1646.569817] ? kasan_check_write+0x14/0x20 [ 1646.574450] ? up_read+0x225/0x2c0 [ 1646.578006] ? down_read+0x8d/0x120 [ 1646.581634] ? up_read_non_owner+0x100/0x100 [ 1646.586534] ? __down_interruptible+0x700/0x700 [ 1646.591220] ? blkdev_ioctl+0x21b0/0x21b0 [ 1646.595681] mutex_lock_nested+0x16/0x20 [ 1646.599750] ? mutex_lock_nested+0x16/0x20 [ 1646.604285] __blkdev_get+0x19b/0x13c0 [ 1646.608191] ? check_disk_change+0x140/0x140 [ 1646.612612] blkdev_get+0xc1/0xb50 [ 1646.616475] ? bdget+0x5b0/0x5b0 [ 1646.619848] ? do_raw_spin_trylock+0x270/0x270 [ 1646.624736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.630280] ? errseq_sample+0xe5/0x130 [ 1646.634554] ? _copy_to_user+0x110/0x110 [ 1646.638627] ? _raw_spin_unlock+0x2c/0x50 [ 1646.642781] blkdev_open+0x1fb/0x280 [ 1646.647705] do_dentry_open+0x499/0x1250 [ 1646.651774] ? selinux_capable+0x40/0x40 [ 1646.656147] ? bd_acquire+0x2c0/0x2c0 [ 1646.660435] ? chown_common+0x730/0x730 [ 1646.664826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.670376] ? security_inode_permission+0xd2/0x100 [ 1646.675711] ? inode_permission+0xb2/0x560 [ 1646.679964] vfs_open+0xa0/0xd0 [ 1646.683250] path_openat+0x12bc/0x5150 [ 1646.687493] ? lock_is_held_type+0x210/0x210 [ 1646.691921] ? unwind_dump+0x190/0x190 [ 1646.696146] ? path_lookupat.isra.43+0xc00/0xc00 [ 1646.700906] ? unwind_get_return_address+0x61/0xa0 [ 1646.706257] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1646.711281] ? expand_files.part.8+0x571/0x9a0 [ 1646.716197] ? find_held_lock+0x36/0x1c0 [ 1646.720273] ? __alloc_fd+0x347/0x6e0 [ 1646.724570] ? lock_downgrade+0x900/0x900 [ 1646.728725] ? getname+0x19/0x20 [ 1646.732101] ? kasan_check_read+0x11/0x20 [ 1646.736665] ? do_raw_spin_unlock+0xa7/0x330 [ 1646.741080] ? do_raw_spin_trylock+0x270/0x270 [ 1646.745963] ? __lock_is_held+0xb5/0x140 [ 1646.750039] ? __check_object_size+0xb1/0x782 [ 1646.754853] ? _raw_spin_unlock+0x2c/0x50 [ 1646.759014] ? __alloc_fd+0x347/0x6e0 [ 1646.762848] do_filp_open+0x255/0x380 [ 1646.766955] ? may_open_dev+0x100/0x100 [ 1646.770955] ? get_unused_fd_flags+0x122/0x1a0 [ 1646.776861] ? __alloc_fd+0x6e0/0x6e0 [ 1646.780680] do_sys_open+0x568/0x700 [ 1646.784691] ? filp_open+0x80/0x80 [ 1646.788247] ? trace_hardirqs_off_caller+0x310/0x310 [ 1646.793356] __x64_sys_open+0x7e/0xc0 [ 1646.797574] do_syscall_64+0x1b9/0x820 [ 1646.801473] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1646.807196] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1646.812132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1646.817315] ? trace_hardirqs_on_caller+0x310/0x310 [ 1646.822341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1646.828200] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1646.833228] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1646.838386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1646.843589] RIP: 0033:0x7f37fee85120 [ 1646.847619] Code: Bad RIP value. [ 1646.850979] RSP: 002b:00007ffe39091c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 1646.859073] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f37fee85120 [ 1646.866615] RDX: 00007ffe39092f3f RSI: 0000000000000000 RDI: 00007ffe39092f3f [ 1646.874171] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 1646.881444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001cf5030 [ 1646.889007] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 1646.896582] [ 1646.896582] Showing all locks held in the system: [ 1646.902917] 1 lock held by khungtaskd/1019: [ 1646.908410] #0: 00000000b310bc64 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 1646.917360] 1 lock held by rsyslogd/5990: [ 1646.921505] #0: 00000000e1eaf37a (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 1646.929791] 2 locks held by getty/6113: [ 1646.934041] #0: 0000000039a7ffb1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1646.942297] #1: 000000008578aeca (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1646.951631] 2 locks held by getty/6114: [ 1646.955864] #0: 00000000d2aa9741 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1646.964386] #1: 000000006884910b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1646.973249] 2 locks held by getty/6115: [ 1646.977645] #0: 000000004a7f4d94 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1646.986197] #1: 00000000dcf1031d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1646.995345] 2 locks held by getty/6116: [ 1646.999315] #0: 000000009aa47423 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1647.007844] #1: 00000000b064f428 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1647.016972] 2 locks held by getty/6117: [ 1647.020953] #0: 0000000091a0f7fb (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1647.029500] #1: 00000000b05fd1ba (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1647.039528] 2 locks held by getty/6118: [ 1647.043496] #0: 0000000025743c87 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1647.052174] #1: 000000004a3339cc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1647.061324] 2 locks held by getty/6119: [ 1647.065553] #0: 00000000b1d314cd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1647.074082] #1: 000000002345475d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1647.082976] 1 lock held by syz-executor4/18044: [ 1647.087927] #0: 0000000046fb4224 (&sig->cred_guard_mutex){+.+.}, at: prepare_bprm_creds+0x53/0x120 [ 1647.097421] 2 locks held by syz-executor0/16074: [ 1647.102179] 3 locks held by syz-executor3/16080: [ 1647.107238] #0: 0000000009f1b354 (&lo->lo_ctl_mutex/1){+.+.}, at: lo_ioctl+0x8e/0x1d60 [ 1647.115687] #1: 00000000b8178455 (&bdev->bd_mutex){+.+.}, at: blkdev_reread_part+0x1e/0x40 [ 1647.124470] #2: 00000000d3a17ab7 (&type->s_umount_key#81){++++}, at: __get_super.part.11+0x207/0x2e0 [ 1647.134147] 1 lock held by syz-executor3/16119: [ 1647.138813] #0: 00000000b8178455 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x13c0 [ 1647.147368] 1 lock held by blkid/16082: [ 1647.151335] #0: 00000000b8178455 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x13c0 [ 1647.159866] [ 1647.161492] ============================================= [ 1647.161492] [ 1647.169685] NMI backtrace for cpu 0 [ 1647.173324] CPU: 0 PID: 1019 Comm: khungtaskd Not tainted 4.20.0-rc3+ #122 [ 1647.180334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1647.190377] Call Trace: [ 1647.192975] dump_stack+0x244/0x39d [ 1647.196618] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1647.201811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.207354] nmi_cpu_backtrace.cold.2+0x5c/0xa1 [ 1647.212110] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 1647.217301] nmi_trigger_cpumask_backtrace+0x1e8/0x22a [ 1647.222588] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1647.227785] watchdog+0xb51/0x1060 [ 1647.231345] ? hungtask_pm_notify+0xb0/0xb0 [ 1647.235689] ? __kthread_parkme+0xce/0x1a0 [ 1647.239936] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1647.245039] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1647.250144] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1647.254732] ? trace_hardirqs_on+0xbd/0x310 [ 1647.259054] ? kasan_check_read+0x11/0x20 [ 1647.263207] ? __kthread_parkme+0xce/0x1a0 [ 1647.267442] ? trace_hardirqs_off_caller+0x310/0x310 [ 1647.272546] ? trace_hardirqs_off_caller+0x310/0x310 [ 1647.277652] ? lockdep_init_map+0x9/0x10 [ 1647.281717] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1647.286821] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1647.292360] ? __kthread_parkme+0xfb/0x1a0 [ 1647.296598] ? hungtask_pm_notify+0xb0/0xb0 [ 1647.300921] kthread+0x35a/0x440 [ 1647.304290] ? kthread_stop+0x900/0x900 [ 1647.308269] ret_from_fork+0x3a/0x50 [ 1647.312121] Sending NMI from CPU 0 to CPUs 1: [ 1647.317499] NMI backtrace for cpu 1 [ 1647.317505] CPU: 1 PID: 16074 Comm: syz-executor0 Not tainted 4.20.0-rc3+ #122 [ 1647.317511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1647.317516] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x50 [ 1647.317526] Code: 14 dd 28 00 00 00 4d 39 d0 72 1b 49 83 c1 01 4a 89 7c 10 e0 4a 89 74 10 e8 4a 89 54 10 f0 4a 89 4c d8 20 4c 89 08 5d c3 66 90 <55> 48 89 e5 48 8b 75 08 65 48 8b 04 25 40 ee 01 00 65 8b 15 c8 62 [ 1647.317530] RSP: 0018:ffff88817ce8f390 EFLAGS: 00000046 [ 1647.317538] RAX: 0000000000000002 RBX: 0000000000000000 RCX: ffffffff83939b6d [ 1647.317543] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 1647.317548] RBP: ffff88817ce8f3c8 R08: ffff88817aef0040 R09: fffff94000d3ac4e [ 1647.317552] R10: fffff94000d3ac4e R11: ffffea00069d6277 R12: 0000000000000001 [ 1647.317557] R13: ffffffff8860cfe0 R14: ffffffff88359380 R15: 0000000000002622 [ 1647.317563] FS: 00007f98bf66d700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000 [ 1647.317567] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1647.317572] CR2: ffffffffff600400 CR3: 00000001cbe6f000 CR4: 00000000001426e0 [ 1647.317577] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1647.317582] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1647.317584] Call Trace: [ 1647.317588] ? check_preemption_disabled+0x48/0x280 [ 1647.317592] __this_cpu_preempt_check+0x1c/0x20 [ 1647.317595] __find_get_block+0x183/0xf20 [ 1647.317599] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1647.317603] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1647.317607] ? try_to_free_buffers+0xc80/0xc80 [ 1647.317611] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1647.317614] ? unlock_page+0x2c2/0x4c0 [ 1647.317618] ? wake_up_page_bit+0x6f0/0x6f0 [ 1647.317622] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1647.317626] ? init_page_buffers+0x433/0x570 [ 1647.317630] ? __set_page_dirty_buffers+0x810/0x810 [ 1647.317633] ? __find_get_block+0x3be/0xf20 [ 1647.317636] __getblk_gfp+0x2b3/0xd50 [ 1647.317640] ? __find_get_block+0xf20/0xf20 [ 1647.317643] ? find_held_lock+0x36/0x1c0 [ 1647.317647] ? lock_downgrade+0x900/0x900 [ 1647.317650] ? kasan_check_read+0x11/0x20 [ 1647.317653] ? do_raw_spin_unlock+0xa7/0x330 [ 1647.317656] ? do_raw_spin_trylock+0x270/0x270 [ 1647.317659] ? evict_inodes+0x610/0x610 [ 1647.317662] ? _raw_spin_unlock+0x2c/0x50 [ 1647.317665] __bread_gfp+0x2d/0x310 [ 1647.317668] minix_V1_raw_inode+0x14b/0x220 [ 1647.317671] minix_iget+0x782/0xf30 [ 1647.317675] ? perf_trace_sched_process_exec+0x860/0x860 [ 1647.317678] ? minix_set_inode+0x300/0x300 [ 1647.317681] ? __might_sleep+0x95/0x190 [ 1647.317684] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1647.317688] minix_fill_super+0xc4c/0x1ac0 [ 1647.317690] mount_bdev+0x30c/0x3e0 [ 1647.317693] ? minix_iget+0xf30/0xf30 [ 1647.317696] minix_mount+0x34/0x40 [ 1647.317699] mount_fs+0xae/0x31d [ 1647.317702] vfs_kern_mount.part.35+0xdc/0x4f0 [ 1647.317705] ? may_umount+0xb0/0xb0 [ 1647.317708] ? _raw_read_unlock+0x2c/0x50 [ 1647.317711] ? __get_fs_type+0x97/0xc0 [ 1647.317714] do_mount+0x581/0x31f0 [ 1647.317717] ? check_preemption_disabled+0x48/0x280 [ 1647.317720] ? copy_mount_string+0x40/0x40 [ 1647.317723] ? copy_mount_options+0x5f/0x430 [ 1647.317727] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1647.317730] ? kmem_cache_alloc_trace+0x353/0x750 [ 1647.317734] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1647.317737] ? _copy_from_user+0xdf/0x150 [ 1647.317741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1647.317744] ? copy_mount_options+0x315/0x430 [ 1647.317747] ksys_mount+0x12d/0x140 [ 1647.317750] __x64_sys_mount+0xbe/0x150 [ 1647.317753] do_syscall_64+0x1b9/0x820 [ 1647.317756] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1647.317760] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1647.317764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1647.317767] ? trace_hardirqs_on_caller+0x310/0x310 [ 1647.317770] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1647.317774] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1647.317777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1647.317780] RIP: 0033:0x459fda [ 1647.317790] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1647.317793] RSP: 002b:00007f98bf66ca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1647.317801] RAX: ffffffffffffffda RBX: 00007f98bf66cb30 RCX: 0000000000459fda [ 1647.317805] RDX: 00007f98bf66cad0 RSI: 0000000020000080 RDI: 00007f98bf66caf0 [ 1647.317810] RBP: 0000000020000080 R08: 00007f98bf66cb30 R09: 00007f98bf66cad0 [ 1647.317814] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1647.317818] R13: 0000000000000000 R14: 00000000004d8ff8 R15: 00000000ffffffff [ 1647.321690] Kernel panic - not syncing: hung_task: blocked tasks [ 1647.773596] CPU: 0 PID: 1019 Comm: khungtaskd Not tainted 4.20.0-rc3+ #122 [ 1647.780616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1647.789974] Call Trace: [ 1647.792575] dump_stack+0x244/0x39d [ 1647.796210] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1647.801401] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1647.806493] panic+0x2ad/0x55c [ 1647.809687] ? add_taint.cold.5+0x16/0x16 [ 1647.813846] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 1647.819299] ? nmi_trigger_cpumask_backtrace+0x1f9/0x22a [ 1647.824753] ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a [ 1647.830204] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 1647.835662] watchdog+0xb62/0x1060 [ 1647.839215] ? hungtask_pm_notify+0xb0/0xb0 [ 1647.843543] ? __kthread_parkme+0xce/0x1a0 [ 1647.847780] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1647.852879] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1647.857984] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1647.862572] ? trace_hardirqs_on+0xbd/0x310 [ 1647.866898] ? kasan_check_read+0x11/0x20 [ 1647.871056] ? __kthread_parkme+0xce/0x1a0 [ 1647.875293] ? trace_hardirqs_off_caller+0x310/0x310 [ 1647.880403] ? trace_hardirqs_off_caller+0x310/0x310 [ 1647.885510] ? lockdep_init_map+0x9/0x10 [ 1647.889578] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1647.894700] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1647.900240] ? __kthread_parkme+0xfb/0x1a0 [ 1647.904479] ? hungtask_pm_notify+0xb0/0xb0 [ 1647.908799] kthread+0x35a/0x440 [ 1647.912170] ? kthread_stop+0x900/0x900 [ 1647.916149] ret_from_fork+0x3a/0x50 [ 1647.921175] Kernel Offset: disabled [ 1647.924820] Rebooting in 86400 seconds..