100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:36 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0xb, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) [ 667.405047][ T9372] Unknown ioctl -1072667619 10:17:36 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:36 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {0x0, 0xe603000000000000}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:36 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) r13 = dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r14, &(0x7f0000000000)=ANY=[], 0xfffffecc) r15 = accept(r14, 0x0, &(0x7f00000009c0)) r16 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r15, &(0x7f0000000c40)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000a80)={0x17c, r16, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xe4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x80, @rand_addr="d6c407ef0b9b270119aa34b0f29c918a", 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xffffff1d, @dev={0xfe, 0x80, [], 0x41}, 0xff}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @local, 0x3}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4da}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x59b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffc1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x62db6e98}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}]}]}, 0x17c}}, 0x4046800) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x120, 0xffffffffffffffff, 0x0, [], 0x0, r13}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r17, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 667.564041][ T9477] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:36 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 667.685846][ T9781] Unknown ioctl -1072667619 10:17:36 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0xc, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:36 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:36 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r2}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r2}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:36 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {0x0, 0xf400000000000000}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:36 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) r13 = dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r14, &(0x7f0000000000)=ANY=[], 0xfffffecc) r15 = accept(r14, 0x0, &(0x7f00000009c0)) r16 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r15, &(0x7f0000000c40)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000a80)={0x17c, r16, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xe4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x80, @rand_addr="d6c407ef0b9b270119aa34b0f29c918a", 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xffffff1d, @dev={0xfe, 0x80, [], 0x41}, 0xff}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @local, 0x3}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4da}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x59b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffc1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x62db6e98}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}]}]}, 0x17c}}, 0x4046800) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x120, 0xffffffffffffffff, 0x0, [], 0x0, r13}, 0x40) 10:17:37 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:37 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 668.054185][T10178] Unknown ioctl -1072667619 10:17:37 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0xd, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:37 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r2}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r2}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:37 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {0x0, 0xfe03000000000000}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:37 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:37 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) r13 = dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r14, &(0x7f0000000000)=ANY=[], 0xfffffecc) r15 = accept(r14, 0x0, &(0x7f00000009c0)) r16 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r15, &(0x7f0000000c40)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000a80)={0x17c, r16, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xe4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x80, @rand_addr="d6c407ef0b9b270119aa34b0f29c918a", 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xffffff1d, @dev={0xfe, 0x80, [], 0x41}, 0xff}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @local, 0x3}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4da}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x59b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffc1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x62db6e98}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}]}]}, 0x17c}}, 0x4046800) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x120, 0xffffffffffffffff, 0x0, [], 0x0, r13}, 0x40) 10:17:37 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0xe, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) [ 668.332167][T10673] Unknown ioctl -1072667619 10:17:37 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {0x0, 0xffff030000000000}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:37 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:37 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r2}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r2}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:37 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:37 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:37 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) r13 = dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r14, &(0x7f0000000000)=ANY=[], 0xfffffecc) r15 = accept(r14, 0x0, &(0x7f00000009c0)) r16 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r15, &(0x7f0000000c40)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000a80)={0x17c, r16, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xe4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x80, @rand_addr="d6c407ef0b9b270119aa34b0f29c918a", 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xffffff1d, @dev={0xfe, 0x80, [], 0x41}, 0xff}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @local, 0x3}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4da}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x59b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffc1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x62db6e98}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}]}]}, 0x17c}}, 0x4046800) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x120, 0xffffffffffffffff, 0x0, [], 0x0, r13}, 0x40) 10:17:37 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r2}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r2}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:37 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:37 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:37 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {0x0, 0xffffffff00000000}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 668.710664][T11151] Unknown ioctl -1072667619 10:17:37 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x10, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:37 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r2}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r2}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:37 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:38 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:38 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) r13 = dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r14, &(0x7f0000000000)=ANY=[], 0xfffffecc) r15 = accept(r14, 0x0, &(0x7f00000009c0)) r16 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r15, &(0x7f0000000c40)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000a80)={0x17c, r16, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xe4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x80, @rand_addr="d6c407ef0b9b270119aa34b0f29c918a", 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xffffff1d, @dev={0xfe, 0x80, [], 0x41}, 0xff}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @local, 0x3}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4da}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x59b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffc1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x62db6e98}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}]}]}, 0x17c}}, 0x4046800) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:38 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x1a8, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:38 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r2}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r2}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:38 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x11, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) [ 669.116079][T11518] Unknown ioctl -1072667619 [ 669.146337][T11521] x_tables: ip6_tables: hashlimit.2 match: invalid size 304 (kernel) != (user) 392 10:17:38 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:38 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:38 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00', 0x3}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:38 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000000)=ANY=[], 0xfffffecc) r14 = accept(r13, 0x0, &(0x7f00000009c0)) r15 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r14, &(0x7f0000000c40)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000a80)={0x17c, r15, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xe4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x80, @rand_addr="d6c407ef0b9b270119aa34b0f29c918a", 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xffffff1d, @dev={0xfe, 0x80, [], 0x41}, 0xff}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x0, @local, 0x3}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4da}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x59b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffc1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x62db6e98}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}]}]}, 0x17c}}, 0x4046800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:38 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x12, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:38 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r2}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r2}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 669.402116][T11848] x_tables: ip6_tables: hashlimit.3 match: invalid size 312 (kernel) != (user) 304 [ 669.423850][T11847] Unknown ioctl -1072667619 10:17:38 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000000)=ANY=[], 0xfffffecc) accept(r13, 0x0, &(0x7f00000009c0)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:38 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:38 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:38 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00', 0x4}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:38 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r2}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r2}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 669.617305][T12168] Unknown ioctl -1072667619 10:17:38 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x13, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:38 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:38 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000000)=ANY=[], 0xfffffecc) accept(r13, 0x0, &(0x7f00000009c0)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:38 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x14, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:38 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:38 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00', 0xa}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:38 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:39 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 669.962854][T12593] __ntfs_error: 8 callbacks suppressed [ 669.962864][T12593] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 [ 669.964748][T12589] Unknown ioctl -1072667619 10:17:39 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:39 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x2, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:39 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000000)=ANY=[], 0xfffffecc) accept(r13, 0x0, &(0x7f00000009c0)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:39 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) [ 670.242827][T12909] Unknown ioctl -1072667619 10:17:39 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 670.294754][T12910] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:39 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x16, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:39 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:39 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000000)=ANY=[], 0xfffffecc) accept(r13, 0x0, &(0x7f00000009c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:39 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:39 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x3, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:39 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x17, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) [ 670.569890][T13403] Unknown ioctl -1072667619 10:17:39 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 670.653967][T13440] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:39 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:39 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x18, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:39 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000000)=ANY=[], 0xfffffecc) accept(r13, 0x0, &(0x7f00000009c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:39 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:39 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:39 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 670.923620][T13855] Unknown ioctl -1072667619 10:17:40 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:40 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x19, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) [ 671.025085][T13948] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:40 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000000)=ANY=[], 0xfffffecc) accept(r13, 0x0, &(0x7f00000009c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:40 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x7, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:40 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 671.150531][T14220] Unknown ioctl -1072667619 [ 671.162390][T14217] overlayfs: missing 'lowerdir' 10:17:40 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:40 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:40 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x1a, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:40 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000000)=ANY=[], 0xfffffecc) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:40 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xa, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:40 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 671.363599][T14572] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 [ 671.397805][T14635] Unknown ioctl -1072667619 [ 671.405717][T14632] overlayfs: missing 'lowerdir' 10:17:40 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:40 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000000)=ANY=[], 0xfffffecc) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:40 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 671.570522][T14878] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:40 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x1b, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:40 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x10, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:40 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 671.657504][T15003] Unknown ioctl -1072667619 [ 671.673155][T15067] overlayfs: missing 'lowerdir' 10:17:40 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:40 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 671.800783][T15173] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:40 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:40 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0, 0x10}, 0x20) 10:17:40 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xf4, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 671.886106][T15419] overlayfs: missing 'lowerdir' 10:17:41 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 671.971648][T15477] Unknown ioctl -1072667619 10:17:41 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:41 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:41 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 672.060845][T15534] ntfs: (device loop3): parse_options(): Unrecognized mount option . 10:17:41 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x290, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 672.137654][T15689] overlayfs: missing 'lowerdir' 10:17:41 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0, 0x100000}, 0x20) 10:17:41 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 672.189364][T15743] overlayfs: missing 'lowerdir' [ 672.204864][T15744] Unknown ioctl -1072667619 10:17:41 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:41 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:41 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x300, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 672.341450][T15927] overlayfs: missing 'lowerdir' 10:17:41 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:41 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0, 0x10000000000000}, 0x20) [ 672.446680][T16135] overlayfs: missing 'lowerdir' 10:17:41 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:41 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:41 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 672.560096][T16228] Unknown ioctl -1072667619 10:17:41 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x360, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 672.605369][T16273] overlayfs: missing 'lowerdir' 10:17:41 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r2, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r4, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) accept4$alg(r5, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r10, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r11, r12/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r8, &(0x7f00000001c0)=""/93}) dup(r0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 672.644022][T16272] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 672.675872][T16327] overlayfs: missing 'lowerdir' 10:17:41 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0, 0xffffffff00000000}, 0x20) 10:17:41 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 672.731882][T16383] Unknown ioctl -1072667619 10:17:41 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r1, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r3, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) accept4$alg(r4, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r9, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r10, r11/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r6}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000240)={r7, &(0x7f00000001c0)=""/93}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:41 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:41 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 672.851668][T16590] overlayfs: missing 'lowerdir' 10:17:41 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x3e6, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 672.889312][T16592] Unknown ioctl -1072667619 10:17:42 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x78) 10:17:42 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r1, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r3, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) accept4$alg(r4, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r9, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r10, r11/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r6}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000240)={r7, &(0x7f00000001c0)=""/93}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:42 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 672.951187][T16595] overlayfs: missing 'lowerdir' [ 673.030565][T16700] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 673.034058][T16707] Unknown ioctl -1072667619 10:17:42 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 673.071467][T16716] overlayfs: missing 'lowerdir' 10:17:42 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x3fe, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:42 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x200000a0) 10:17:42 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r1, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r3, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) accept4$alg(r4, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {0x0}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r9, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r10, r11/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r6}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000240)={r7, &(0x7f00000001c0)=""/93}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:42 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:42 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 673.230661][T17026] Unknown ioctl -1072667619 [ 673.236845][T17025] overlayfs: missing 'lowerdir' 10:17:42 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x700, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 673.294875][T17142] overlayfs: missing 'lowerdir' 10:17:42 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r7, 0xc058560f, &(0x7f00000002c0)={0x5, 0x2, 0x4, 0xe000, 0x7, {r8, r9/1000+10000}, {0x5, 0x10, 0x3f, 0xc3, 0x7, 0x9, "5399351e"}, 0x9, 0x1, @userptr=0x6, 0x4fdb, 0x0, r5}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:42 executing program 5: unshare(0x2a000400) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000440)={0x1, 0x0, &(0x7f0000000400)=[0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000480)={&(0x7f00000003c0)=[0x80000001, 0x400, 0x1, 0x9], 0x4, 0x800, r3}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0x4}, &(0x7f0000000200)=0x8) fsetxattr$trusted_overlay_origin(r5, &(0x7f00000004c0)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000240)={r7, 0xe0, "5e0355e10c94c1eaa2bdb4127e3587b0bd25f297f0d367046780d9e430bfdfc173322bbf924b4441f174f2eb5ce89fd4c228b3872f396e3ebc8eb1cd3c2132d214b3433cb765218c90760f25c8ff2cf0c3d34c8021d95fe688318050035f27af489650680e314ae526bf1f0c96e6e16f4c8f68b9759c3b6fc1664f0129182594cd63e0e826b7e623b68e0218c0343c109da0d4f8303b439b84f4a457c6c692d04aedae7ba2606c73e3f533b3e94fe696b8e96e77300cfad568bfa9504a8158e96fa9f887558f0138d198ae974347aa696361fe56cc549562b2998a3a8150c9bc"}, &(0x7f0000000340)=0xe8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x40) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@ipv4, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000001580)=0xe8) connect$packet(r0, &(0x7f00000015c0)={0x11, 0x6, r9, 0x1, 0x7f, 0x6, @remote}, 0x14) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x527000, 0x0) setsockopt$packet_buf(r10, 0x107, 0x16, &(0x7f00000000c0)="40b8c7bf644d024345a3af747719422debde43268a8f9d805111c6f6b9c7e3ebd3a39b6610127c4e4058bf358a4569cbe89a9818e0728f1a84192fafc8f2c6de095bff15c73d4930ed288aba9f83235193b8adc6a3bf1d1c564a0a00381008ab2790a8d8717c91eb8534da11fb4b4f068e59e3bb28552733e539b9e28560ab81375d3c4b97377e39bdd79c5e11d6f4b1d2e3093f37ff34a57627fb07223fc7ba7559482df2aad6662a7b720800d969b261a187839e5b1dc3fb539a8a84abfd555ff7493e4dc3c73bd03744e73342ad5404", 0xd1) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r8, 0x0, 0x0, 0x1}, 0x20) 10:17:42 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:42 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:42 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) clock_gettime(0x0, &(0x7f0000000280)) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:42 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:42 executing program 5: unshare(0x2a000400) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x400, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x83, &(0x7f0000000340)={r3}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r3, &(0x7f00000002c0)=0x4) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000100)={'veth1_macvtap\x00', {0x2, 0x4e22, @empty}}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={r4, 0xa0, &(0x7f0000000300)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0x15}, 0x7fff}, @in6={0xa, 0x4e22, 0xfe, @ipv4={[], [], @empty}, 0xffffffff}, @in6={0xa, 0x4e22, 0x100, @local, 0x7}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e23, 0x3, @loopback, 0x7fff}, @in={0x2, 0x4e22, @loopback}]}, &(0x7f0000000400)=0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x0, 0x1, 0x1}, 0x40) accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r5, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)={0x14, r6, 0x100, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0xc5faa59c093d94f4}, 0x2041) [ 673.520232][T17417] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 673.558530][T17417] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 673.596836][T17478] overlayfs: missing 'lowerdir' 10:17:42 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xa00, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:42 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:42 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:42 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 673.779428][T17645] overlayfs: option "workdir=." is useless in a non-upper mount, ignore 10:17:42 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r2}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r2}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:42 executing program 5: unshare(0x2a000400) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x40000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) [ 673.819674][T17645] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 673.879614][T17683] overlayfs: missing 'lowerdir' 10:17:43 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:43 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x3f00, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:43 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:43 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:43 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r2}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r2}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 674.041810][T17794] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 674.077331][T17846] overlayfs: missing 'lowerdir' [ 674.081061][T17794] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 10:17:43 executing program 5: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000004c0)="dee7030022cf9e5e1dbac27b0426fc0299c40800000000000000c894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r1) keyctl$update(0x2, r1, &(0x7f0000000200)="12cebad20c1b83d919d5f04b0faa988ab2e980c9d47adf7a7c973033da9c89acf5f76ae43ec9159db2c2218913d02d73073328d85b210c27c028af079da47af3c656ed5a28", 0x45) unshare(0x2a000400) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000540)={0x7, "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"}) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5d, 0x2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x8, 0xe9, 0x801, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r3, 0x3}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r4, 0x0, 0x0}, 0x20) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)=""/238, &(0x7f00000001c0)=0xee) 10:17:43 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:43 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:43 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:43 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:43 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x840, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x5, 0x0, 0x2, 0xdbb, 0x9b, 0x3, 0x7}, &(0x7f00000001c0)=0x9c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000200)={r2, 0xffffffff}, &(0x7f0000000240)=0x8) 10:17:43 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 674.340006][T18117] overlayfs: unrecognized mount option "upper" or missing value 10:17:43 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r2}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r2}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:43 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:43 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x6003, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 674.405205][T18158] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 674.436440][T18158] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 10:17:43 executing program 5: unshare(0x2a000400) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="11d659000000060000000900000008000300", @ANYRES32, @ANYBLOB="08000637e51996e0b5db8a5ad2691f5c15225542b516b490c1727cc61bd827891b377943947b934082049ef614102f7a4abccfc632bc68c0e1fc47665c310a2a86c2e27527354463a2605ae2af8c64dd28116245b56ba3d1ea3b67e3699766e15c67e3f8c785498486ac374877bb64694c5e0c3e7d8bc401073d39c2f3f2ef98490eec522cfba59607a69b32c4367d13040200595cac6b35635e5d78d9b4aec2c0d0a933639e79b47eed271a65dda955bf7f6b2558467d56b05c8206", @ANYRES32, @ANYBLOB="c8e60e140eea986f1310244deb5f148de03a4257c17c6847d6c415cbd07e5bc8005a424abe5057c74ad167d50651a1f62906c6551b4853d9b43d6fdefa9772b3d3e9cd83989cfe8368ce9b3cbb8eb323d6b2"], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x5c, r2, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x5bd}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20044000) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r3, 0x0, 0x0}, 0x20) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/172) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@text64={0x40, &(0x7f0000000300)="66b85c008ed80f79fa420f01c8f30f01f8f30faeeedb04ea660ff3fc3ea0ebe00000000000003e660f3a0e243000c441d1db5d12", 0x34}], 0x1, 0x0, &(0x7f00000004c0)=[@cr4={0x1, 0x400}, @cstype0={0x4, 0x7}], 0x2) 10:17:43 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:43 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:43 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000000)) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 674.603052][T18413] overlayfs: unrecognized mount option "upper" or missing value 10:17:43 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 674.678894][T18489] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 674.703084][T18489] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 10:17:43 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x7f00, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:43 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r6) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:43 executing program 5: unshare(0x2a000400) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x39, 0xe9, 0x7, 0x526}, 0x40) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x10002, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) 10:17:43 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=.']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 674.866774][T18730] overlayfs: unrecognized mount option "upper" or missing value 10:17:44 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000000)) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:44 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x9002, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:44 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 674.961763][T18839] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 674.996737][T18839] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 10:17:44 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 675.059184][T18920] __ntfs_error: 6 callbacks suppressed [ 675.059192][T18920] ntfs: (device loop3): parse_options(): Unrecognized mount option . 10:17:44 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:44 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x4000) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa4, r1, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_MAC_ADDRS={0x7c, 0xa6, 0x0, 0x1, [{0xa, 0x0, @local}, {0xa, 0x0, @remote}, {0xa, 0x0, @dev={[], 0x22}}, {0xa, 0x0, @random="c7f0c89c275a"}, {0xa}, {0xa, 0x0, @link_local}, {0xa, 0x0, @remote}, {0xa, 0x0, @random="8f075402add6"}, {0xa, 0x0, @dev={[], 0x29}}, {0xa, 0x0, @local}]}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x800, 0x1}}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x7}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4800}, 0x90) unshare(0x2a000400) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:17:44 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xe603, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 675.195940][T19159] overlayfs: workdir and upperdir must be separate subtrees [ 675.201035][T19174] overlayfs: unrecognized mount option "upper" or missing value 10:17:44 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xf400, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:44 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:44 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000000)) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5}, {0x2, 0x2, r3}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000300)='tmpfs\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mpol=prefer:01', @ANYRESDEC]) unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000000c0)=0xffffffff, &(0x7f0000000100)=0x4) 10:17:44 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:44 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:44 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 675.454660][T19525] ntfs: (device loop3): parse_options(): Unrecognized mount option . 10:17:44 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xfe03, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 675.507748][T19576] overlayfs: unrecognized mount option "upper" or missing value [ 675.545273][T19577] overlayfs: workdir and upperdir must be separate subtrees 10:17:44 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:44 executing program 5: unshare(0x2a000000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:44 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upper']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:44 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x12000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:44 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:44 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:44 executing program 5: unshare(0x2e000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FBIOGETCMAP(r2, 0x4604, &(0x7f00000002c0)={0xd90, 0x2, &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0]}) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000040)={0x800000, 0x3, 0x1, 0x1d7f, 0x80000000, 0xffffffff, 0x80}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000100)={0x4, 0x1, 'client1\x00', 0x3, "029977ea543ac661", "6ee4e4d305d9b0937bd41f7929eb7f38280680ce7bd441dd61010a45d63e9b37", 0xffffffff, 0x2}) [ 675.775194][T19954] overlayfs: unrecognized mount option "upper" or missing value 10:17:44 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x3ffff, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:44 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:44 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 675.839584][T20011] overlayfs: workdir and upperdir must be separate subtrees [ 675.870391][T20031] ntfs: (device loop3): parse_options(): Unrecognized mount option . 10:17:45 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:45 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:45 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x40000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 676.041837][T20316] overlayfs: workdir and upperdir must be separate subtrees 10:17:45 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x113380, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="5a92afca4f68cb9d08f1c3c200229d64", 0x10) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000140)="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") setsockopt$CAN_RAW_JOIN_FILTERS(r3, 0x65, 0x6, &(0x7f0000000100)=0x1, 0x4) 10:17:45 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r4) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 676.135300][T20427] overlayfs: failed to resolve './fil': -2 [ 676.171381][T20430] ntfs: (device loop3): parse_options(): Unrecognized mount option . 10:17:45 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:45 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:45 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 676.280993][T20625] overlayfs: failed to resolve './fil': -2 10:17:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x100000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:45 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x39, 0xe9, 0x801, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:45 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:45 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:45 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 676.415739][T20835] overlayfs: workdir and upperdir must be separate subtrees 10:17:45 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 676.584871][T20955] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 676.600972][T20945] overlayfs: failed to resolve './fil': -2 10:17:45 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) unshare(0x2a000400) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x341141, 0x1c8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x419, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x4000000, 0xfffffffc, 0xfffffff9}, 0x40) prctl$PR_SET_UNALIGN(0x6, 0x3) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/bsg\x00', 0x40200, 0x0) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r6, 0xc0585609, &(0x7f00000001c0)={0x7, 0x0, 0x4, 0x80000000, 0x1fc, {}, {0x2, 0x0, 0x90, 0x9, 0x7, 0x80, "c715ac85"}, 0x1, 0x1, @userptr=0x1ce, 0x100, 0x0, r3}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r7, 0x10, &(0x7f0000000240)={&(0x7f0000000140)=""/24, 0x18}}, 0x10) io_destroy(r4) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:17:45 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x200100, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 676.703661][T21051] overlayfs: workdir and upperdir must be separate subtrees 10:17:45 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:45 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:45 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:45 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:45 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x28d000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:46 executing program 5: unshare(0x2a000400) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe2, 0x0) r2 = dup(r0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x10) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000000)={@dev, r5}, 0x14) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x8, 0xec, 0x80, 0xc, r2, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x40) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r6, 0x0, 0x0}, 0x20) [ 676.901792][T21368] overlayfs: failed to resolve './file': -2 10:17:46 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 676.993207][T21376] overlayfs: failed to resolve './fil': -2 10:17:46 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:46 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:46 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:46 executing program 5: unshare(0x2a000400) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket(0x11, 0x800000003, 0x5) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x10) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@dev, r4}, 0x14) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0x3ff, 0x801, 0x420, r0, 0x4}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r5, 0x0, 0x0}, 0x20) [ 677.176154][T21648] overlayfs: failed to resolve './file': -2 10:17:46 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xd02800, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:46 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 677.267888][T21691] overlayfs: failed to resolve './fil': -2 10:17:46 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:46 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./fil']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:46 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 677.445633][T21866] overlayfs: failed to resolve './fil': -2 10:17:46 executing program 5: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x39, 0xe9, 0x801, 0x20, 0xffffffffffffffff, 0x4, [], 0x0, r1}, 0x40) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) connect$pptp(r3, &(0x7f0000000200)={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001240)={&(0x7f00000000c0)="c1e5ae5b73baec2d21f600419577d842f625fd0061d79996f318908d03538f8b9c5db0a8e5c1708a01d63a89dd0faa1fc190c284b92fd8e6671421f87c0a16d25fb20f7933a9b75d23618881d476673a4545bdd36cd52bc68ac117d0e55827870884a5e363913a66c9d1be2cba8da0371971bf3b07f648ed0388fa4ec8309dea67808444a89f0cd2bbec5d6c32abe1a65a8ce71e90565727b7f6061b500f98a0c4ead2052f45409b3a09fbee3415c089d35208ff96d0f896f098eb1315f5c06bccc24cfe74617ae18142c9908e44a6cff79d6d", &(0x7f00000012c0)=""/4100, &(0x7f00000011c0)="e7fc9b7b6c64386b2a37c3c731b986c681c2ff005a5f6fcb6dc049038deac082498a0adfba658bc7679f1632f12bbb182f5a909dade7187348170aa63ef52dd7edff682bf5271bf74e41758f3c1921747f6451adaf12504f7e4569", &(0x7f0000000040)="1106a959fe671a77905288c21948a8f31921cc8e6fd7f7175f936890a069a1a9c65ba3490ffc6e2ce6", 0x401, r3}, 0x38) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:17:46 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 677.501180][T21912] overlayfs: failed to resolve './file': -2 10:17:46 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:46 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x1000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:46 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:46 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x82825, 0x0) [ 677.641284][T22043] overlayfs: failed to resolve './file': -2 10:17:46 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:46 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x5, &(0x7f00000003c0)=[{&(0x7f0000000100)="57104bade6248282e6a646ba3b76a5c137a5947dcaac5062051afe521ce54cdcab4c484b8d711eb6d88d7da9514a4deddbd803109128083907bed85a7791527dd2ee77c188bb84ece754441ef93c018523e782213eb06c8bd667a04b5916fc9c83f343313f8b128286f2e15df2b10c2e01a1bb0c7b53475752224bd7babca22478798020bf11f930abc3ffd426d8d17b4e2e88e652819ab8138dc763b625bb9eef70fae5fee2439a90316e1405f4fc698e99ef743a2a3ac56196747d165b0790592fd34aa11cced4146ece118a80731eb6d1123f8a2015fd9b28267275d92e49e69a4524ce7c", 0xe6, 0xfffffffffffffff7}, {&(0x7f0000000200)="9ccd38c76bc3feb68e1381d828277309bd300c61caef0636f12c2729bcb79096a0d6fcae16dec20d8028041ad4f977c350409dd764592ef0a0fceab4b4949ab5f779b980b1e3a8dea1fda9bb8910bb7aba1d320d535853d26b8c3accd19bf0127b89113977ef067eda6e78ac2f1cb972c0f0", 0x72, 0x7fffffff}, {&(0x7f0000000280)="22238ecd1f49bafc8d3db80a148435be0c3c1be0dec747068b32d741b8cf3ed4cd80bc3fb19246f1e2b67806e810f464d4afb20c346b6f324ff018a1c73f9c248a6d62621c7464f9acd7191d2871efb991a54162634a28aed5d36b17c8d59ad94da9743ef4fb8e77947dca9f12268ed3890f23f43de408b8dd0f4a75e3e7b626c9e66c4d246fd5caca", 0x89, 0x400}, {&(0x7f0000000340)="d7102042d491d71970ac4b0e6b5a377c3c7f7d4b3f4e4b5c9de9cec24ac93bec3c9bbdcf41a03793731157b9ba72826add81eb21", 0x34, 0x200}, {&(0x7f0000000380)="425c1c1458a984e67181f42da2b646824f5033de081908df393d5817e04bdae15f51fcf79c9ff8d2995ce65e", 0x2c, 0x77a8}], 0xc4807, &(0x7f0000000440)='\\lo\'\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x8103, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) [ 677.766270][T22187] overlayfs: failed to resolve './file': -2 10:17:46 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:46 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:46 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:47 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:47 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x2000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 677.976031][T22381] overlayfs: failed to resolve './file': -2 10:17:47 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:47 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) recvfrom$inet6(r2, &(0x7f0000000040)=""/37, 0x25, 0x2, 0x0, 0x0) syz_mount_image$ceph(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000100)='./file0\x00', 0x1000, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="13475e07c6486f23a588045e85657466ced1ed79663c976e87266037356df706221d6074e731143cdd15dbf560fa5dba88371c65174166f48e7782bb7b46aca5cebae810bd9ae47ef0c7ee29ea695abba6dfcbb3ceddec5b5c9c818e6c9e8d42d53b66500538f1dc45f42c2e585a1eee87e75a2ce7c1aee2ffd2b9f3380da85c1e64ab5439dc35e6e81a760fa66da3b2c02a96d39ccb65474696ed21c11a32f698ffbc33b4553a4d664062ebc5c33725ed447de8023ab3c0cc7ca940300750df71fb0083770267e8e77ec776", 0xcc, 0x1000}], 0x800, &(0x7f00000002c0)=',\x00') ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000300)=0x6) 10:17:47 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) sendto$inet(r0, &(0x7f0000000880)="77160fb7663a1d831a0ff5e584e2c34422d5d36e474e8107ca6ddba3f29eb1eb9a9fc7d1461a3179197f201330aa5c85e04344d522ee0c6cb2132f0b8fde21238d6d3921c38d69a0ad1295913e9a7b5b927f1affebef034a24ba90f897fc515509a1bff86da438b752b56b9002fd2fe2c4e5dba79ed4c0c013ca8b59c0b8d9c0c89c7906722c651c1885faa071b3f6713a14e388764a2f95c99cfebb13ec9986f5ef89a73d9c3df42b9f6f594569f4b1b645f3a3f42da806ffddc85f4f767779f7fcd144efe27cbc8705986b78bd253d152374dd2288be40b97ed210406a1137fb3b05", 0xe3, 0x24004894, &(0x7f0000000980)={0x2, 0x4e23, @broadcast}, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:47 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:47 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:47 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:47 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x3000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:47 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:47 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$alg(0xffffffffffffffff, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:47 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:17:47 executing program 5: unshare(0x16020000) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socket(0x22, 0x6, 0x3) 10:17:47 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:47 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x7000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:47 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x800, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000140)={0x100, {0xa000000, 0xe, 0x2, 0x0, 0x1, 0x52d5}}) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4, 0x0) read$rfkill(r2, &(0x7f00000000c0), 0x8) 10:17:47 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:47 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$alg(0xffffffffffffffff, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:47 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:47 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xa000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:47 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0xe9, 0x40000801, 0x0, 0xffffffffffffffff, 0x4}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:47 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$alg(0xffffffffffffffff, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:47 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 678.761626][T23210] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 10:17:47 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:17:47 executing program 5: unshare(0x2a000400) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x4ffe2, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x20) 10:17:48 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:48 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x3f000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:48 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:48 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) socket$inet6_udp(0xa, 0x2, 0x0) 10:17:48 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:17:48 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x40000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:48 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:48 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 679.213585][T23726] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 10:17:48 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x60030000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:48 executing program 5: unshare(0x2a000400) alarm(0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x6a, 0xe9, 0x805}, 0x40) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={'bond_slave_0\x00', 0xdc17, 0x80}) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = semget$private(0x0, 0x4, 0x0) semop(r1, &(0x7f00000003c0)=[{0x0, 0x0, 0x1000}], 0x1) semctl$SEM_INFO(r1, 0x3, 0x10, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) 10:17:48 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:48 executing program 1: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:48 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:48 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:17:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0x8, 0x4) 10:17:48 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x7f000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:48 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) accept4$alg(r1, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 679.613596][T24271] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 10:17:48 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) accept4$alg(r1, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:48 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:48 executing program 1: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:48 executing program 4 (fault-call:7 fault-nth:0): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:48 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) accept4$alg(r1, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 679.833655][T24303] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 10:17:49 executing program 5: unshare(0x2a000400) mknodat(0xffffffffffffffff, &(0x7f0000000100)='.\x00', 0x1, 0x36a) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x9, 0xe9, 0x801, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0, 0x4}, 0x20) futex(&(0x7f0000000040)=0x1, 0xd, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x2, 0x2) 10:17:49 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x80ffffff, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:49 executing program 1: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ttynull\x00', 0x8000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 679.990663][T24570] FAULT_INJECTION: forcing a failure. [ 679.990663][T24570] name failslab, interval 1, probability 0, space 0, times 0 10:17:49 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 680.038638][T24570] CPU: 1 PID: 24570 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0 [ 680.047454][T24570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.057601][T24570] Call Trace: [ 680.060899][T24570] dump_stack+0x1fb/0x318 [ 680.065249][T24570] should_fail+0x4b8/0x660 [ 680.069692][T24570] __should_failslab+0xb9/0xe0 [ 680.074469][T24570] ? __se_sys_memfd_create+0x102/0x4b0 [ 680.080104][T24570] should_failslab+0x9/0x20 [ 680.084612][T24570] __kmalloc+0x7a/0x340 [ 680.088787][T24570] __se_sys_memfd_create+0x102/0x4b0 [ 680.094073][T24570] ? do_syscall_64+0x1d/0x1c0 [ 680.098759][T24570] __x64_sys_memfd_create+0x5b/0x70 [ 680.103966][T24570] do_syscall_64+0xf7/0x1c0 [ 680.108489][T24570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.114385][T24570] RIP: 0033:0x45c6b9 [ 680.118408][T24570] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.138052][T24570] RSP: 002b:00007fd8ffdc1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 680.146470][T24570] RAX: ffffffffffffffda RBX: 00007fd8ffdc26d4 RCX: 000000000045c6b9 [ 680.154525][T24570] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1758 [ 680.162581][T24570] RBP: 000000000076bf20 R08: 0000000000082868 R09: 0000000000000001 [ 680.172235][T24570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 680.180297][T24570] R13: 0000000000000bb0 R14: 00000000004cdbc7 R15: 0000000000000000 10:17:49 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:49 executing program 1 (fault-call:7 fault-nth:0): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 680.198109][T24698] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 10:17:49 executing program 4 (fault-call:7 fault-nth:1): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:49 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x90020000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:49 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r5) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x7fffffff, 0x80000000}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r4, 0x0, 0x2d, &(0x7f00000002c0)={0x5, {{0x2, 0x4e22, @multicast2}}}, 0x88) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) r6 = fspick(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x1) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000008, 0x80010, r6, 0x3921e000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r8, 0x6612) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r10 = socket$inet_udp(0x2, 0x2, 0x0) close(r10) splice(r9, 0x0, r10, 0x0, 0x4ffe2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@remote, @in6=@loopback, 0x4e22, 0xfffb, 0x4e22, 0x8000, 0xa, 0x20, 0x0, 0x32, 0x0, r11}, {0x2, 0x7fff, 0x5, 0x8, 0xffffffff, 0x2, 0x6, 0x10001}, {0x101, 0x1, 0xfffffffffffff801, 0x2}, 0x1, 0x6e6bb8, 0x1, 0x0, 0x0, 0x2}, {{@in=@loopback, 0x4d5, 0x32}, 0xa, @in6=@rand_addr="1e4556cf20e7457822b4b2e1d29966b9", 0x3504, 0x5, 0x1, 0x3, 0x6, 0x3, 0x8f6}}, 0xe8) 10:17:49 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 680.370600][T24838] FAULT_INJECTION: forcing a failure. [ 680.370600][T24838] name failslab, interval 1, probability 0, space 0, times 0 10:17:49 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 680.422631][T24917] FAULT_INJECTION: forcing a failure. [ 680.422631][T24917] name failslab, interval 1, probability 0, space 0, times 0 [ 680.450349][T24838] CPU: 0 PID: 24838 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 680.459189][T24838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.470175][T24838] Call Trace: [ 680.473509][T24838] dump_stack+0x1fb/0x318 [ 680.477859][T24838] should_fail+0x4b8/0x660 [ 680.482287][T24838] __should_failslab+0xb9/0xe0 [ 680.487061][T24838] ? __se_sys_memfd_create+0x102/0x4b0 [ 680.492539][T24838] should_failslab+0x9/0x20 [ 680.497173][T24838] __kmalloc+0x7a/0x340 [ 680.501665][T24838] __se_sys_memfd_create+0x102/0x4b0 [ 680.507294][T24838] ? do_syscall_64+0x1d/0x1c0 [ 680.512445][T24838] __x64_sys_memfd_create+0x5b/0x70 [ 680.517668][T24838] do_syscall_64+0xf7/0x1c0 [ 680.522188][T24838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.528283][T24838] RIP: 0033:0x45c6b9 [ 680.532895][T24838] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.553587][T24838] RSP: 002b:00007f28905c9a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 680.562009][T24838] RAX: ffffffffffffffda RBX: 00007f28905ca6d4 RCX: 000000000045c6b9 10:17:49 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xe6030000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 680.569982][T24838] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1758 [ 680.577953][T24838] RBP: 000000000076bf20 R08: 0000000000082825 R09: 0000000000000001 [ 680.585922][T24838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 680.594419][T24838] R13: 0000000000000bb0 R14: 00000000004cdbc7 R15: 0000000000000000 [ 680.602571][T24917] CPU: 1 PID: 24917 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0 [ 680.611252][T24917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.623127][T24917] Call Trace: [ 680.626425][T24917] dump_stack+0x1fb/0x318 [ 680.630906][T24917] should_fail+0x4b8/0x660 [ 680.635352][T24917] __should_failslab+0xb9/0xe0 [ 680.640125][T24917] ? shmem_alloc_inode+0x1b/0x40 [ 680.645777][T24917] should_failslab+0x9/0x20 [ 680.650382][T24917] kmem_cache_alloc+0x56/0x2e0 [ 680.655149][T24917] ? shmem_match+0x180/0x180 [ 680.659745][T24917] shmem_alloc_inode+0x1b/0x40 [ 680.664511][T24917] ? shmem_match+0x180/0x180 [ 680.669108][T24917] new_inode_pseudo+0x68/0x240 [ 680.673885][T24917] new_inode+0x28/0x1c0 [ 680.678056][T24917] shmem_get_inode+0x108/0x6e0 [ 680.682839][T24917] __shmem_file_setup+0x129/0x280 [ 680.687899][T24917] shmem_file_setup+0x2f/0x40 [ 680.692944][T24917] __se_sys_memfd_create+0x281/0x4b0 [ 680.698250][T24917] ? do_syscall_64+0x1d/0x1c0 [ 680.703032][T24917] __x64_sys_memfd_create+0x5b/0x70 [ 680.708240][T24917] do_syscall_64+0xf7/0x1c0 [ 680.712751][T24917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.718645][T24917] RIP: 0033:0x45c6b9 [ 680.722539][T24917] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.742145][T24917] RSP: 002b:00007fd8ffdc1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 680.750570][T24917] RAX: ffffffffffffffda RBX: 00007fd8ffdc26d4 RCX: 000000000045c6b9 [ 680.759158][T24917] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1758 [ 680.767132][T24917] RBP: 000000000076bf20 R08: 0000000000082868 R09: 0000000000000001 [ 680.775632][T24917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 680.783608][T24917] R13: 0000000000000bb0 R14: 00000000004cdbc7 R15: 0000000000000001 10:17:49 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:49 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) r1 = socket$l2tp(0x2, 0x2, 0x73) bind(r1, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:49 executing program 4 (fault-call:7 fault-nth:2): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) [ 680.825324][T25125] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 10:17:49 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xf4000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:50 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:50 executing program 1 (fault-call:7 fault-nth:1): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:50 executing program 5: unshare(0x40080) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) mq_timedreceive(r1, &(0x7f00000000c0)=""/188, 0xbc, 0xa8b5, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:17:50 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101400, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 681.023199][T25337] FAULT_INJECTION: forcing a failure. [ 681.023199][T25337] name failslab, interval 1, probability 0, space 0, times 0 [ 681.051448][T25345] ntfs: (device loop3): parse_options(): Unrecognized mount option . 10:17:50 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xfe030000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 681.124546][T25337] CPU: 0 PID: 25337 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0 [ 681.133326][T25337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.143592][T25337] Call Trace: [ 681.146898][T25337] dump_stack+0x1fb/0x318 [ 681.151268][T25337] should_fail+0x4b8/0x660 [ 681.155713][T25337] __should_failslab+0xb9/0xe0 [ 681.160626][T25337] ? security_inode_alloc+0x36/0x1e0 [ 681.165925][T25337] should_failslab+0x9/0x20 [ 681.172317][T25337] kmem_cache_alloc+0x56/0x2e0 [ 681.177090][T25337] ? rcu_read_lock_sched_held+0x10b/0x170 [ 681.182829][T25337] security_inode_alloc+0x36/0x1e0 [ 681.187971][T25337] inode_init_always+0x3b5/0x8f0 [ 681.192921][T25337] ? shmem_match+0x180/0x180 [ 681.197520][T25337] new_inode_pseudo+0x7f/0x240 [ 681.202292][T25337] new_inode+0x28/0x1c0 [ 681.206476][T25337] shmem_get_inode+0x108/0x6e0 [ 681.211272][T25337] __shmem_file_setup+0x129/0x280 [ 681.216428][T25337] shmem_file_setup+0x2f/0x40 [ 681.221209][T25337] __se_sys_memfd_create+0x281/0x4b0 [ 681.226496][T25337] ? do_syscall_64+0x1d/0x1c0 [ 681.231379][T25337] __x64_sys_memfd_create+0x5b/0x70 [ 681.236607][T25337] do_syscall_64+0xf7/0x1c0 [ 681.241153][T25337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.247052][T25337] RIP: 0033:0x45c6b9 [ 681.250955][T25337] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:17:50 executing program 5: unshare(0x2a000400) restart_syscall() openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f00000004c0)="7c74f98e20dc94bdb46a0306019fd2d2a4a18cd52eac11de35f9ac6c95e6fee5e9dbc42f4a923722a99e54929d7f6812b7d2fc7ca964341b72c5fd97d6c06664b901392e475f49b40575", &(0x7f0000000540), 0x4}, 0x20) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r3, 0xc0884123, &(0x7f00000001c0)={0x4, "7167ac4019b08fedadffa66d2f4b85b1c6c448257352e4bfd874f7df6dc48f46c719e1e06310ab759b62c9e0ba5973591ec50af857f4f0640a724728cf11133f", {0x3, 0xfffffffffffffffe}}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) connect$pptp(r1, &(0x7f00000000c0)={0x18, 0x2, {0x1, @empty}}, 0x1e) sendmsg$NFQNL_MSG_VERDICT(r3, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1f0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 10:17:50 executing program 0: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 681.270594][T25337] RSP: 002b:00007fd8ffdc1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 681.279003][T25337] RAX: ffffffffffffffda RBX: 00007fd8ffdc26d4 RCX: 000000000045c6b9 [ 681.286980][T25337] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1758 [ 681.294954][T25337] RBP: 000000000076bf20 R08: 0000000000082868 R09: 0000000000000001 [ 681.302928][T25337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 681.310897][T25337] R13: 0000000000000bb0 R14: 00000000004cdbc7 R15: 0000000000000002 10:17:50 executing program 4 (fault-call:7 fault-nth:3): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:50 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:50 executing program 0: unshare(0x2a000400) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 681.437814][T25559] FAULT_INJECTION: forcing a failure. [ 681.437814][T25559] name failslab, interval 1, probability 0, space 0, times 0 [ 681.494513][T25559] CPU: 1 PID: 25559 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 681.503343][T25559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.513967][T25559] Call Trace: [ 681.517287][T25559] dump_stack+0x1fb/0x318 [ 681.521635][T25559] should_fail+0x4b8/0x660 [ 681.526503][T25559] __should_failslab+0xb9/0xe0 [ 681.531452][T25559] ? shmem_alloc_inode+0x1b/0x40 [ 681.536408][T25559] should_failslab+0x9/0x20 [ 681.540922][T25559] kmem_cache_alloc+0x56/0x2e0 [ 681.545777][T25559] ? shmem_match+0x180/0x180 [ 681.550388][T25559] shmem_alloc_inode+0x1b/0x40 [ 681.555158][T25559] ? shmem_match+0x180/0x180 [ 681.559818][T25559] new_inode_pseudo+0x68/0x240 [ 681.564705][T25559] new_inode+0x28/0x1c0 [ 681.569055][T25559] shmem_get_inode+0x108/0x6e0 [ 681.569347][T25716] FAULT_INJECTION: forcing a failure. [ 681.569347][T25716] name failslab, interval 1, probability 0, space 0, times 0 [ 681.573917][T25559] __shmem_file_setup+0x129/0x280 [ 681.573937][T25559] shmem_file_setup+0x2f/0x40 [ 681.573954][T25559] __se_sys_memfd_create+0x281/0x4b0 [ 681.573978][T25559] ? do_syscall_64+0x1d/0x1c0 [ 681.607538][T25559] __x64_sys_memfd_create+0x5b/0x70 [ 681.612879][T25559] do_syscall_64+0xf7/0x1c0 [ 681.617394][T25559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.623285][T25559] RIP: 0033:0x45c6b9 [ 681.627178][T25559] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.646961][T25559] RSP: 002b:00007f28905c9a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 681.655376][T25559] RAX: ffffffffffffffda RBX: 00007f28905ca6d4 RCX: 000000000045c6b9 [ 681.663343][T25559] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1758 [ 681.671321][T25559] RBP: 000000000076bf20 R08: 0000000000082825 R09: 0000000000000001 [ 681.679325][T25559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 681.687298][T25559] R13: 0000000000000bb0 R14: 00000000004cdbc7 R15: 0000000000000001 [ 681.695295][T25716] CPU: 0 PID: 25716 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0 [ 681.703980][T25716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.714147][T25716] Call Trace: [ 681.717447][T25716] dump_stack+0x1fb/0x318 [ 681.721801][T25716] should_fail+0x4b8/0x660 [ 681.724133][T25631] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 681.726239][T25716] __should_failslab+0xb9/0xe0 [ 681.726251][T25716] ? __d_alloc+0x2d/0x6e0 [ 681.726264][T25716] should_failslab+0x9/0x20 [ 681.748107][T25716] kmem_cache_alloc+0x56/0x2e0 [ 681.752907][T25716] __d_alloc+0x2d/0x6e0 [ 681.757077][T25716] ? lockdep_init_map+0x2a/0x670 [ 681.762436][T25716] d_alloc_pseudo+0x1d/0x70 [ 681.767578][T25716] alloc_file_pseudo+0xc3/0x260 [ 681.772496][T25716] __shmem_file_setup+0x1a2/0x280 [ 681.777560][T25716] shmem_file_setup+0x2f/0x40 [ 681.782258][T25716] __se_sys_memfd_create+0x281/0x4b0 [ 681.787567][T25716] ? do_syscall_64+0x1d/0x1c0 [ 681.792240][T25716] __x64_sys_memfd_create+0x5b/0x70 [ 681.797555][T25716] do_syscall_64+0xf7/0x1c0 [ 681.802083][T25716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.808215][T25716] RIP: 0033:0x45c6b9 [ 681.812114][T25716] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.831900][T25716] RSP: 002b:00007fd8ffdc1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 10:17:50 executing program 1 (fault-call:7 fault-nth:2): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:50 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xffff0300, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:51 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x0, 0xffffffffffffffff, 0x800, [], 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) [ 681.840341][T25716] RAX: ffffffffffffffda RBX: 00007fd8ffdc26d4 RCX: 000000000045c6b9 [ 681.848319][T25716] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1758 [ 681.856317][T25716] RBP: 000000000076bf20 R08: 0000000000082868 R09: 0000000000000001 [ 681.864294][T25716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 681.872384][T25716] R13: 0000000000000bb0 R14: 00000000004cdbc7 R15: 0000000000000003 10:17:51 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) pipe(&(0x7f0000000180)) r5 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r5, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2, r4}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:51 executing program 4 (fault-call:7 fault-nth:4): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:51 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 682.045008][T25957] FAULT_INJECTION: forcing a failure. [ 682.045008][T25957] name failslab, interval 1, probability 0, space 0, times 0 [ 682.093727][T26045] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 682.102202][T25957] CPU: 0 PID: 25957 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 682.110894][T25957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.122180][T25957] Call Trace: [ 682.125493][T25957] dump_stack+0x1fb/0x318 [ 682.129850][T25957] should_fail+0x4b8/0x660 [ 682.134314][T25957] __should_failslab+0xb9/0xe0 [ 682.139085][T25957] ? security_inode_alloc+0x36/0x1e0 [ 682.144386][T25957] should_failslab+0x9/0x20 [ 682.148986][T25957] kmem_cache_alloc+0x56/0x2e0 [ 682.153761][T25957] ? rcu_read_lock_sched_held+0x10b/0x170 [ 682.159516][T25957] security_inode_alloc+0x36/0x1e0 [ 682.164636][T25957] inode_init_always+0x3b5/0x8f0 [ 682.169582][T25957] ? shmem_match+0x180/0x180 [ 682.174179][T25957] new_inode_pseudo+0x7f/0x240 [ 682.179055][T25957] new_inode+0x28/0x1c0 [ 682.183242][T25957] shmem_get_inode+0x108/0x6e0 [ 682.188117][T25957] __shmem_file_setup+0x129/0x280 [ 682.193161][T25957] shmem_file_setup+0x2f/0x40 [ 682.197846][T25957] __se_sys_memfd_create+0x281/0x4b0 [ 682.203137][T25957] ? do_syscall_64+0x1d/0x1c0 [ 682.207820][T25957] __x64_sys_memfd_create+0x5b/0x70 [ 682.213037][T25957] do_syscall_64+0xf7/0x1c0 [ 682.217646][T25957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.223637][T25957] RIP: 0033:0x45c6b9 [ 682.227535][T25957] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 682.247930][T25957] RSP: 002b:00007f28905c9a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 682.257068][T25957] RAX: ffffffffffffffda RBX: 00007f28905ca6d4 RCX: 000000000045c6b9 [ 682.265045][T25957] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1758 [ 682.273203][T25957] RBP: 000000000076bf20 R08: 0000000000082825 R09: 0000000000000001 [ 682.281270][T25957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 10:17:51 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xffffff80, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 682.289250][T25957] R13: 0000000000000bb0 R14: 00000000004cdbc7 R15: 0000000000000002 [ 682.324178][T26063] FAULT_INJECTION: forcing a failure. [ 682.324178][T26063] name failslab, interval 1, probability 0, space 0, times 0 [ 682.342536][T26063] CPU: 0 PID: 26063 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0 [ 682.351428][T26063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.361661][T26063] Call Trace: [ 682.364981][T26063] dump_stack+0x1fb/0x318 [ 682.369439][T26063] should_fail+0x4b8/0x660 [ 682.373938][T26063] __should_failslab+0xb9/0xe0 [ 682.378822][T26063] ? __alloc_file+0x2c/0x390 [ 682.383428][T26063] should_failslab+0x9/0x20 [ 682.388033][T26063] kmem_cache_alloc+0x56/0x2e0 [ 682.392961][T26063] __alloc_file+0x2c/0x390 [ 682.397565][T26063] alloc_empty_file+0xac/0x1b0 [ 682.402345][T26063] alloc_file+0x60/0x4c0 [ 682.406614][T26063] alloc_file_pseudo+0x1d4/0x260 [ 682.411707][T26063] __shmem_file_setup+0x1a2/0x280 [ 682.416758][T26063] shmem_file_setup+0x2f/0x40 [ 682.421456][T26063] __se_sys_memfd_create+0x281/0x4b0 [ 682.426756][T26063] ? do_syscall_64+0x1d/0x1c0 [ 682.431598][T26063] __x64_sys_memfd_create+0x5b/0x70 [ 682.436929][T26063] do_syscall_64+0xf7/0x1c0 [ 682.441461][T26063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.447495][T26063] RIP: 0033:0x45c6b9 [ 682.451389][T26063] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:17:51 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:51 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000003c0)) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:51 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 682.471424][T26063] RSP: 002b:00007fd8ffdc1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 682.479840][T26063] RAX: ffffffffffffffda RBX: 00007fd8ffdc26d4 RCX: 000000000045c6b9 [ 682.487812][T26063] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1758 [ 682.495800][T26063] RBP: 000000000076bf20 R08: 0000000000082868 R09: 0000000000000001 [ 682.503777][T26063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 682.511744][T26063] R13: 0000000000000bb0 R14: 00000000004cdbc7 R15: 0000000000000004 10:17:51 executing program 1 (fault-call:7 fault-nth:3): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) [ 682.579472][T26322] xt_hashlimit: overflow, try lower: 1125899906842624/4 [ 682.618806][T26325] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:51 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:51 executing program 4 (fault-call:7 fault-nth:5): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:51 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x10000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:51 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000003c0)) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 682.841619][T26544] FAULT_INJECTION: forcing a failure. [ 682.841619][T26544] name failslab, interval 1, probability 0, space 0, times 0 [ 682.890207][T26549] xt_hashlimit: overflow, try lower: 4503599627370496/4 [ 682.899379][T26547] FAULT_INJECTION: forcing a failure. [ 682.899379][T26547] name failslab, interval 1, probability 0, space 0, times 0 [ 682.912301][T26544] CPU: 0 PID: 26544 Comm: syz-executor.1 Not tainted 5.6.0-rc2-syzkaller #0 [ 682.920992][T26544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.923465][T26554] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 [ 682.931164][T26544] Call Trace: [ 682.931186][T26544] dump_stack+0x1fb/0x318 [ 682.931207][T26544] should_fail+0x4b8/0x660 [ 682.931230][T26544] __should_failslab+0xb9/0xe0 [ 682.958943][T26544] ? __d_alloc+0x2d/0x6e0 [ 682.964855][T26544] should_failslab+0x9/0x20 [ 682.969367][T26544] kmem_cache_alloc+0x56/0x2e0 [ 682.974142][T26544] __d_alloc+0x2d/0x6e0 [ 682.978312][T26544] ? lockdep_init_map+0x2a/0x670 [ 682.984131][T26544] d_alloc_pseudo+0x1d/0x70 10:17:52 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x20010000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 682.988681][T26544] alloc_file_pseudo+0xc3/0x260 [ 682.994259][T26544] __shmem_file_setup+0x1a2/0x280 [ 682.999429][T26544] shmem_file_setup+0x2f/0x40 [ 683.004393][T26544] __se_sys_memfd_create+0x281/0x4b0 [ 683.009693][T26544] ? do_syscall_64+0x1d/0x1c0 [ 683.015688][T26544] __x64_sys_memfd_create+0x5b/0x70 [ 683.020907][T26544] do_syscall_64+0xf7/0x1c0 [ 683.025786][T26544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.032207][T26544] RIP: 0033:0x45c6b9 [ 683.036106][T26544] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.056764][T26544] RSP: 002b:00007f28905c9a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 683.065189][T26544] RAX: ffffffffffffffda RBX: 00007f28905ca6d4 RCX: 000000000045c6b9 [ 683.073168][T26544] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1758 [ 683.082748][T26544] RBP: 000000000076bf20 R08: 0000000000082825 R09: 0000000000000001 [ 683.095063][T26544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 683.103650][T26544] R13: 0000000000000bb0 R14: 00000000004cdbc7 R15: 0000000000000003 [ 683.150358][T26547] CPU: 0 PID: 26547 Comm: syz-executor.4 Not tainted 5.6.0-rc2-syzkaller #0 [ 683.159695][T26547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.170455][T26547] Call Trace: [ 683.173942][T26547] dump_stack+0x1fb/0x318 [ 683.178452][T26547] should_fail+0x4b8/0x660 [ 683.182904][T26547] __should_failslab+0xb9/0xe0 [ 683.183530][T26769] xt_hashlimit: overflow, try lower: 9008298766368768/4 10:17:52 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f00000003c0)) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 683.187771][T26547] ? security_file_alloc+0x36/0x200 [ 683.187785][T26547] should_failslab+0x9/0x20 [ 683.187797][T26547] kmem_cache_alloc+0x56/0x2e0 [ 683.187816][T26547] security_file_alloc+0x36/0x200 [ 683.187832][T26547] __alloc_file+0xde/0x390 [ 683.187850][T26547] alloc_empty_file+0xac/0x1b0 [ 683.225951][T26547] alloc_file+0x60/0x4c0 [ 683.230403][T26547] alloc_file_pseudo+0x1d4/0x260 [ 683.235368][T26547] __shmem_file_setup+0x1a2/0x280 [ 683.242080][T26547] shmem_file_setup+0x2f/0x40 [ 683.247401][T26547] __se_sys_memfd_create+0x281/0x4b0 [ 683.253342][T26547] ? do_syscall_64+0x1d/0x1c0 [ 683.258044][T26547] __x64_sys_memfd_create+0x5b/0x70 [ 683.263425][T26547] do_syscall_64+0xf7/0x1c0 [ 683.267957][T26547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.273853][T26547] RIP: 0033:0x45c6b9 [ 683.277755][T26547] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.300236][T26547] RSP: 002b:00007fd8ffdc1a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 683.300482][T26785] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 [ 683.309020][T26547] RAX: ffffffffffffffda RBX: 00007fd8ffdc26d4 RCX: 000000000045c6b9 [ 683.309027][T26547] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1758 [ 683.309032][T26547] RBP: 000000000076bf20 R08: 0000000000082868 R09: 0000000000000001 10:17:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:52 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xd0280000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 683.309037][T26547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 683.309043][T26547] R13: 0000000000000bb0 R14: 00000000004cdbc7 R15: 0000000000000005 10:17:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:52 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82825, 0x0) 10:17:52 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:52 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x100000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:52 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x82868, 0x0) 10:17:52 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(&(0x7f0000000180)) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 683.816779][T26992] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:53 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x200000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:53 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0xb, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:53 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x300000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:53 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x2, 0x0, 0x0, 0x82868, 0x0) [ 684.052356][T27146] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:53 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:53 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x700000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:53 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x2, 0x0, 0x0, 0x82825, 0x0) 10:17:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:53 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x3, 0x0, 0x0, 0x82868, 0x0) 10:17:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:53 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x6) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 684.572087][T27629] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:53 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xa00000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:53 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x3, 0x0, 0x0, 0x82825, 0x0) 10:17:53 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4, 0x0, 0x0, 0x82868, 0x0) 10:17:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 684.763872][T27748] xt_hashlimit: overflow, try lower: 720575940379279360/4 [ 684.928783][T27950] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:54 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x3f00000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:54 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 685.001246][T27961] xt_hashlimit: overflow, try lower: 4539628424389459968/4 10:17:54 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:54 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4, 0x0, 0x0, 0x82825, 0x0) 10:17:54 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5, 0x0, 0x0, 0x82868, 0x0) 10:17:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 685.235070][T28173] xt_hashlimit: overflow, try lower: 4611686018427387904/4 10:17:54 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:54 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6, 0x0, 0x0, 0x82868, 0x0) [ 685.464801][T28477] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:54 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x6003000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 685.532791][T28488] __ntfs_error: 3 callbacks suppressed [ 685.532799][T28488] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:54 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5, 0x0, 0x0, 0x82825, 0x0) 10:17:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 685.657158][T28496] xt_hashlimit: overflow, try lower: 6918373452571213824/4 10:17:54 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:54 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7, 0x0, 0x0, 0x82868, 0x0) 10:17:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:54 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 685.826393][T28661] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:54 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x7f00000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 685.892461][T28712] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:55 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6, 0x0, 0x0, 0x82825, 0x0) 10:17:55 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000380)={{0xa, 0x2, 0x3ff, 0x1, 'syz0\x00', 0x8000}, 0x0, [0xfffffffffffffffc, 0x3f, 0x9, 0x7, 0x474, 0xdc75, 0x3ff, 0x172, 0x5399, 0x81, 0x9f, 0x545c28d6, 0x136, 0x6, 0x8, 0x0, 0x0, 0x39, 0x651, 0x3, 0x1000, 0x2, 0x0, 0x7, 0x6, 0x100000001, 0xffffffffffffff4b, 0x4, 0x7, 0x11, 0x5, 0x4, 0x100000000, 0x3, 0x5dd, 0x1, 0xfffffffffffffff9, 0x1, 0x8, 0xb8, 0x78, 0x4, 0x101, 0x1ff8000000000, 0x3d6, 0x4, 0x6, 0x0, 0x7ff, 0xffffffffffff201a, 0x7fffffff, 0x2, 0x3, 0x80, 0x8, 0xb1, 0x8, 0x4, 0x7, 0x7fff, 0x40, 0x3, 0x75f, 0xbcf, 0x1000, 0x100000001, 0x6, 0x4318000000000000, 0xdd, 0xb93c, 0x3, 0x3, 0x9, 0x200, 0xff, 0x5, 0xde, 0xc5fc, 0xfffffffffffffffa, 0x6, 0x2, 0x101, 0x6, 0x7e7e, 0x9, 0x80000001, 0xfffffffffffffd9a, 0x8000, 0x2, 0x3, 0x1000, 0x80000001, 0x4e, 0x80, 0x3, 0x7fff, 0x1, 0x8, 0x1, 0x0, 0x5, 0x4, 0x6, 0x5, 0x1, 0x7, 0x5, 0x8000, 0x6, 0x361, 0x4, 0x54300014, 0x0, 0x83, 0xfffffffffffffffb, 0x400, 0x2, 0x8f, 0x8000, 0x1, 0x77, 0x1, 0x40, 0x10001, 0x20, 0x7, 0x0, 0x514a1249]}) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) [ 685.974638][T28808] xt_hashlimit: overflow, try lower: 9151314442816847872/4 10:17:55 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x8, 0x0, 0x0, 0x82868, 0x0) [ 686.083139][T28903] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) pipe(&(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:55 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x80ffffff00000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 686.148276][T29028] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:55 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7, 0x0, 0x0, 0x82825, 0x0) 10:17:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) pipe(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a40)='TIPCv2\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:55 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) socket$inet6(0xa, 0xb, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:55 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x9002000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) pipe(0x0) syz_genetlink_get_family_id$tipc2(0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)="46c439ff0cdd49d0a6f8204f489285de2c23366b37c48d5286bed7362ff076b760b0e46f8fc1fbe7690ce4e9a840fafc75299b08aff3c293c4cb355461586bf47709e977350125f09b2e837fd215df8a35828f0a00dc944cb509afc4e52d2f30151e1e50c41b69d6d4aebcc5"}, 0x20) 10:17:55 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x9, 0x0, 0x0, 0x82868, 0x0) 10:17:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) pipe(0x0) syz_genetlink_get_family_id$tipc2(0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 686.451817][T29354] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 686.487827][T29345] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:55 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xe603000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:55 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x8, 0x0, 0x0, 0x82825, 0x0) [ 686.624769][T29515] xt_hashlimit: overflow, try lower: 16574091053653557248/4 10:17:55 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000091fa8)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, 0x0) pipe(0x0) syz_genetlink_get_family_id$tipc2(0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 10:17:55 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 686.741879][T29698] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:55 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xa, 0x0, 0x0, 0x82868, 0x0) 10:17:55 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xf400000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:55 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x9, 0x0, 0x0, 0x82825, 0x0) [ 686.831386][T29771] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 [ 686.899188][T29822] xt_hashlimit: overflow, try lower: 17582052945254416384/4 10:17:56 executing program 0: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x2, 0x0, 0x0, 0x82825, 0x0) [ 687.002854][T29986] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:56 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xa, 0x0, 0x0, 0x82825, 0x0) 10:17:56 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xfe03000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:56 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 687.175809][T30140] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:56 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xb, 0x0, 0x0, 0x82825, 0x0) 10:17:56 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xb, 0x0, 0x0, 0x82868, 0x0) 10:17:56 executing program 0: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x2, 0x0, 0x0, 0x82825, 0x0) [ 687.226175][T30169] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:56 executing program 0: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x2, 0x0, 0x0, 0x82825, 0x0) [ 687.402399][T30387] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:56 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xffff030000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:56 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:56 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xc, 0x0, 0x0, 0x82825, 0x0) 10:17:56 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xc, 0x0, 0x0, 0x82868, 0x0) 10:17:56 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 687.574530][T30519] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:56 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0xffffffff00000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 687.699345][T30646] hashlimit_mt_check_common: 1 callbacks suppressed [ 687.699353][T30646] xt_hashlimit: overflow, try lower: 18446744069414584320/4 [ 687.722187][T30686] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 687.728724][T30676] xt_hashlimit: overflow, try lower: 1125899906842624/4 10:17:56 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xd, 0x0, 0x0, 0x82825, 0x0) 10:17:56 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:56 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:56 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x104, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:57 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xd, 0x0, 0x0, 0x82868, 0x0) 10:17:57 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 687.924336][T30940] xt_hashlimit: overflow, try lower: 1125899906842624/4 [ 687.989879][T30939] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 [ 688.003881][T30996] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 688.007849][T31002] xt_hashlimit: overflow, try lower: 1125899906842624/4 10:17:57 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x2101, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:57 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:57 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xe, 0x0, 0x0, 0x82825, 0x0) 10:17:57 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xe, 0x0, 0x0, 0x82868, 0x0) 10:17:57 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:57 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./bus/file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 688.274372][T31270] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:57 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x10, 0x0, 0x0, 0x82825, 0x0) [ 688.377508][T31328] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:57 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x2201, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:57 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:57 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x10, 0x0, 0x0, 0x82868, 0x0) 10:17:57 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 688.561533][T31588] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:57 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:57 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4000, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 688.679064][T31690] xt_hashlimit: overflow, try lower: 1125899906842624/4 [ 688.689655][T31691] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:57 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x11, 0x0, 0x0, 0x82825, 0x0) 10:17:57 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:57 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x11, 0x0, 0x0, 0x82868, 0x0) 10:17:58 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:58 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0xc000, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 688.944255][T32068] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:58 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:58 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x12, 0x0, 0x0, 0x82825, 0x0) 10:17:58 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 689.222826][T32425] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:58 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0xf607, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:58 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x25, 0x0, 0x0, 0x82825, 0x0) 10:17:58 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x12, 0x0, 0x0, 0x82868, 0x0) 10:17:58 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:58 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:58 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:58 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 689.657577][ T384] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:58 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x4}, {0x2, 0x5, r3}, {0x2, 0x2}, {0x2, 0x1}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2}, {0x8, 0x1}, {}, {0x8, 0x2}, {0x8, 0x5}, {0x8, 0x4}], {0x10, 0x3}, {0x20, 0x4}}, 0x7c, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:58 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x48, 0x0, 0x0, 0x82825, 0x0) 10:17:58 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x25, 0x0, 0x0, 0x82868, 0x0) 10:17:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:59 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x2, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 690.022810][ T865] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:59 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:59 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4c, 0x0, 0x0, 0x82825, 0x0) 10:17:59 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x3, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:59 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x48, 0x0, 0x0, 0x82868, 0x0) 10:17:59 executing program 0: socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:59 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_default\x00', 0x0, 0x0, 0x1) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 690.453157][ T1395] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:17:59 executing program 0: socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:59 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x4, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:59 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5c, 0x0, 0x0, 0x82825, 0x0) 10:17:59 executing program 0: socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 690.588599][ T1597] __ntfs_error: 5 callbacks suppressed [ 690.588609][ T1597] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:17:59 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4c, 0x0, 0x0, 0x82868, 0x0) 10:17:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 10:17:59 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x7, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:17:59 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000080)='./file0\x00', 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:17:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 10:17:59 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 10:18:00 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="a7e083d837fd2f5193c406bb6c1d1657ee05a978546f7d326987ca0607d4e54c7b8087da0cb1f521427a7b8922092a8b6194d507ec17adb5001af70a1d3a90e4c148b2f11bf30900000039d83d3c6d6c966f9e6b5e1b05bd32ace9d9eeddb6f530957dbf9032bbb55680a3cd393b6c7bfcdf3b067410c0bc3f5c9f337924ecbba1967debb70e6d3fd2a9cd9ec7561206a307522ee6212f8fd5968653f4596f65e6a0df93929b34b335d7919a4f395f1d7a0073d0174c1a8c366a2225951c5194c45c85a60c5900aa28e86fb7f599627e692f5f09b2a094c4a5b8ff69998c41b4dd01000000099b6ec2f95f33ae6ffc343390a640cdf3c862d442f08fcde37678fd8fe1f181f401c94c56cb20def624127e328c8b9bd1e532e0a2158f48f7bd7a401e8a18f446c591d4569a44234a09d3307853d673a7dd46778a738e4fc4e2d8cbfcc4596c9365989c66080ef807452aa0b3b9de328d85acfd38b4f2195590097121905ed5ca9dc4a41e76cfc78a8934e6be567053d5ef7afd53003f76acb7d512bfa23a0cb29647b125dd565bee836fab4cc229678235d428cb6da1a4121361573b098b897700"/436, @ANYRES16=r3, @ANYBLOB="0100000000000000000004000000"], 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x20044084}, 0x804) lstat(&(0x7f0000000540)='\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @rand_addr=0x2}, 0x4e21, 0x8, 0x4e20, 0x0, 0xa, 0x0, 0x0, 0x3a, 0x0, r4}, {0x6, 0x3, 0x1, 0x7ca, 0x9b32, 0x100000000, 0x7}, {0x401000000000, 0x6, 0x1, 0xbc8}, 0x3, 0x6e6bb3, 0x0, 0x1, 0x0, 0x3}, {{@in6=@remote, 0x4d2, 0xff}, 0xa, @in6=@ipv4={[], [], @multicast2}, 0x3502, 0x4, 0x0, 0x9, 0x9, 0xffffffff, 0x5986}}, 0xe8) pipe(&(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000000bc0)={0x0, 0x9, 0x4, 0x1, 0x3, {0x0, 0x2710}, {0x5, 0x8, 0x3, 0x1, 0xd3, 0x8, "dffb88cc"}, 0x9, 0x3, @offset=0x200, 0x300e, 0x0, r1}) write$UHID_INPUT2(r8, &(0x7f0000000c40)={0xc, {0xbe, "dd3fae9040fb36dcaebae21488e98adac5648cfcfdaa83cd1c852c112e008650fc47b57fa1ab23c52edefd0047ef4c7949d69c6b6018daaba0217f111b7ba8375d3a24319b7666a6aaf7dde65140cab6d76384b53b0818c2e0d483a01b7066b631cd062125d641cc04b6f5aba7ddf435d9b4f8e252a566e3c9dd4ebe79a22f00044019f6cc729c6da3aa384ce8e0b6e6fcf06246b810ea4c323006933ff832d97662928df8188ff7163a57d6ee73ee2144faeac7e1737a03fcb6ae58ad2f"}}, 0xc4) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) splice(r5, 0x0, r9, 0x0, 0x4ffe2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r5, 0x8915, &(0x7f00000001c0)={'veth0_macvtap\x00', {0x2, 0x4e22, @rand_addr=0x8}}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r10, &(0x7f0000000000)=ANY=[], 0xfffffecc) sendmsg$IPCTNL_MSG_CT_NEW(r10, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0xd0, 0x0, 0x1, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x21}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}, @CTA_TUPLE_ORIG={0x1c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1b}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @CTA_NAT_DST={0x48, 0xd, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x25}}, @CTA_NAT_PROTO={0x3c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}]}, @CTA_LABELS_MASK={0x1c, 0x17, [0x8001, 0x7, 0x57c4, 0x6b, 0x1, 0x8]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x20040080}, 0x400c104) unshare(0x2a020400) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x37, 0xe9, 0x804}, 0x40) r12 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/snapshot\x00', 0x101042, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$DRM_IOCTL_AGP_ALLOC(r13, 0xc0206434, &(0x7f0000000800)={0x6, 0x0, 0x10001}) ioctl$DRM_IOCTL_SG_FREE(r12, 0x40106439, &(0x7f0000000840)={0x400, r14}) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r11, 0x0, 0x0}, 0x20) r15 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000880)='/proc/capi/capi20ncci\x00', 0x241080, 0x0) r16 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000900)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r15, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000a40)={0x150, r16, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xe0, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x120000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x52}]}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xe09a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}]}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x32d2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x20}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_NODE={0x24, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}]}, 0x150}, 0x1, 0x0, 0x0, 0xac000}, 0x80) [ 690.873807][ T1940] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 690.953734][ T1983] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:18:00 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xa, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x1f8, 0x238, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 10:18:00 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x68, 0x0, 0x0, 0x82825, 0x0) 10:18:00 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5c, 0x0, 0x0, 0x82868, 0x0) 10:18:00 executing program 5: unshare(0x28000480) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x1f8, 0x238, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) 10:18:00 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) 10:18:00 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6c, 0x0, 0x0, 0x82825, 0x0) 10:18:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d8, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x1f8, 0x238, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x438) [ 691.243135][ T2428] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 691.267520][ T2384] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:18:00 executing program 5: unshare(0x2a000400) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000000c0)={0xf000, 0x100000, 0x9, 0x1, 0x50}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x3b, 0xe9, 0x801, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3fffffc}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000140), 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000100)={0x400000000000000, 0x200, 0x17b, 0x563b}) 10:18:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:00 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x10, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:00 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x68, 0x0, 0x0, 0x82868, 0x0) [ 691.414877][ T2729] xt_hashlimit: overflow, try lower: 1125899906842624/4 10:18:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e0, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x340) 10:18:00 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0xffffffffffffeb7f, 0x0, 0x0, 0x82800, 0x0) [ 691.501818][ T2874] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e0, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x340) 10:18:00 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xf4, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:00 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6c, 0x0, 0x0, 0x82868, 0x0) [ 691.624511][ T3000] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 10:18:00 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x74, 0x0, 0x0, 0x82825, 0x0) 10:18:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e0, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x340) [ 691.765139][ T3135] xt_hashlimit: Unknown mode mask F4, kernel too old? 10:18:00 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x82800, 0x0) 10:18:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:01 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x290, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 691.883360][ T3318] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:01 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x74, 0x0, 0x0, 0x82868, 0x0) 10:18:01 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7a, 0x0, 0x0, 0x82825, 0x0) [ 691.983744][ T3433] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 [ 691.991273][ T3436] xt_hashlimit: Unknown mode mask 290, kernel too old? 10:18:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:01 executing program 5: epoll_create(0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r1, 0x53, 0x0, 0x2000402) fallocate(r0, 0x0, 0x7fff, 0x110005) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x30, r4, 0x5, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x9}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xd9a}]}, 0x30}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9d}]}, 0x24}, 0x1, 0x0, 0x0, 0xc0}, 0x10000000) unshare(0x2a000400) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r5, 0x0, 0x0}, 0x20) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x8, 0x4, 0x8, 0x8, 0x10000, 0x7ff}) 10:18:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:01 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x300, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:01 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:18:01 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x300, 0x0, 0x0, 0x82825, 0x0) [ 692.233650][ T3792] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 692.264550][ T3795] xt_hashlimit: Unknown mode mask 300, kernel too old? 10:18:01 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3ff, 0x200200) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f00000000c0)={0x1, 0x401, 0x8, 0x9, 0x2, 0x54}) unshare(0x2a000400) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:01 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x360, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:01 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7a, 0x0, 0x0, 0x82868, 0x0) [ 692.358149][ T3906] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 [ 692.416866][ T4029] xt_hashlimit: overflow, try lower: 1125899906842624/0 [ 692.433081][ T4077] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 692.491669][ T4154] xt_hashlimit: Unknown mode mask 360, kernel too old? 10:18:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:01 executing program 5: unshare(0x2a000400) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) dup2(r0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000140)={@local, 0x0}, &(0x7f00000001c0)=0x14) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x2039, 0xe9, 0x1, 0x0, 0xffffffffffffffff, 0x1, [], r5, r0, 0x810, 0x0, 0x3}, 0x40) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000100)=0x2) getsockopt$IP_SET_OP_GET_FNAME(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000200)=0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r6, 0x0, 0x0}, 0x20) 10:18:01 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x500, 0x0, 0x0, 0x82825, 0x0) 10:18:01 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x3e6, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:01 executing program 3: mkdir(0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@uid_eq={'uid', 0x3d, r3}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) pipe(0x0) r4 = socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETGROUP(r4, 0x400454ce, 0x0) socket$inet6(0xa, 0x0, 0x6) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:18:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 692.639942][ T4335] xt_hashlimit: overflow, try lower: 1125899906842624/0 [ 692.675816][ T4357] xt_hashlimit: Unknown mode mask 3E6, kernel too old? 10:18:01 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x300, 0x0, 0x0, 0x82868, 0x0) [ 692.768004][ T4600] xt_hashlimit: overflow, try lower: 1125899906842624/0 [ 692.778175][ T4462] ntfs: (device loop3): parse_options(): Invalid uid option argument: 00000000004294967295 [ 692.799819][ T4629] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:01 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x18, 0x7, 0xeb, 0x0, 0x200, r1, 0x10000, [], 0x0, r2, 0x2, 0x3, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:01 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x3fe, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 692.913105][ T4679] xt_hashlimit: Unknown mode mask 3FE, kernel too old? 10:18:02 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x600, 0x0, 0x0, 0x82825, 0x0) 10:18:02 executing program 3: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) r1 = socket$l2tp(0x2, 0x2, 0x73) bind(r1, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:02 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) ioctl$FBIOPAN_DISPLAY(r1, 0x4606, &(0x7f00000000c0)={0xa00, 0x40, 0x578, 0x1000, 0x81, 0x7ff, 0x1, 0x1, {0x40, 0x1, 0x1}, {0xbad, 0xffff5dfe}, {0x80, 0x8, 0x1}, {0x9, 0x1000}, 0x2, 0x2, 0x1, 0x6, 0x1, 0x8001, 0xff, 0x6, 0xad41, 0x2, 0x4, 0x1a, 0x3, 0x200, 0x3, 0xc}) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0xd) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:02 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x700, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 693.152710][ T5045] xt_hashlimit: Unknown mode mask 700, kernel too old? [ 693.184723][ T5099] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:02 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x500, 0x0, 0x0, 0x82868, 0x0) 10:18:02 executing program 3: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) r1 = socket$l2tp(0x2, 0x2, 0x73) bind(r1, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:02 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x700, 0x0, 0x0, 0x82825, 0x0) 10:18:02 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xa00, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:02 executing program 3: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) r1 = socket$l2tp(0x2, 0x2, 0x73) bind(r1, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:02 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='ip6gretap0\x00', 0x10) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f00000000c0)=0x2, 0x4) [ 693.420860][ T5292] xt_hashlimit: Unknown mode mask A00, kernel too old? 10:18:02 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 693.537150][ T5380] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:02 executing program 3: unshare(0x2a000400) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:02 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x3f00, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:02 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x900, 0x0, 0x0, 0x82825, 0x0) [ 693.606673][ T5523] FAULT_INJECTION: forcing a failure. [ 693.606673][ T5523] name failslab, interval 1, probability 0, space 0, times 0 [ 693.656009][ T5608] xt_hashlimit: Unknown mode mask 3F00, kernel too old? [ 693.672990][ T5523] CPU: 0 PID: 5523 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 693.681794][ T5523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.692996][ T5523] Call Trace: [ 693.696408][ T5523] dump_stack+0x1fb/0x318 [ 693.700758][ T5523] should_fail+0x4b8/0x660 10:18:02 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x600, 0x0, 0x0, 0x82868, 0x0) 10:18:02 executing program 5: unshare(0x2a000400) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x26) 10:18:02 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x4000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 693.705192][ T5523] __should_failslab+0xb9/0xe0 [ 693.710581][ T5523] should_failslab+0x9/0x20 [ 693.719096][ T5523] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 693.724916][ T5523] ? __kmalloc_node+0x3c/0x60 [ 693.729641][ T5523] __kmalloc_node+0x3c/0x60 [ 693.734255][ T5523] kvmalloc_node+0x85/0x110 [ 693.738778][ T5523] xt_alloc_table_info+0x45/0xb0 [ 693.746503][ T5523] do_ip6t_set_ctl+0x204/0x550 [ 693.752862][ T5523] nf_setsockopt+0x27a/0x2a0 [ 693.762857][ T5523] ipv6_setsockopt+0x9a/0x160 [ 693.767544][ T5523] rawv6_setsockopt+0x2cc/0x490 [ 693.772415][ T5523] sock_common_setsockopt+0x99/0xb0 [ 693.777612][ T5523] ? sock_common_recvmsg+0x190/0x190 [ 693.783292][ T5523] __sys_setsockopt+0x582/0x720 [ 693.788177][ T5523] __x64_sys_setsockopt+0xbf/0xd0 [ 693.793216][ T5523] do_syscall_64+0xf7/0x1c0 [ 693.797743][ T5523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.812582][ T5523] RIP: 0033:0x45c6b9 [ 693.816481][ T5523] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.836090][ T5523] RSP: 002b:00007fac756f6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 693.844534][ T5523] RAX: ffffffffffffffda RBX: 00007fac756f76d4 RCX: 000000000045c6b9 10:18:03 executing program 3: unshare(0x2a000400) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bind(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) [ 693.852508][ T5523] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 693.860486][ T5523] RBP: 000000000076bf20 R08: 0000000000000490 R09: 0000000000000000 [ 693.868462][ T5523] R10: 0000000020000500 R11: 0000000000000246 R12: 0000000000000004 [ 693.876436][ T5523] R13: 0000000000000a09 R14: 00000000004d59b0 R15: 0000000000000000 10:18:03 executing program 0 (fault-call:1 fault-nth:1): r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 693.941912][ T5817] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 693.980524][ T5819] xt_hashlimit: Unknown mode mask 4000, kernel too old? 10:18:03 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x400, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f0000000140)={0x10000008}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x3ff, @rand_addr="723b942cf55fd2a9c9de5c5e32033f8b", 0x4}, @in6={0xa, 0x4e22, 0x100, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1f}], 0x38) unshare(0x2a000400) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r3, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r4, 0x0, r6, 0x0, 0x4ffe2, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xb654) getpeername$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) [ 693.994122][ T5825] FAULT_INJECTION: forcing a failure. [ 693.994122][ T5825] name failslab, interval 1, probability 0, space 0, times 0 [ 694.054091][ T5825] CPU: 1 PID: 5825 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 694.062729][ T5825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.073570][ T5825] Call Trace: [ 694.076868][ T5825] dump_stack+0x1fb/0x318 [ 694.081192][ T5825] should_fail+0x4b8/0x660 [ 694.085601][ T5825] __should_failslab+0xb9/0xe0 [ 694.090455][ T5825] should_failslab+0x9/0x20 [ 694.095063][ T5825] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 694.100772][ T5825] ? __kmalloc_node+0x3c/0x60 [ 694.105439][ T5825] __kmalloc_node+0x3c/0x60 [ 694.110656][ T5825] kvmalloc_node+0x85/0x110 [ 694.115177][ T5825] xt_alloc_entry_offsets+0x43/0x50 [ 694.121053][ T5825] translate_table+0x10a/0x22e0 [ 694.126455][ T5825] ? __kasan_check_write+0x14/0x20 [ 694.136372][ T5825] do_ip6t_set_ctl+0x2c3/0x550 [ 694.141285][ T5825] nf_setsockopt+0x27a/0x2a0 [ 694.145871][ T5825] ipv6_setsockopt+0x9a/0x160 [ 694.150537][ T5825] rawv6_setsockopt+0x2cc/0x490 [ 694.155399][ T5825] sock_common_setsockopt+0x99/0xb0 [ 694.160585][ T5825] ? sock_common_recvmsg+0x190/0x190 [ 694.165871][ T5825] __sys_setsockopt+0x582/0x720 [ 694.170737][ T5825] __x64_sys_setsockopt+0xbf/0xd0 [ 694.176039][ T5825] do_syscall_64+0xf7/0x1c0 [ 694.180533][ T5825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.189013][ T5825] RIP: 0033:0x45c6b9 [ 694.194295][ T5825] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 694.214512][ T5825] RSP: 002b:00007fac756f6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 694.223023][ T5825] RAX: ffffffffffffffda RBX: 00007fac756f76d4 RCX: 000000000045c6b9 [ 694.230996][ T5825] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 694.239308][ T5825] RBP: 000000000076bf20 R08: 0000000000000490 R09: 0000000000000000 10:18:03 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xa00, 0x0, 0x0, 0x82825, 0x0) [ 694.247269][ T5825] R10: 0000000020000500 R11: 0000000000000246 R12: 0000000000000004 [ 694.258365][ T5825] R13: 0000000000000a09 R14: 00000000004d59b0 R15: 0000000000000001 10:18:03 executing program 3: unshare(0x2a000400) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bind(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:03 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x6003, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:03 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x40, 0xe9, 0x801, 0x15e, 0xffffffffffffffff, 0x400, [], 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400000, 0x0) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x1008, 0x9, "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"}, &(0x7f0000001140), 0x800) 10:18:03 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x700, 0x0, 0x0, 0x82868, 0x0) [ 694.430657][ T6137] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:03 executing program 0 (fault-call:1 fault-nth:2): r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:03 executing program 3: unshare(0x2a000400) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bind(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) [ 694.549982][ T6220] xt_hashlimit: overflow, try lower: 1125899906842624/4 10:18:03 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x7f00, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:03 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xb00, 0x0, 0x0, 0x82825, 0x0) 10:18:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:03 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:03 executing program 5: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000100)) unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2800, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f00000000c0), 0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r5, 0x84, 0x83, &(0x7f0000000340)={r7}, 0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000140)={r7, 0x0, 0x6, [0x40, 0x3f, 0x7ff, 0xfff, 0x1, 0x0]}, 0x14) [ 694.703504][ T6416] xt_hashlimit: overflow, try lower: 1125899906842624/4 10:18:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x3a, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:03 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x900, 0x0, 0x0, 0x82868, 0x0) 10:18:03 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 694.838180][ T6597] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:03 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:04 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x9002, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:04 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xc00, 0x0, 0x0, 0x82825, 0x0) 10:18:04 executing program 5: unshare(0x70280) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x40000, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000080)=""/172) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xfffffffb, 0xe9, 0x801}, 0x40) 10:18:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:04 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:04 executing program 3: unshare(0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:04 executing program 3: unshare(0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:04 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xa00, 0x0, 0x0, 0x82868, 0x0) 10:18:04 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x6, 0x2000) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000000c0)={0x0, @bt={0x4de, 0x7, 0x0, 0x3, 0x6, 0x3ce7, 0x40000000, 0x0, 0x101, 0xfffffff8, 0x2, 0x2, 0x7, 0x400, 0x9, 0x14, {0x9, 0x6}, 0xb4, 0xff}}) unshare(0x2a000400) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:04 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xe603, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x5, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 695.175582][ T6992] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:04 executing program 3: unshare(0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:04 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xd00, 0x0, 0x0, 0x82825, 0x0) 10:18:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x6, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:04 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xf400, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x7, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:04 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:04 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x40) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="c18f00000040822387c82000000008001a01", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00042abd70b32fdbdf25ff6e4220146f6db90100000007000a00c76f6d6de5d64ffe0004000b000800090001ac0f0008003700010000000400280011000700a2ae7d229ee67daa6cd27c"], 0x50}}, 0x40) [ 695.494495][ T7218] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:04 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xb00, 0x0, 0x0, 0x82868, 0x0) 10:18:04 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:04 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xfe03, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 695.542672][ T7381] netlink: 'syz-executor.5': attribute type 282 has an invalid length. 10:18:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x8, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:04 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xe00, 0x0, 0x0, 0x82825, 0x0) 10:18:04 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:04 executing program 5: unshare(0x2a000400) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x80}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f00000002c0)={&(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x6, 0x3, 0x4, 0x0, 0x6}) r3 = dup(r1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x4ffe2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000340)={'batadv0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) r6 = dup(r0) readlink(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=""/132, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r6, 0x0, 0x0, 0x4}, 0x20) r7 = timerfd_create(0x3, 0x0) vmsplice(r7, &(0x7f0000000040)=[{&(0x7f00000000c0)="00d3bf1dd36a481195b529368be541f9ac796faa47438b289241cdee1ba4158e5d8b112e277b84f88cfada5b1577d96f66be2e3da73bec5dc4a932b2e28dc38dd65951ef0354171125d26ec6660e25ac93166bab60754fbd0aa79122c3a143090a98ccb4", 0x64}], 0x1, 0x8) 10:18:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0xa, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:04 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x12000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0xb, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:04 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xc00, 0x0, 0x0, 0x82868, 0x0) 10:18:04 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) [ 695.843745][ T7745] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:05 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x105a, 0x0, 0x0, 0x82825, 0x0) 10:18:05 executing program 5: unshare(0x2a000400) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000001c0)) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x1, 0x101000) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f00000000c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) write$dsp(0xffffffffffffffff, &(0x7f0000000100)="b7c04a893aaa6391a24898eabb1a0728f17b2097b19b03a3c1aaac92ec958f84cdc7c5610a6492371023abd88c997667f684f00cee7f30cb02f91e6de103d6d56ed05442ac55c0aec3738e17ed7417ea2a7c9a3d001850b0264a79ef4e93387816f3271b62ca87db3584191099d29c472fd3a9a85bfd69cbeeb35da846554daf8324", 0x82) 10:18:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x10, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x3ffff, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) 10:18:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x11, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xd00, 0x0, 0x0, 0x82868, 0x0) [ 696.145091][ T8197] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:05 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x40000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) 10:18:05 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x1100, 0x0, 0x0, 0x82825, 0x0) 10:18:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x12, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 5: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x8001}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r3, 0x0, 0x0}, 0x20) 10:18:05 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x100000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x14, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:05 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xe00, 0x0, 0x0, 0x82868, 0x0) [ 696.469357][ T8582] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:05 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000040)={0x7fff, 0x1, 0xfffff671}, 0xc) unshare(0x2a000400) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:05 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x1200, 0x0, 0x0, 0x82825, 0x0) 10:18:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x200100, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x16, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10) [ 696.772398][ T8990] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:05 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x17, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x105a, 0x0, 0x0, 0x82868, 0x0) 10:18:05 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x28d000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:05 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:05 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x1f00, 0x0, 0x0, 0x82825, 0x0) 10:18:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x18, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:06 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000100)={0x9c0000, 0x5, 0x5, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x990a77, 0xb6, [], @p_u32=&(0x7f0000000040)=0x9}}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000140)={r0, 0x0, 0x0, 0x4}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x4ffe2, 0x0) r6 = dup2(0xffffffffffffffff, r4) ioctl$VIDIOC_QUERYMENU(r6, 0xc02c5625, &(0x7f0000000080)={0x1, 0x12183fb, @value=0x10001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) flock(r8, 0x8) [ 696.971801][ T9229] hashlimit_mt_check_common: 11 callbacks suppressed [ 696.971809][ T9229] xt_hashlimit: Unknown mode mask 28D000, kernel too old? 10:18:06 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e20, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:06 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xd02800, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:06 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x1100, 0x0, 0x0, 0x82868, 0x0) [ 697.151751][ T9525] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 697.163376][ T9538] xt_hashlimit: Unknown mode mask D02800, kernel too old? 10:18:06 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf", 0x8}}}, 0x80) 10:18:06 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:06 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x2000, 0x0, 0x0, 0x82825, 0x0) 10:18:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:06 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x1000000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:06 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr="b2adbc79f87bf877d765ea87bc5eecaf"}}}, 0x80) [ 697.418136][ T9752] xt_hashlimit: Unknown mode mask 1000000, kernel too old? 10:18:06 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x1200, 0x0, 0x0, 0x82868, 0x0) 10:18:06 executing program 5: unshare(0x2a000400) r0 = socket(0x10, 0x2, 0x0) unshare(0x6000400) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x80003, 0xff) close(r3) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000000c0)={r5}, &(0x7f0000000080)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r6, @ANYBLOB="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"]) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0x4ffe2, 0x0) statx(r7, &(0x7f00000000c0)='./file0\x00', 0x0, 0x100, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r6, r9) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8000039, 0xe9, 0x801}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r10, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x400) 10:18:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 697.492037][ T9987] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:06 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x8001}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r3, 0x0, 0x0}, 0x20) 10:18:06 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x2500, 0x0, 0x0, 0x82825, 0x0) 10:18:06 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x2000000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1d, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:06 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x8001}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r3, 0x0, 0x0}, 0x20) 10:18:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1e, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:06 executing program 5: unshare(0x2a000400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x10) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev, r2}, 0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x39, 0x2, 0x801, 0x0, 0xffffffffffffffff, 0x0, [], r3}, 0xffd8) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r4, 0x0, 0x0}, 0x20) 10:18:06 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x1f00, 0x0, 0x0, 0x82868, 0x0) [ 697.760756][T10316] xt_hashlimit: Unknown mode mask 2000000, kernel too old? 10:18:06 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 697.865349][T10440] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:07 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x3000000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:07 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x8001}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r3, 0x0, 0x0}, 0x20) 10:18:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 697.987849][T10543] xt_hashlimit: Unknown mode mask 3000000, kernel too old? 10:18:07 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x3f00, 0x0, 0x0, 0x82825, 0x0) 10:18:07 executing program 5: unshare(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0x1, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) accept(r1, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001340)={r3, &(0x7f0000000340)="aa10fa0093d9e0d5f5ebca250e972bbb03c766a5646a8150e53a370061289e8194c962615505288510910111b30d1c37a6b33391ee8ef9bf63ef3f59adaf653c9ee96a1896296591be4c7f01995366ec5fb0cc81ad755bcc3b6b2ceda243dd3545882bdfb452f5a90e91029e6eabb8746e41a7ef2e810351c71fdaa451e3f72432585237700a372737c773daca10422f6f2915a9f50cbe96a37158abd7e65c665fb43b26d35d1807c152a50f35129e89203f0d70cb15787ed681144aa03f0435033ba8b2fa6e6d04dbafa1a6a8175a5229d29ed5d5742d5fe3f57c73815ab6bbc724258ff1fc51035c35454b873fa321e49a8765616803cae302a69733dd912f0ea721924a14cc1b820e7e5c4280a466b0c0be53da69f079435a23d54d61b8cc1dba3990d8685172128870e44c4aba268c97a02c3a98dad6213fdc444a4258ba52bde6347c6b86c4f4127cd97f5c188d578000a6b0f64763e30013c6339172360fa136cf2d49f1387e42e51bea182170aae85125652b82f2f9b8567bf6a5af2094166477d6361332b47fa98c593d6b197ccf2e73fc3c744289d9a81f1a9644af500bbdd632ecca581c26ea030933e42df49b0fdc239acf66b888c1fd5e27a9b6a48b5f02360f58ee3cb5d8695b3417772ce1f6a02f90d762de956dc08f108c30e37ec90baae39fce30debc53e6f1eb11a2b9c5ae7cabc25230ed3ec7786fc47f7956ac5e5cea38412fb6beb9c50299645cd3076d5342c7e561fdeadf48c2141b0b02bdec2e9f79aa393e671d8bb17f071f4a34b1d63c4e7e07fcce338ace7206b258080bfc74c364630856c5fe936b9931ee5157d9de77344604588a7666c0c29e5280947f91cb3c4eae26215e5f4d76fd75469b39af99d772b6424643889ab5390c4aa72a8eb19384fbc9098812dd56d4c8a85206d0f57722f3d9563cbe7a0902e6e7c59c61cd338f09db41738082a45f1c8c6b4c8db806c448148c46e6682ab5207bc42e1844def8ba262fa9169c17f74c7b8e843a61200d175a2a4c52584acf7e1866ab67b70e29516f37d0d23ffc5af828be17687a433f8989933942574ac6dde0980c94b384a4d5fd74d916f9e5bf86c77773d4680fc344015ef8c9379ca0058501dcc046a39503a392f6a2143deda9d892615cff5d9fb6b2e978426c462b44d925ad2740aab44c4755722def57a139bd6a73003ea6670a9f8aa28fc3794053819b6ba6f9f942c4609a0a1bcd71835ca55bfd700a0e9771837483172b6a3037061e048b22ac60e39a8f90feaf264dd93985400465d3d2613f144ce1cd2f13bafc24be8d94e9899fcd58b2554cd18a038c98bbe4c5b133a2d00ed3e5b6924596ecbab43dc63748aa63fea4685613130745e1f0b10b3e964e351dd55937312e5cc351c4986c159fb7a3b367b76bd519fdf214a220a941e8d27189cd1481900818ce5baae2c196692a8c93c71e6f4ce6d5ba0333dcfb6b0d65d35b9b82cc9d711f89fe87ccc2a5c49cad5c921041647e96a6b491b322243802c332a383d3f7bcb6b58276002a2f3c5b0998da63530f00f0f255d170797098f313bfc537ad69ae4d971a54ab416e5c25c3658c3bf4204d47c1d4de338b5bf62ca4a85c1f37d8734048d3fb771a444dff8f0f25031e4ab564e8dc5b530929a82e16255d0305627e56e436f90369c8dc29263ea8b77afe1d6511d60235c1daeee22944bf7318ea230b970c2a8620146059c42f6d205cb4088b3225694d1539ee8af0a7873e1d90205dae6f6fa1448f396057be30b2af0bf9d7afca22ba0f8f09790de071e2c16ebb01c28e767053394ac314e40a50b8e0ad94831be863e886de7db6d37a3049256c619ae81c78baf32533957c71379ac4e9ecad0d38e8ecd0bc1ec6faafeb5a10e297fd521b49c24c76a83a9404e3802eefe475cdebf0436ab9c5ef43db32ae1aede189ffea84f41e469567edd5be1c6cf075c50beebdbb04b25e83bc2ec4d89425d2499d9525d6205f9abf9b4b715c24824bd2aa2ffad5b9faffe90851924a4a8f8e8a96049cfebe76ef8389534d5aa79b3cc0573638a9d0d27cb4c9cd6b31bb529f007d7cfc2f039f4f7c345f8ce59b47c966957c3495b886e3cd4846998b8ceb0eaa36b18cf9751c891a81a636646b6959e3ee74d47517f17975a39ffde2c2c6f6fc6e57b7a4992fd7d1c035beb34b71479a7e733c2287dc1ad2e7cac0e2fe76994f3759af9b3030427c5a3bd1445c2cb1428a9927b651415b516bd5a868c921ad3d71a6a4fe8c8760d12eb11ac0740ed5aba072c58aaa1fe73208a985738846be3f20afad87ad944659b7624a7e94f0a7e5bddbe5f0018319f1026fa25c8d8b79734dd7b16380a160ba16cd6f28562bcc86db50b8490f2323cc621f1f6918db37ce48aa5a2a11150498c36ba5a24a3b82e45b077d0c96b18aae48c101b608f43356150378a606f596e14105c28b7e021374dfb00858263044f7d953966558db909c620c9678e2b715f2f34b64e440f1d4eb0589bbb5a1a333ae7784ab98e3c14e90ddf1de9d514118b71d5b1afc0027d8ccffa41992927b581b91344da8d7560853c404945083e0a04940072675ea89a8beb9856ee889bb20e90399596164b9da21b22cdeb7f0b29919811d84b462a1d077602cb53408059540431072887c75d1632211c5fed46e33cc3c596266201dc9da28839833652a4a1ad3e8ab70eaf58a90013596d916351995623a0a6746793887ab36c481209e675a690227800bed291ea2241305c0b75eb7d145a04e59fd5105b939eec5e4d7054773f619bf8f2cc481cfe0fb9c522c18778307dd6da67eba3f44d3bf7d596479531005dd56b1504cb00a048729b7c0efdf434bb0bbe7a4ad3acc5ce25073e2a01d448695ae74cf7b6befa187792c9127bd02c5de53341f82a6c7159baf6fcef5e185898dd54e9f285649fcd31d31e1f88d7a1d19e8efa0bd9dcff99a4cd666aee98fd992b361f933df70457fe30512d5a28f39fec5cbbd9dc99586a1f5a869273db97f00467b589d3ecf17d04e63dfd6567601c4befac40f4fd75e344cdbef401a96fd3b60ddb96d0133d71fc863a7a7a555a52c079c9b38142a28ece71b7186846a0ba3d488f3b7aa2d503450098070960b84c39b8ee099c99067afbe24a8ea666157b82994183d71b466c09b592a30bda9be74aeb03711815db4d1fc1f6c1d1ae725636bf920f10716f6373f1eb91f90207f2e33827ed72801c24e964ddb8d52ff63b4c8971f73f6e52686f366777a6489ea28e0eaf6b3d7726dae1e2ab73f6f7f037be747687598aa3fbca1a506af36e748140bd8621307065254fa4d75d9d1e1118272c47f3d1faa66717d04ec59a234f4bed2a436e539682bfb218739c14d263bd2e186194d7abb7423f336c0214498d37b006e53249ce3e9a962cabcfa688ac4aa9b150217d4546bafb72d7b388022bd7226ea85782686a1c0a8838491aa3faf0690c177bceb4008e0dc99b48b08a2efc00575586b17d6e3853c559ec1b4a67e0d3f115f44bbda5666832c577426bfc3bdd9465ef265f54c9a26c6a44404a5542e5ea43ac712b7f38ee73239028055f28ca9e432a89d3ddb7857dd8614889248003920ab9c794d14c80e4eab925e989fb10ec6e8242c30d3eb6aca6bbeee5aa3aab80cae7782b76e09014b422fc3775c71226502a7ba6c69bd16061e59bf3bc49ec65c24121d0c8e7b0cba3d551d1c91cc6a1672ba097c8cb6e55fa40a9e28caa332a11fa1d4dbf0a428b2aef7c312058e060109c0158f562393c12ca2a7cd25a9ca9f96a96e98b606db44c24a7585a4ad993cd2a0e7cdeeb7851ddc64c85ab570d3201d65e96c0685c5ba592621e43e74d14e5e415271e2fe8846c1f14587a2363b5e12973b2fa632e81c2cf538b66a3d070321af1b1a0fa241726d720a23fb249a93b45f253d1415fdce6d4a9aa9d25ccbfadc4ff13ba3dba959b9bd6c8cf9c6159d9cddd5ee722b81d84e1c1f0d56e48e1aba742de1fcd3ecb63812f4b650c84626035ad993f06f4595fb2968accf515aef1d30d437896b296d695d17e8dac76b435709beb1a3a8dbcf25af7a3f6af82044344d14e05a25c9e748905580d15a648989689f30027f1c5cda09948851ab8d2855f714428a0ecedff11e76c68eecd66e77a16a544cf7c899716289efe231812cb39eb0c0edb154511d942b86081671197af24a4e3f6bbb72777e99bd1987140a0557cd1467270dfe7ba64d5cb620fbeb9cd8fcc695d6354968068a1803a2a48f82af7a24d809fca5169480fc6006520a1bf50386c9c6d0bdabee95c896220e200cdae6c7fdbc99825f188a4ab0631d43b7c78ff91b80755ee5c1605c4cfe3b6e09b4b4b973af80209903c29e1a96f5ee5e764f83478000442a5fd2b8732a0fa418684f262e1636eada00cfbddb2ef594b630e8c8c6719d626fe9b2097584ac9debf4479929fa8661e3ae42c23fa319cbe1ae9a29a86973757aa728f432e0204daeb698731c6d4a881bc864373209b83ca0d8af824b8b5a100fb495d237b151d916310dd31162fee6f3319e4e8ea98ea63fd1ab3e3cfa6c91a63ab0bc53732de3d3846ed70424cb607c15a764604c2934abda33bdb88fd9bcf53fb853ebbd2105abb16852e9299861eb10d3b0c2ce423b38f148312ab34dbfef8b1a24a9fa4325aa03c2f13e4fe4ac2173494a386a422c85f546ec4dc377f2a980fcc8be82b17c840a3972f8a3c6364f2a490392885c4e0544e35beb5ccbad16d1b92ddc2299169d7a905e2688f26db73582cedc0ebec3033ea6643b2be5a33574aaa11aa628d2e3a76b8ba36fca5620dc76abd08a21497bc1e3b9c4abd2d57d03bb98a7cebdd3400e8f96fc9520ac886f5d79bd780623a7874a89e3620346b1837533898df9d56d751038ed75f9c36e269d709aa3f4a8e2d4e2b17ced3223966d700846afedc2f354b2066306e2b421fbbb8216b7fdb74c73b471572080a56a119ef90fee757f2bc01cbdcc876fcbdb6b05473fc22c98a71506b44ab2c309c375ffb6e243fbf5dae9b135e27e046a531a12233b1a13bd17f551015df9c25c2bbb3062d24d7448845309ae145bc1f398f6ddb3e8ba6d4e5580d1cf482dec2e3cda434da53717dffd8069bc64e801e14196cd19332e2cb50ba0005a25f6469e5c4cfd18f0eb2fca9ee906a321d5ae44bcbfbe5a0437e9e09a73a1860c18cdaf188139c3aa0cf82bfd2f7a566945cc6cd840a2d52e9cbd1c499092d616fdda4b0c5a27d1a3cc1c1f8bf7ad78a0194cdd47804151617f22af06553dd6a98ad869ad213013f54741df9d2a6d0cab024f16d2d830b0ac5f7bcf708d7d5a6fd77b5c5b4af0ed623604ab6ee5e6d1dfa2a99c6ece49d103c72a1558db42674826977e80713e3df8919b42cab4e918174899b63a62c38e5f70ea3bc78527ee304f10aba504d7659669fee74185cd5525285a3f71d21f91aefc811f22b711c23ded17b732514ac97109bf19ffbdd3baf8e08ed83e108a051be87250d046b29470b2a7f06d5cbb77137753d7b9ce923faa09a36812a59636823318b5c0e4d6536699c757c5b8877ddcb6b46eead3e5992ad24f1dda6184cb4b075afe70e18a66b234f2e23d916d7ef8c8b35a96daefb95f096b91818e2904e062901f5e325be9a485bc8152f1225bf78a52065771e1e14674e1f84523cc009e1791bca080e431b77ed8cd1a8d70d77e6932bbdd00247af0908403ccb8c3ad656959ac33b96ec933e2e85a20e401d25efc9d978b681330dd42ea06a41de2d9e0ec3a7e"}, 0x20) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000040)={'ipvlan0\x00', @ifru_hwaddr=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}}) select(0x40, &(0x7f0000000140)={0x2, 0x0, 0x7, 0x7, 0x47877960, 0x3, 0x8, 0xffffffffffffa42d}, &(0x7f00000001c0)={0x1, 0x4, 0x0, 0x800, 0x5, 0x8, 0x7, 0x1}, &(0x7f0000000200)={0x5, 0x7, 0x7fffffff, 0x400, 0x6, 0x3049, 0x8000, 0x100}, &(0x7f0000000240)={0x0, 0x0}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = msgget$private(0x0, 0x0) msgrcv(r6, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r6, 0x0) r7 = msgget$private(0x0, 0x0) msgrcv(r7, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r7, 0x0) r8 = msgget$private(0x0, 0x4) msgrcv(r8, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r8, 0x0) r9 = msgget$private(0x0, 0x0) msgrcv(r9, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r9, 0x0) r10 = msgget$private(0x0, 0x0) msgrcv(r10, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r10, 0x0) r11 = msgget$private(0x0, 0x0) msgrcv(r11, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r11, 0x0) r12 = msgget$private(0x0, 0x0) msgrcv(r12, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r12, 0x0) write$binfmt_misc(r5, &(0x7f0000001380)=ANY=[@ANYPTR=&(0x7f0000001400)=ANY=[@ANYRES16=r9, @ANYRES16=r10, @ANYRES64=r7, @ANYRES32=r6, @ANYRES16, @ANYRES16=r12, @ANYRES64=r4], @ANYRESHEX, @ANYRES32=r6, @ANYRES16, @ANYPTR], 0x28) ioctl$EVIOCGEFFECTS(r5, 0x80044584, &(0x7f0000000280)=""/153) 10:18:07 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x8001}, 0x8) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 10:18:07 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x7000000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x23, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:07 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x2000, 0x0, 0x0, 0x82868, 0x0) [ 698.192333][T10762] xt_hashlimit: Unknown mode mask 7000000, kernel too old? 10:18:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x24, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:07 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x800, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) unshare(0x2a000400) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000140)) ioctl$KVM_SMI(r1, 0xaeb7) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') 10:18:07 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x8001}, 0x8) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 10:18:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2a, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:07 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xa000000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 698.305499][T10854] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:07 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0, 0x0, 0x82825, 0x0) 10:18:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:07 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x8001}, 0x8) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) [ 698.434627][T11065] xt_hashlimit: Unknown mode mask A000000, kernel too old? 10:18:07 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x2500, 0x0, 0x0, 0x82868, 0x0) 10:18:07 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x3f000000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:07 executing program 5: unshare(0x2a000400) r0 = getpid() r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r0, 0x0, r1, 0x0) ptrace$peek(0x3, r0, &(0x7f0000000240)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xf4, 0x17, 0xa, 0x0, 0x0, 0x0, {0x3, 0x0, 0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xd4, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1ad6}, @NFTA_FLOWTABLE_HOOK_DEVS={0xb8, 0x3, 0x0, 0x1, [{0x14, 0x1, 'syzkaller1\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'veth1_vlan\x00'}, {0x14, 0x1, 'veth1_to_hsr\x00'}, {0x14, 0x1, 'wg0\x00'}, {0x14, 0x1, 'veth0_to_hsr\x00'}, {0x14, 0x1, 'ip6_vti0\x00'}, {0x14, 0x1, 'veth1_to_hsr\x00'}, {0x14, 0x1, 'ip6gretap0\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x84}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1000}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2c, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2d, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 698.607238][T11305] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 698.632446][T11312] xt_hashlimit: Unknown mode mask 3F000000, kernel too old? 10:18:07 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:07 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4800, 0x0, 0x0, 0x82825, 0x0) 10:18:07 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x40000000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2e, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:07 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4000, 0x0, 0x0, 0x82868, 0x0) 10:18:07 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @bcast}, [@remote, @remote, @default, @null, @default, @bcast, @default, @null]}, &(0x7f0000000040)=0x48, 0x0) 10:18:07 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2f, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:07 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) [ 698.838505][T11633] xt_hashlimit: Unknown mode mask 40000000, kernel too old? [ 698.901978][T11716] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:08 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x60030000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x30, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:08 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4c00, 0x0, 0x0, 0x82825, 0x0) 10:18:08 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) [ 699.041261][T11827] xt_hashlimit: Unknown mode mask 60030000, kernel too old? 10:18:08 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x640140) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f00000001c0)) r2 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000340)={0xa10000, 0x5, 0x7, r2, 0x0, &(0x7f0000000300)={0x9809dc, 0x0, [], @p_u16=&(0x7f00000002c0)=0x40}}) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000140)={0x1, 0x0, 0x1, 0x2, {0xffffffe1, 0x9, 0x9, 0x2}}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x8500, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000200)={0x0, 0x0, [0xfffffffffffffffb, 0x3ff, 0x4, 0x200]}) getsockopt$IP_SET_OP_VERSION(r3, 0x1, 0x53, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 10:18:08 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x7f000000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x31, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:08 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:08 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4800, 0x0, 0x0, 0x82868, 0x0) 10:18:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x32, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 699.226255][T12133] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:08 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x80ffffff, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:08 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x39, 0xe9, 0x801}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:08 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5a10, 0x0, 0x0, 0x82825, 0x0) 10:18:08 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x33, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x35, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:08 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) getsockname(r1, &(0x7f00000000c0)=@ax25={{0x3, @null}, [@bcast, @rose, @rose, @bcast, @remote, @netrom, @netrom, @null]}, &(0x7f0000000140)=0x80) 10:18:08 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x90020000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 699.509934][T12575] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:08 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4c00, 0x0, 0x0, 0x82868, 0x0) 10:18:08 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:08 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5c00, 0x0, 0x0, 0x82825, 0x0) 10:18:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x36, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:08 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = gettid() wait4(r4, &(0x7f0000000140), 0x2, &(0x7f00000001c0)) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000040)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000100)={r5, 0x1, 0x6, @random="395e0299ebdd"}, 0x10) unshare(0x2a000400) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r6, 0x0, 0x0}, 0x20) 10:18:08 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:08 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xe6030000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x37, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 699.792813][T12906] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:08 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5a10, 0x0, 0x0, 0x82868, 0x0) 10:18:08 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6800, 0x0, 0x0, 0x82825, 0x0) 10:18:08 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x38, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:09 executing program 3: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:09 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xf4000000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:09 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000040)={0x5, 0x95c}) 10:18:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:09 executing program 3: unshare(0x2a000400) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3a, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 700.174908][T13310] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3b, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:09 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xfe030000, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:09 executing program 3: unshare(0x2a000400) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:09 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5c00, 0x0, 0x0, 0x82868, 0x0) 10:18:09 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6c00, 0x0, 0x0, 0x82825, 0x0) 10:18:09 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0x91cf0c54) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000040)={0x1, 0x7, 0x4}) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000001c0)="e88daf3113709bfbbe03de747b0ec337d91f2414e09a33081f0fe6b685ea7ce31df812c04b7ff20ed537edc1916a625fc544780b2f1837bef302eb7ce1f99cca5588493b7c344758499d71be1d7261a70caa2cd7f49c0aa69077a7ed44ed989d748d3510564fd67e38ad684c4076314a156c9fe5505ef9d87a39ea1f439ed6ada994973f93ab865f288adbaf89694a533922ce49471d5175d6c25e6721ed3c35e6a17524de1ec38d090dd2d848d952232339d16f5b5528f5900efbd26168a3f23630", 0xc2) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3c, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:09 executing program 3: unshare(0x2a000400) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:09 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xffff0300, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 700.451976][T13587] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3e, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:09 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x39, 0xe9, 0x1, 0x4c, 0xffffffffffffffff, 0x95, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:09 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7400, 0x0, 0x0, 0x82825, 0x0) 10:18:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:09 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0xffffff80, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:09 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6800, 0x0, 0x0, 0x82868, 0x0) 10:18:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x41, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:09 executing program 5: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000002ec0)={{0x14}, [@NFT_MSG_DELOBJ={0x34, 0x14, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}]}, @NFT_MSG_DELTABLE={0x70, 0x2, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_NEWFLOWTABLE={0x138, 0x16, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_FLOWTABLE_HOOK={0x124, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0xa4, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bridge_slave_1\x00'}, {0x14, 0x1, 'virt_wifi0\x00'}, {0x14, 0x1, 'veth0_to_bond\x00'}, {0x14, 0x1, 'gre0\x00'}, {0x14, 0x1, 'ipvlan0\x00'}, {0x14, 0x1, 'batadv_slave_1\x00'}, {0x14, 0x1, 'veth1_to_bridge\x00'}, {0x14, 0x1, 'batadv_slave_1\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_vlan\x00'}, {0x14, 0x1, 'tunl0\x00'}, {0x14, 0x1, 'team_slave_0\x00'}, {0x14, 0x1, 'syz_tun\x00'}]}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'macvlan0\x00'}]}]}]}, @NFT_MSG_DELSETELEM={0x54b8, 0xe, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x5478, 0x3, 0x0, 0x1, [{0xc8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_USERDATA={0x24, 0x6, 0x1, 0x0, "c05c39b7fe399ff15e6c2ccb28fb037231b5599e8b24fa51523595b24947f71e"}, @NFTA_SET_ELEM_USERDATA={0x76, 0x6, 0x1, 0x0, "2e56c23126f14d8b48bda7c20668bed5e574f5d9bbe059a7444a4a2aa0fa33b46f6c8a14cdce2124e9e17c853ce850e0c995508f5051bf4e22de8c48f7018acc48ce0780144d7d00f941cae9445e06fe32d28d01cbd7a67ae20d395b559fee62971d78ffa9ad04a3fa0b56b54b21e5fb614c"}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x3f}]}, {0xa8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xf5}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x101}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_USERDATA={0x74, 0x6, 0x1, 0x0, "41f7ed3894f91a27a4b904e9fa21def091eee65e0f76834ca212279ed159a37dd4df0700e893a2b7007c4733971c73ac73877d64d33cdd65b7021136922547498e6dfca52538abe511fe7569ff306a02d6fa2c9c651f639b91bd96ed05cd684dbb4dbf6bec8080fff4c3d2cd96833066"}]}, {0x350, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0x24c, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xe8, 0x1, "111900022be561b489bffc68d175ddd4cb61b853b6e5b1245497aeac0f08fab26fd8dbfb15fef9f73f84d6c1e172037c1bc4c4f25087ac85dd716eae336824f676b4abd5ee797f863fe4c1da9bde955959689afb330df09db1acca00a04a1af7845cbcf54c45618a926f0d6b47c18ef9a3d372227531cf09276ba125a9b3a47a31b4d0a6e15b12cd84b57e209884ab39dd753e80d127af1abfdfd917c107cd2a73271c6152cbb742988a766abc99d7b433c4cf25269f0454c19aca9b552ec91b537a8e40c2272ced5ac3934e98022441b8b2bb17ee475717658eccd0b8da20a151165ad3"}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x7d, 0x1, "17d816a222f66ab6ca001a2daec06f0bd8b4d7992c1b0c2b9da4764f79345fda9c7a54ff955790b0ee61dfc694756a3e09d0d8ff33e3b928278d5be334e2c93a8d04eb2fadc4416a345e558a5beec8da472c6139eaef78801de3999136093fee3178b72b0e9c30ff68f09b16b032f2e362209cf8e60fe3041e"}, @NFTA_DATA_VALUE={0x51, 0x1, "bc3f80c0a758af2644e577fbe01da3658fb9fd27ba1274d58cbc4b3189ced1258d1c09d335ee694c041b90810aa8fe8026189156a0ac039090f05dd5b2cce2bba74c4012876cbc62a6c17eb1c8"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_SET_ELEM_USERDATA={0xf7, 0x6, 0x1, 0x0, "84f6963d08ca81c5bd36510f6f78670f05dde40b6fb2b77636ec9badadb532dda54b5bca92653568f5cf282c87de2109d68f31078334ce94ff7be0c9bf5bcbf2928fd467055896fdf3ef1337ebc87a5fe29c99dcbccc3b1da337318670edc1d186b038facb627bfd38a85d848690ec730fe925da420455f6dea447eb9eac7269a1045dd382ed795e780a921fd8663d5af12c8aa7f8f9403b69d3b8d66ae9c6194b6d352559366385601ea3ac4303f4974475745b981cf17f4d4552b08a5a92f49c47d4c045883bc9ced214329e0a6bc20b1feb9e2ec32fd134a5ce2aeb722d4797422815b1d714f9b8f6574b9b0647282e40ac"}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x1090, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2db}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xffffffff00000000}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_USERDATA={0x1004, 0x6, 0x1, 0x0, "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"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_USERDATA={0x37, 0x6, 0x1, 0x0, "06b2221aaf469382a71aa37c7c744a42f2f277df5e02e0224411bc8771652d212253bf05c52cdec4cae8c5ecf1508fbdb0a777"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0x718, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_DATA={0x194, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xf4, 0x1, "4e180e5fce808a969a27bb7be1b767ba5d696dd658103419282e92f96ac8603b20ae54655980fc0e022492878b7baf3d926de3bd1bc96ad943781402dd14b0820c440ef2b3ce540bf1c003b782cd68757079b45888a234d8acf8fa956826a17e486c7fefb4eaf82681da03b221a6169d664ab7f789e29f91ce50afc038bb71cb8b3f1bdab328729cbd9bdea001a8ad4e95af99ac3b4da7c47439953bb7bdeda60b6a33490bc1982b6a7623c439978b7e8b9b01b495bea501b356d1b9cc2f3801c40ebd137910a8a800eb0949d9ed18ce0a1b3a56efecbc4843bd927410c60d005f3587d63dc90b61508514bf53920bbd"}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x58, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_KEY={0x290, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0xb, 0x1, "d0ea299757c2da"}, @NFTA_DATA_VALUE={0xa3, 0x1, "73f39a2c2bd521eef5d834cbe14700073548ca43df191fff1f8b512989b677a2602ca6b6fc97d64c401f4b3968952ebbae4693399f6a8db20909ff401b3a0a8dc82012880821c816ee4f700e8d897b22b2a535be3929a235d618b5617e3c5e6d2cbf3ffb47872da1a6253111ef3d222140a61872a6928e566f42b74e99f06ac0420f9988d1c2f30c32dc59fee5d961e77eb486fbfa38d7a633f528568b107b"}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0xe5, 0x1, "f5c42b3604a9544cddc6a99736147c3770b552f7f904e4b6b48766245f5db6fc97a855d88dd3d8cce5362dc2791885051b0efd3ca8972192ed2b01f87295d0bf8f27dd9252adaf25a1177e4b694891b7ffbf2a6ad5ae6acec05847c2f415f5937c13541852ba33b5ec42c8f887fd45c768ea943afe13a322eec1c6ece627a43dd6d4e1aab47298ecdb27e6fb8c18247cd64763dac0ec8073efa347ee62434a1b81a6d0e7a3487236ea801349e0f9585d783093d4bae94f21ca8008c44ff925f2967fd9a4ea214708cc866f65bc805ca9804dcf94bfb4d7a8736c3fcb4f7a083482"}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffff3}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_SET_ELEM_KEY={0x8, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_KEY={0xe8, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xa7, 0x1, "576e6524d02b65d5768dd51fd5084209cab2ce4cbbb20762d6a89cdb06e3cbff253a6ac81c84c20c03ea538911005abdfa2b408cdfebd6775f142134359834e2baea19ff9537301ce8e61546477104d8c1cb226fba7e63966b66fd44b4135125c6173170000d80d5608ec410f2c7428c205ac5a18b43f4dfec9fff40ccd1a4dae5ab48275ccd7f7a94b25535b97bdf0fb507a30b69333f489b592acac024fe5986ee13"}, @NFTA_DATA_VALUE={0x3c, 0x1, "36573c95fcef37a30e4eb60c08be61eaaec129cdbd08ade735f4c2f0dcea186288d71807167419b9e9db91c6f2b1328c2df55ffe433010ac"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_KEY={0xd8, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x59, 0x1, "413a48758ee657c8bcce0138e914dfe9d64b7192c68a6bee3b9743f8196c0ef6b0f4503b909d1bd7942495c02f3f2b075237a7b2818f01b0109a6f291ce64de11bfe95fe202d1659e0b0fc204714d6f56be09284d9"}, @NFTA_DATA_VERDICT={0x78, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_DATA={0x100, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xfb, 0x1, "4603c1e69a6d61be9d3fae87b22f80f51e2e417924d71df137466846e36b8a1af0b6a64ca3965dc2f454bc535e9e135e3e38211513b47a56b291ccf53ed5d9510918300052c969dbc4a994245c4e4c08ea62e810cc7631196e6680db005456adfe244d3c56034219bf82c344df28cd04587d2c50f06ad68f09dc3443bd003c280dcd87631d136ccbdfd47e876c1dd631be7aeeb115436f04406fdfc55bce7f44cdd5661c98014ba3897ddf76da0d6e82842a898aaad2a29592447e43b6ef31c20e00843bcfbbdbf9f360bcf6a39ffbc4f44ae6384c594575639a3ef88195beedf24a4bcb543dac2895d2b3c5ec2dc53598e30926ce5c4f"}]}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}, {0x10c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x84, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x68, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x2}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0x13, 0x1, "a482c26541f7c5d41a3d83a1a6c877"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_DATA={0x68, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffff9}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0x10, 0x1, "73bd33fbf7156424a6064c8c"}]}]}, {0x374, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x10000}, @NFTA_SET_ELEM_USERDATA={0x58, 0x6, 0x1, 0x0, "ad228a76d2a67554db1661b475fcc7345fb4ca5608ea5ae51d7cc1dcb99fcb4aabff588c0f76e01731d2cb9c056510573bc2d42383f217f63a77df77b43eb687d0fd1abdf816c919380ecb2f270cdc680cf6ad29"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_USERDATA={0x4}, @NFTA_SET_ELEM_USERDATA={0xf6, 0x6, 0x1, 0x0, "5787692643e7e45a8fd51a1de0c1577848bcaed0e619dc3e3905c2b003df65cee3c55283ece8893401736ed7156fc63e20070b40def4a7159174bd42bb6b80186d546c1d6807d86b07bdcb7e27cc28feb42ecdd850df1be436fedf5122e5bb7e9b198d674b0e2066a837c202914d5d790b4da7ab40f0f527445d4f0420a4aeb6b57b17c73f63e7d6489ccb00825a33789072e5200a415745bb10f5b9acbfcc389d018f0491b993274f5a872a133e23781e49fed1ba8c3cc2e37f4c5ee83f7429aa7fec299bc078cceb62d94b303a2747ea70d478edc86f3b012904a121fa217cc8687b917870610d722ba8d21bc86efaa53f"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_USERDATA={0x89, 0x6, 0x1, 0x0, "0087546b97787c1fdc404aea36c7204e77048145081b38582a7202f9558463db00a910833fb1897582004152e31c1954c87071082eea9bd39cd04273dfe1828006eecb0e1571a89578b5c5c3bc6aa2ee92893662a315e9b63f21dba63b32b2261044655f015e982b89b8c045921aaa8f98d99c2e0d14867ae5c9a5e6253810a290f76f48f4"}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_USERDATA={0xb1, 0x6, 0x1, 0x0, "7042172961d6915398ae9296d6b7a68580bf2ea1dfa12b4c3aaa4acaa8b429cc569ecbc224a40b1ceb2e9d98318a07566047c6a9e6b90495b96a73a01d341e6037958b0d5372cceb8a1e5dd160945fce4e37fc8e6315ad4e7240e7135816291fcb5e196fc9d14176c8c7d9cb5c929b1570f91a744ea048b42420a029156d2566dfe5a4d12c74321ceb26eb4a42c3d6962f8f355311a5219e6881adc4ce780855f3f6e38863b766c72b0ad03f6c"}, @NFTA_SET_ELEM_USERDATA={0xac, 0x6, 0x1, 0x0, "7fd35d11a7af05dd39200893eb79ddbfe3cc1aff5d281f3572d90c5cf976fcb0794a8870798b5a3fbc6892abfae2bf144b78dd9dd1314c69c324f7e98e55eb5d8917974888ee54a1ba55eb7630aa9b384e3c9cccfe7f6490b211f19e0502dc6080303a419911642cba62feb65ab44d977f80fb86614a19fc6daf6432c5e5e30516d1450bb354ad302ee58e0412a307f2069adce048f2096e9444cbead4dc4e5cca713b491487551f"}]}, {0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x18, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x2}]}]}]}, {0x3370, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_DATA={0x1068, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1004, 0x1, "c5721b846a0ac1070308231c80e023c76d22cebff0f5d1bd6e875cf9c4c5d8f3d4dcec08db9bba6e7bcf94528bbafee92450f3569c8e9372ce48575b4839db9e73096c39f95ad4fdf741b89583e19aeb8e549540cb6eaba4f34254fd02531fd1729e4ce03d4cb2fec6f38b73b36ae45831c7819cd86b7c1e76a94dbfe43145b345284d1cb3df308f393f03961af081bbed0a67ec1425c69f19ad99de19270f190a5f8e885af4cb9e8212132a58c0f07dfa935666f530940a134fe7be07e78797e9afde19dc795b16f477bea1038ee2c31aebf697d21a8cae6fd438a8fa069414a933a347fcf1a565eb1d874f3379e3be6ee7237711d66c012518b28d051f1c96a7119dbd86eace6571da62b25e90cb3cdc96d3b0e33858f903916b38cace5363af807be5e80fc02fd7dd512d3a3b8da0cca0397fa4f00bb389f01d349b3fdf1f894d66607b036e79169f75cb8d65240289bd4c2f10908964324b525db721491b9853220d492162a1887ba50c63c97f2aa2b20bedf56d6a95a746c7e8855a1ae9366ae78930c3e55ade597567be425965e9b7015979ac562c3fb38a8c06947cdbfaa973fa970f0885b46525777bea585b83ce838671e94ab7fb0b2aaa72e0ae441eb4e941dd25db3042618c838a0567ec289cc0d0b8e27b387675a8f9e29ca046efd44ef54d2cceda46ee55332e5b51ae1017e2077ac1d6886b02eecd5be7ce91ef9dcdb17c237a73f42cb28e6e4e1225053b5569a85bc71cc23c4b9dfb7217205bbcc267bcd3798c510b612593332dbc5e4253a133b02f1b938206ae26cb0cdd92baaab98b5e4f7a7e5df2a797c873509f12b5f0f74bea3a8856311a0cabe4ea74a541b63ad2978d6d5567d33edae9b73e671213021adfd029e47569d13cbc54068fbae689afdce6643b9952a384433f3a2ac08418c435b3a235b5bea199e0cc6e55f1fbb44ea94e6ef7480d6da07f0a308fea3f6942b3fbc8086228ca9bbccbfacfafc1d223e711aa867fdd155739df0c9f51c2ad594451da902070b4d0b9ac1476b873b0e971b5777a0bc2e964578d5157c1621a14cce787dfcc6e5b3d755c0d9e9f3dfc4660599b7e2d478d4b65c8254603c2e2112d8ec3dbeab975f6e6fcd4e45532e20472bc9380de4e2cdd35320c515495814982e86189b35b2c2848d7ef018a4f92d8151b381ad23a280a8a7bc5b531bb8ff760759230ebf8c7b35f1b623cd03cdbc5b15c14eb088faad7e7c081475525ee93cc9b1ed88e32a1923e9837ba4cfb23c34ab6ad7a11afa55fdc89f43f0f5ed6956365d78170359282a3cd8ca18a3c87863d4c5317014224c69b6a89ba85028b3eb3dc99c155002fb7bc185e539d3360cbe43b776d15c6f14ac55f7d05bda42f3db88f57726f05382f416f49f329818593b323ab4ff8dfb30d35a26416d032200616b0680207115666405236c45258722299804cad564859b499f82a9125112646fd5c64c6289f273c90847d0f87e0e8be4170ef4f5f75bfdce30e9895b40e145e3ce9313c79c0eacc2325065a46a2c14f23c8d7b7bde2b77dd658eed20905116961811e27e82d22f69b79189267aedf0a6b54a144be5946d9d96456b8a57997a3e1739960880302c2f8437d43ae12f8671f1da67ffe2165cf4e9cdb8b5b80ab53dedd39b429377ab13c6f439ff89abd260fe1c2c92807fd05d342e04291828872c1c6a285310dee08b00f10cb71bfd523cb2032019494db186efb807166a04e3f9c0e1fedd7e702ae9ecbee38eb47540b231dcbf0c412897c6e7c990a774245bb475658600e997994daa4f856118580ca5584a8b11074b2d67170e12003bc9b251e6289afd521e3157f93c8d953f8350e57a8e3e3a33df7611c9c24cfd1353a2c0f1b0010c013457889f785510864f78513b4633cfe63254259757dc8bd61b68d37aaa7a32618202dd9e4f78d0f054c72c2fc004b6e767987bec1bf1b554abf0c982e308cfd34502dd5ae48acea877d0a5f75f477afb5e138f40495d1d9305b7a5081a65adb2a4aaea63d9e66daed58c16e16f80cee5141042c0225755a88911d9ba212aec2f0bb5c20367eb17e6d4839ced6b1ab14dce5d5c9315766f05f52a1beeaf9c133352619b1a6b5cd6c896399f64a88319c7d46df38930afd97c2ddb771fb9e3b2657952c49fb1d2446ffc883079a6e5aa3336014ff635f7e599dc334a6ee45fdb13f2b6fefcfc37f546488806196d09e75c76ba874fd98867e8235ee9dae1a53e8dc6d38d066904e5057c9ee4fba6bf8ef74217b1bed0e5583286b0d367bb66b4e55c96594903acf202f84500e8357feeb7fccb92604761c9e354b4ace26c328eb96b30a0b3cd047fc3d08007d887e9001bd11333c6e43fcbafee6b9f390b16e389982055dfb5edb739a7f7e432738643c93a82106940fa76bec57ba428d3ee13a1047dd7e44948c233a92fc723de6d10809ca94c177ee232a16102aad67363aaf179fdd1846750578e9c772bf656af7e3990475b68c31104d18dc427730feb169172e834e7c32039854e9ed9934c5c742235c696e293daea7ce71894aaa1fa067913b11240f2fd03d2ec08f54d9f0d9918c589a6a6f40291fa2a3248e8083a88577750a73633684cdd28e590b689fdf667158dcb46a70089096121045a81b7a926808fb2014431fdb04f3c092de2cc6df012c3bd575b03e8bbc54a2b297332c1fcf954c4deedec915d443a2f2b20a6666e2f7cfa72f0ba17d376a181b7d983fa347359a2bc1bf4c61b184f96e57cdb0d15ddbdb7adbc31b3d2a28b628ebca5e7c5cc08206fe221facb85e19b743d8ac57b397069e3e60e9d7e3472b2ba2c9e40558369f430924d8aba8206fa0a1dee5ef904f94e1ad184e36d46417f366bf46222d47aab254f20bfea6d94b586f3cec03aa1b5b8673f28d8b2a71858fabe287b7fe807d9feddabc1bef08405ffb55347c4c6605427c761f3090d07f7a4d9a240fb8a60a40203dadb3833c9a6f17b22025cc57ae9d7e61cd47ab8aff54a9a3c536fb9da2d8d18fb708581a1aabb302beadf27d085f7f929cbc9f389aafd8dcde060b701c0a98f504a2143db5398235a8f38a770a49e6755c4c4ac2e1510d05f243d41bc835387d5cf84625bad3877688b3c4c2518739174275ccbfba7524c21b069bc26f6bb4aae44ac17a363a80e9b6de4915e6877c1bc155f8022d407a6bc3420abea3426f855d27dfe3c4b3a932cba1168b720e8606ded6916214ff510f167f7195ad8f40898ce9b552a73e2ccafbd9ca4e4e3fc2fc5ef856601cd9965176fd4a889aa01a0015c71e26e3c2767cea90819341f58d1005d22b1ab5a79635044b1c2a7f4bb882ef08f7028fe4e5447dbd142d5d9771308ac590c5b3ca6dc91b375450a52acf82f922309823341970e6e993650ccb158037857ae264c4cb546a4fe803a2178e50cfcb7d2e8d739fb26e6b5fa5db8b4bc214a74539cb36bc2abb206994eb6d7f6a432fdba4cd49f0ed6b649bb0cf33a6400ef20b576b62ee0108f1bcc0e265cb59f247688c5199a2eba21d33d698e51cf236a19f642cce6dad0885739563d565463095999af5df4be1d2a63ada65d34e10039491f8ff414be9d612d7b0b733cdd267905b8ad06ccc02e1735b4d1088535bc6b6126c7b92098a47589a4d544c62e2a916566f175fb143a82a945127d80004d7f90f4952868c5a8243c721d64b1966bcadf39bba56857c25959bb00b2c6407b8c36c0ff6f5a32b67ab05bfe0b28a7c2f319fdc1e23065accc653afd6191c5d0d2393b527ce16a027e4691104f9a6d29c268dba415f1affd1b7b6ed461e8dad80609bfca9da0ec3c1261169e5fbc9f97697e4e0a8e2e9dc50877717326acf4db1eebadbf876edb62367023d88a1c25d49660d25021f65adaefa6ec41f62f76816917f023b297580f1ad8e4fe131da21944ade559daf0316a093fd7edf494bc2937b577aeb02e53d24a6c1020f9d51aa094aba4bcb86b7d49c9bd42838f04b104833501500f42ee8097d36cbb9c53337a6873049a7fc7bc069906e81d4d1682337a11883b091cb7586b3e83894965e5e2bb7dcd3fdfcb958fc98ce392f5d51f83d4d10089a0c669cfb962b493f4bb6f1f06d16144d22c09f0432f953ffa3aee8748591bcb5b5747d57164eed50f01a32252c4a77789d4b0131a877ab07920aaca4c7414361d8951f4bede13539ffa07db677632be08e1f8c81d6536f01562c54bf075d97aa16ab0413a4d71d4202ecc86fe286dd0f12e6d49fb7cc0e099e21f9e3c34871eacd73d0fc97fe11dcaeb2c73393c00c76dbdce3ec515369db2df3efc9da83aa8c59d9be370a27e8eb5fb38ef16e1f24c4dcf051a2bf579036b6de5f9d14a125aeba88c0c5595cb78d03493d57b0c0a1afa2e0d0053c54ceb1d6b769d945eb5d1714a98446dd26d1573a1798b9d03b0e63fb729e1cc08d4d0be2a762f2bdafdc1549e5906ad449856dfd30b88998d8e074670e481057e43bd193a77ca703da91a657ad07f79f7f4ea0618557ffcbf5a91c67f81da7ec6875c551f5f12b34769cfe05f8cd44f8ca4ef620f8c65a9862fb9ae754bab5e79dec619e0658402386592184b98637869533218bd35c855fe37bbbb17077ca6654ad375e5ffaec0397aeac26b30eb809c8d108b070bd20717d8ad105cd4487b28445306a5b3227cf9069e7849f9d09febb3865a4266a87adbb2c8c75362946af215952baad657cab49189bb19214b8a4fde032f91427c6aa3aa344146736bb341d7b19856b60cfd7b3fccb2422d17e938b35ff8cf74cb4b79b890c1a2b4a17435b061aa2fcab14114a271149399645ddc39deb5c8cb0acad097b63cd1d812b3ffc8176b80d78ebd9aed8d5a35017c546229d0005cb4d04d84c818d221816986520541f0885bcf8184fa63ae8dd7fd19024fc0c24af21a908087398b75df5661332f9ab471936136aa1fd0701835051e030dd38188ff7c65637d47be123beb930da94d6cf7348e1171b9930302ec88e1854a49e51918426367a104cf828e4b730b4d064125c158562b4df626724183168e7be44d0e712a98afa70f8071120745d6dbc8f92f8e571e445654238794ace1dcc645b3e831c470289592a818531cb85b3077f54f3f8eb0e1c2570b8e464cdb945fa29cb4c9ff390e329d7a7080f23d1fd6662f37bc127386127e3e6d962543f2c4666ce30ee1933350e03019adb569d6ef953c9bc29c54dd3b736eb8de2da87f68a85c0f66528ac7b5d7ab57356541915d373b86fa493f035639637a75ef3bf36778e37a13e8c3426b3a1ad86f93f5edd30dfb386a2de59e41dbd7d47c7c9af999ff6dcffa2ceec4b1565164994a7361c0270df9536faa1e8de2c29e91a5d387e7bf65b277214d7c03801294ed6b5f78e1af59443bcb99dd3781544c56cdd817fabf05dd9b7aee85d4fc6b722da00cf55495d4a29273530e41cf4b18d48a709908e4763ee7d4455600116b3b043b122cb04c2bb386f20dfb13580dd903e3b9457bcb7ef1213696899ee2a3dfc6c1652fe756585fd746e83f9cbae7645110dde0a630b885e036ee264ee9c19101f1176997e011334ac9a634cd0c095155380547da0f268f182d4fff017cc9e224916f8031010f020c53cdba846819d87f2eadf4f14606b05245c2e79427ec281bea24ec651198ae2b550d75b37fcdb44ccd603fbc98c6b63324fe7d548ebdaff7306c6310f570454eb7b7cc420b8b62d0fdacad41d073b2d990f47227600443f81807d8d9e847b18208b637dfb20dea81f66d9f49a3ea5b5"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x53, 0x1, "e665504a0874ba30ac8e61ec42f07e6c0560fd18704779819e675dbaacd09460ef9031457c3f5c05c6695553405fa69aeffd2ea8c2476ff064bbcf140597751e47fc564f562dd4fe1143464c98a7fe"}]}, @NFTA_SET_ELEM_DATA={0x12ac, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x9e, 0x1, "f5036ed0e8b448a7271664de3ddedaf5bd85307caf23bd765246c7e1d9345bfdf4e560dc90f12561d0b002ef025cf32ddc5c8f145520057fee8aacaac4e746b208db2c2d5cbe565d285824d6fece952c1f4979fce985e65e3997b79b6945fc4f9349952980229f0b3378bddafbfd51b6d04e697d97f6da3fd52c0c8229f09e48d576e0c18a44aab9ada7a33340b7f41bd525baa554b1161ea8a7"}, @NFTA_DATA_VALUE={0xd7, 0x1, "4ec5479346aadecee9783a03dc19ae7107f2ac61d96d654b7b99deb0aad6331d6df6233d92664b3189e632cd7ff8fc95c3852dc0a75598f0ba7f1b3136eb1fbcfd9910f9fc7a130542f4149fc8ef9b5519a8cbb380d36d0eb3782956fc2a486e8e7074cdd8e285e9a360073ec30008e1fee381b22648b65e5ad85a150108e29db0f5f4505c60593d54e285027530f012ec06f9ca452adf4f9ecc1d194201d258b3dad0fe984febb3f6349cb988ce4b523b66df9b0fc1adf3763977364c974c974054f613603556a6f44eea38efe6e5efb884cb"}, @NFTA_DATA_VALUE={0x1004, 0x1, "55c1d4d3fe0e61a7f014a559403d5cdd5d1ef6617804feb3db9a3df00486297b2f66458207080ea6b8db0b7cb0e913faed73aeeb790d963eb2f8967b1bf2c9a8e9ec41ca0d2906755bde28de9e8d1e01a9a9b97a7ef33a599b903284b5dc4b76c968b34b0d968011dba5b9232450b8cf629f820b2a865e61b386d5ba0de644787c2094ae431a8e5fac95ed036638bd58bcece487a9b8aa5bd061f23ade43830114a781bf6267669caab4161315d9e7a4d617b71bc77238f1f1559beb4b5e87e5162af4f2daecbf27f29e6fe88c26359ff4faf117544519a54b81cf678c41bd738eee0b3423694056a937c7505868d409db17b515278d091c70d0a5371daca9edbb2fc36c4ae3dad518615c5a4ed10a1cac45c430c62ceabd370469c55ec02ce68907e3dea82a0ddae008f7fb4661af81a0056513173328571fb4c590620f22aab188dcf4e8c9a0dfd3db78b91b27254266c3e73e1bc4f954ded9761eb9dd634a0e2bd2a919c6c9b1395c1b772f6e89f319fca96a3f286ca6cc80fa6a3a42f95fa74b1cc615fdd423a847cc7f99dcd0bcb280fcae5db421800c0e6e5a68b2b457376c96bbbac626a17f0df4598510cc6a34e12779bcf72aecca6a5b6cab069367bf084ea23b8470d101ea5215fe51a07bfab6f2e38e2f0568f2a61e43569bdaaec84bf71c60c3d38a1a195ab2ed76e51d7accb20b3c056724d75c5d0f06b7c3ad64f018bdf7c53eff11c02c06905b008c72bea5f45d5dd0e1cfe2a6863a9e70d639c588c6031fdfc48e359db9b112b760824390b229fa6574ba7b18b9a83ad8e8f9d752fd60ae737c4d3315fae709037195e977c2d9d88125ab3d04e9f386d17b043a96e64d7c6cea688432b65c15bac069058d4bae187aa44c764c1ffe58eab85a5e7fb0724ecf2482d7fdaa544d3de6d2563696d3ac3c861c3fc2e8726384b9a9f34b0ad7632a7d5e35ed0ce786b45d00f0e715aff41fc132b291a935d18695d2e72c340f3d090691838e7fbc63d6f6064113792999e52357d7a55ffc43c91d9c8e6536fe1c8fb2fde0a9857b14f3969aacd2a0d40a1ea3ec0c5438f57077fac4fc8c1473a3a111d8ee6f72e8ee5b9ac41b0be0302fb62f55acab7864184017b667b17fe01d84c3803ecb32ac703d65d12bdddc0b1dc42b465e9d29fb6e85454f8d77b41b6a500fab81cc70217d44b300aeec798a6acbe34df36a32a791f7bfa15956c2a6b4ad9a86079853bbfea37dc0c96b5d13373aa3efd249907688fb44c84ce43576bbf35aad43729381aeda8abebf7296e49aa5efd947685fb977f8ee6eae4a1f5f748c106194f8dd1097a6eb7c903266cfd1b80956d554a6ea4bd1c288d39a00db78a6591e4d29c117bfc59f927b516c5d7be4d5868beec8c2b5c27d4123082877fdbd8e6a24573f3bcc007b9d993dc2eb1f9c9cc06b3a12372f6b2b0231688c67fbab9db1e065da48c1daacdbeb75480c9d8f6c7c335a1a797c551ba213be4764a001b819a7c2aac904943acda94b3fafe68577699f8222ce861e06b0c8473d9fdfa7de44a0108b9fe18c00110199b4b9838f286b0891d227e52aa8a4186ce33ec86adca479f9fb8da71e697d474db32077967d7d2c8dd3f12bd5dd4348906f7cf2fbc9d98c8cfaa32de97d8859fe0e30dc30add6c5fc1acd5996d36110bcd2455717f322ee425069bce88dd7e67124f7e199374e667dec64e112ab2512777fe33bbc218d888bb0bca50c3bc8161e4819551df2d06b6c2819027820fe112cc4ba2ca066ac83364216ff9b95d478b9dcd5b384d9cd2c0dc9a2c085a96fe8a41526159dfbd1ae782299ec8d6c1ce946178187bddd4f43899baccf57ad940820848515a421f00ab3177e4f735c5db58de8e14ac3598fbf07beed922130c932e0495b3e9882571324fd36c11cb9b383691c47be8294eb98d906fb17db51fc9d150c585b956717db7b7ac0827fefc4b0f99c13f5f7bf8850f25e13cebfd4d12ec62ed1a53a16bb485f3a432e91a60920249c8c411d412777b688692872380b000d1a7881ebdb2fa2351e98110c96814d8a473c103b64e78c20e9e1607c8ae62ea918d9a57c203fe6b938ea085fd374906f8ab61edfabf4d7190239b7ead487ac4c94040db0ca3642feedd6f38c36df70a8105f601b79ae14e3efba0eed0a441f97195061c4e66ec60a1d6149ac0139a14f73e6df1ff3d02555626d6aaf1640b6ea228f28e0db2a7904a15a716eea28e6757d006aea2bacded375cc41ccb58065de04e59ed92d7de7fe438bed0ebfca06f5cb69f8db59ee92265c2da2ed1feb1b10d017f35b3374517322c8d6c4b73d71e522aae8c7119b72f5f4f6169e210383f75e3c15ad11664bfbbc62a8088c7e1c6d7614571da4b53d6b2dc16134416e515dc47b331f62e238025669f529843aa4b4c69d08aa57e3c0745d03c3bab0afed31c90fa6ece0dee187ae91ffcaf9d133e1c98f6f22f94cccb9aa64bfe6a21b05ffec7cb2e7b93880d2bd302335722e86ba7c7034ba868f335dcc476cc6ee469c42ee6777543e67f1644daca29bc5f1b5448ffbea99124cebb26fff74f4d114b02132afa200ac7c5cd5110779a6772c5efe0378ad1ab04697a11da3d2916dfb54aa30a9a1d097aee221e97468d6a12d3941b4b86a78a65a8bb1a00410967da86e1b1be106f3ac0766b4bf48bb0f090832329257d4d1ab76feec1ff11f8358c05df66b374e09b71c4e8973436a72fbd7906bd8a8006e3dd06d0ae84f84d8d2bf5e66c9b4acd974b8d93ba1efdd1be7c5d86da482fec70bfbbc3efe6d454626214fb00d213270c1325e3a35e082b27e60a98a45be07667530d13f9b7c51d49b279862b36eca85de42ab07fdd9f566efc240a18c2d9af40f31ee083ce5a25b40723ba133fe5c10ea28c551f5dd5303483cd1e47fffa3dc3bca88db46ae282d82f39acd1d35770ad8f906249d775e476962843bd7518f4ef484965e0fc8f14e2d2378f30311287751f245857711300871dda4640a91c51a7fac92d2dbf862731ac0c55392157c50e76d65a813eab012d01ef7e202fb00fac4d15cc8222af8d14fbff254c2ba38b0fc257b9f47906009ac3e35daf7d52279b696f0c456b4101ff360b5945177812eec24ceb195d65d44a2d8b429cfc19005c807de366943dcfc0603d5a88598de313c5c6ede07d531fd839707715af5e9440b332753314b7ea4b5015707c65b6b18ccc12b8da24385dd53b8950e760a8b6f3a1cadd9c85e0e37d5401f041dc04dfdd648344472310f2795e527023e3ba8b3f4aa9d2355b89804b3366e9af326ec83bb1d52376d457921feb6d5635d8c577057a5b2b1885d5e00636e6271b88a3949867556538e32fe647db4ddf56437cbae07844f11cce4d81e4f0e2092cc81e603817011e07f7e932764d004554e7caf8f9dd220d4a787de812781402a92a5fbad7620a76ed09cd06ffeaebef6cd6fd5e8f793c698431922ce0501e9668498a6ba2899b8d938bf8bb14d2ca26a4dbbef288977d66fb5a66ddbec11f4d00bd6b43c0d2ebb9e7f2452e505383567005a6989a83a498ed026598abde18e73a9a8fea1615abd9b969bbe797b456c30b0c7c9a9e83acc14dc271c579db11e5ec222e4002814584ec8a57af6fcadaec4871b8858f8938732b2b7783549e596342471ab6ae553e5d203d86b17655cc0b359fa8c62b48c5ceeb4be1a1449961888d2281136b303acaf8b7dc34dc3a310ee9e527e487a747d9239318e3fd6b85510f4c048b6d7cdd645ef20e7215a21f2a092705d21ce0a4c578fa7ab161afe9d218ac5878788a4f6be4c05cf48e4acbc177b21f3f0310d7fb736c2ebfe9277a1c107f5e726db3c193eaa732294abaa66f3f74ab22666bb6b94d29a32a5721280347fca0cd696ee20e95965b83efae3f3f6cb0bd0780e6af7dec977f6a1a4f88df722380b65ae23d9901e313005c8f3bb8649cc22b537511e1350a6bbb1da31dabda732f5b6cdb7eb62eb3a6bbf3052dbed1f5328ac07064bc192a5a281f9d256335c654dc4b567728e08e3b4fccd5057f0290db5b79d0da6161d827c2118bd63870ec5125823df19fe31399c6dcddfa48e935d984c5260dc740e99b4998de3a82daeeb505591aeb9f0c448582424fdbb944c9c743c6074f02cfd87259a57c8bbe6c67ef3183f2141b99d08c9aaccf062fbaee236de2d3b567e1baa0632b6471d74a2b46b796688600de9352668b3706d06f9d3a4eeab2a4ee622829172a2cc3d3375dd4e3497779bea1365c297757668cfb02f59aaa9b6c3c77038e7e0c03a0d859bc7b84799b6d8c77a9ae6f55062ef5a67f72102f975bc1daa41ff3607b1593f1eef864a4ef02b57d2db5708de7c9b2879975a7e2ea426a008581557d02523e6c4d48f36dac3a5cae6e58aa8b92f39568ec6eff5fefef542b5616e71dd5bc4019928af17115ba83cb2dcfbf86785ed134ed86efb93f0f4f6254e91391feb3d67b1775ec061aaafa51a8990b0463ca82f48364348e818e16ba73d7ea209ba32e005f706598f4647f404699e8af7177c15e152e0a7a59b0ff577b71d1341e4783424c018eae1d9ebe1fcdff8cad6c735bbc720fde5eee41a993f7874fd21098161c6418a7cbc816f3d060aa3ec93956ccfa3d3ff1c3fe3ce2a92bf7cdd951398f29437b6e24fa07410cd4080cb8c7c5189a78fb8e954186d0f896598796cf124f7504e1efc3f12b36790ccd5abe06da55189d116ed05ba84fdf20580c91a5eb01bf2866ef16d4e8d8006c1970f3ac31beef2944d9ea1d1a26e42dd872fa047265c8f992b9d19d88f1474e567366599e10dcdbbdde668306ef8e26d8dd62a41439446448f3cb27f52df30910dc18cfbd95dbada2366c7ac6c424abd0a89839d6f049495fbf8b05aa6e94f5c394bf261ab5ceebbaea466355c6576818ab7475a9f8bdaf4ab0487bf9a412f1425eaf2e5730b92bd0d6a4abd4ef97bb07986ad7ef4e4a717768e93a7d4dfe2989c99fadc9dcdfe3b7deaf0adad6dc52ba5fbb54f7c324d96eb3e3e809c6c325c6948cdf70f47d4cb16e31da51f90bbd4723712a9f1f43e12081e72b4265744b0ce4cead9f81dcaf53dc9268df8d6e9223f78771da01a2fd706ad64a1a59763b49cf640822d614a4c3017a73015feb8eda157494849b7b6aadce65579991d0829d2d7928fa28e53b09b2413d6f53955741c6fe8bed800fd54062cd7938740d33a756c52c56abd2ba0c3bde0d91f5b3845e8dee7afe29d314a10fe2a6c775327d565c4b8bdf4fdca838bfaf7a59d5b4bbdce17a7b66245849dd2c0ff0f720f41727af13d356eee6448ef3ef47bb5c08fc04d45d5304d2483f07d6e15fa6269830b61bfc255ae3d1bea605ea675137b1c603aa6532dbca3c404940c3038a1b2d664b69d1332645d842e3e91da4d761424506faa2d462b3307ecb5f7bd08861b70b39e48fe4864b9153bf8f7028c4e66cfb8adef556b3bbf5e5471f94b96caffe18d0ed20ee4ec44ed2ef4459033cb3756df913109d975c299012e7fb81c41e33e39b92dd49bd2f1466e9430ffc3892383a1a33fc9b686f3dc71acda36c73d86062b1ffddc8e0f62d113410be65b917a45540490ca02e15c439a92300b6e5a261ccf5523a2029dd4327fe8b1d0ccdbba30ae04060bdf198397f621a5d386b91141b3f433b088c4300162843bf06e07547ccf48a43381cab432f385a2bd475ae5519d82d940af8e07fea656451b823dad268d94e45d325a43d317e310b94d5f62d756ab2d07ff89aa5e73a9fa428d9d1833601bfef7"}, @NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffff9}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x43, 0x1, "62a7f804902b8788c4228a163adad96d33c62da0fe94c0285f291921498eafe54c24d7adfcb7b070ccd7c58f10034f8c06e5261acdd351ed8d18c1d451e819"}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x6c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x4}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_DATA={0x1038, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}]}]}]}, @NFT_MSG_NEWRULE={0x20, 0x6, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFTA_RULE_COMPAT={0xc, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x5c}]}]}, @NFT_MSG_NEWTABLE={0x80, 0x0, 0xa, 0x101, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELSET={0x40, 0xb, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x5}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x10}, @NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x9}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x33}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x1d}]}, @NFT_MSG_NEWFLOWTABLE={0x2c, 0x16, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0xa}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x57c8}, 0x1, 0x0, 0x0, 0x10}, 0x4) dup(r0) r2 = accept4(r0, 0x0, &(0x7f0000001740), 0x80800) sendmsg$NFT_MSG_GETRULE(r2, &(0x7f0000002e80)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002e40)={&(0x7f00000017c0)={0x15cc, 0x7, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_RULE_USERDATA={0x1004, 0x7, 0x1, 0x0, "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"}, @NFTA_RULE_EXPRESSIONS={0x5a8, 0x4, 0x0, 0x1, [{0x100, 0x1, 0x0, 0x1, [@log={{0x8, 0x1, 'log\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_LOG_LEVEL={0x8, 0x5, 0x1, 0x0, 0xc45d}]}}, @notrack={{0xc, 0x1, 'notrack\x00'}, @void}, @flow_offload={{0x11, 0x1, 'flow_offload\x00'}, @val={0x4c, 0x2, 0x0, 0x1, [@NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz2\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz2\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz2\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOW_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}}, @nat={{0x8, 0x1, 'nat\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NAT_REG_PROTO_MAX={0x8, 0x6, 0x1, 0x0, 0x14}, @NFTA_NAT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_NAT_TYPE={0x8}]}}, @objref={{0xb, 0x1, 'objref\x00'}, @void}, @tproxy={{0xb, 0x1, 'tproxy\x00'}, @void}, @queue={{0xa, 0x1, 'queue\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_QUEUE_SREG_QNUM={0x8, 0x4, 0x1, 0x0, 0x13}]}}, @payload={{0xc, 0x1, 'payload\x00'}, @void}, @tproxy={{0xb, 0x1, 'tproxy\x00'}, @val={0x4}}, @tproxy={{0xb, 0x1, 'tproxy\x00'}, @void}]}, {0x164, 0x1, 0x0, 0x1, [@ct={{0x7, 0x1, 'ct\x00'}, @val={0x3c, 0x2, 0x0, 0x1, [@NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0xf}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_CT_DIRECTION={0x5}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0xd}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0xd}]}}, @match={{0xa, 0x1, 'match\x00'}, @val={0xac, 0x2, 0x0, 0x1, [@NFTA_MATCH_INFO={0x96, 0x3, "e7bc0ecb159fc6c1b21312c8b5cf820113806eaa3bb2638e891b9409d1ad49b5be53a6121aefef896737f5a791eb2490eae0fde6045c2111e4640fbe515c1649b3c11f4e6f436cbbcf7bd95c5e02cee3e95f91e49a2df19b3fcf6412e90e511d552a088b6ffd5a3ce0ee542ab16ed1cf8c2f0b46b82f80988f5e09bd6f171e0d263b7eade7da454f4818127b16c3963f22fe"}, @NFTA_MATCH_REV={0x8}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x4}]}}, @dynset={{0xb, 0x1, 'dynset\x00'}, @void}, @queue={{0xa, 0x1, 'queue\x00'}, @void}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_OSF_TTL={0x5, 0x2, 0xb3}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_TTL={0x5, 0x2, 0x81}, @NFTA_OSF_TTL={0x5, 0x2, 0x2}, @NFTA_OSF_FLAGS={0x8}]}}, @xfrm={{0x9, 0x1, 'xfrm\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_XFRM_DIR={0x5, 0x3, 0x1}]}}]}, {0x340, 0x1, 0x0, 0x1, [@reject={{0xb, 0x1, 'reject\x00'}, @void}, @objref={{0xb, 0x1, 'objref\x00'}, @void}, @meta={{0x9, 0x1, 'meta\x00'}, @void}, @ct={{0x7, 0x1, 'ct\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x14}]}}, @ct={{0x7, 0x1, 'ct\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xa}, @NFTA_CT_DIRECTION={0x5}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x15}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x16}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x15}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x9}]}}, @payload={{0xc, 0x1, 'payload\x00'}, @void}, @socket={{0xb, 0x1, 'socket\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_SOCKET_KEY={0x8}, @NFTA_SOCKET_KEY={0x8}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0x8}]}}, @match={{0xa, 0x1, 'match\x00'}, @val={0x204, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x463d}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x3ff}, @NFTA_MATCH_INFO={0xc1, 0x3, "789892a1669ad54874c89ae74befc9815303747465c9c1cd73f0a99b9180d4fd77d9f4f2b697e27b016788d3047d15958f2648d8dd0e8d6b1dbbb03fc00e7d30c7ae978f321c99976f622dce631f7a350d1c1ba02ed1e291651f987cad2620ebd8fb269a08a1b98c007ff5979787e9a6cefde6462abbd0c0af0d93df003514eeed0700094ca46ccb247a72b9d122d4dd26058352dd210a2387268744a2fe8f2fc91a4692c74ae9398f45105a9194ca86de31fb4b751a15d631c8273fae"}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_MATCH_NAME={0x8, 0x1, '.^[\x00'}, @NFTA_MATCH_INFO={0x61, 0x3, "5e1082dd808116e1e9a57df1d4e14456a9284544de36fa7397226aca7278ee4da0261560bf146579b568a6c1fdd77c990d993696ea656098df51a5509bbb98e949aa6e45ea1652fdc32af34b9b7fb4a599c52627ad84d3f672d95bc8f2"}, @NFTA_MATCH_NAME={0x28, 0x1, 'usersecurityvboxnet1:selinux\xdb!lo))$\x00'}, @NFTA_MATCH_INFO={0x86, 0x3, "f10b1223bce7a8ddbee16e01c2bbbddea915fb6e3830b822334902565bc5d0aee7480432d62702b3f48b68c1fd360047e19f0618c94e4fd84d754558f4145c08778dd79443d37908e78f99b34d803941687fdf0d94771bee442ee49aabb773444b679d243ec1435c2737ec1823478f773fa55d761ccc87772f7721fb2514ca5b6d19"}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x6}]}}, @queue={{0xa, 0x1, 'queue\x00'}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_QUEUE_NUM={0x6, 0x1, 0x1, 0x0, 0x7ff}, @NFTA_QUEUE_TOTAL={0x6, 0x2, 0x1, 0x0, 0x16e4}, @NFTA_QUEUE_FLAGS={0x6, 0x3, 0x1, 0x0, 0x2}, @NFTA_QUEUE_FLAGS={0x6, 0x3, 0x1, 0x0, 0x1}, @NFTA_QUEUE_NUM={0x6, 0x1, 0x1, 0x0, 0x8000}, @NFTA_QUEUE_FLAGS={0x6, 0x3, 0x1, 0x0, 0x1}, @NFTA_QUEUE_SREG_QNUM={0x8, 0x4, 0x1, 0x0, 0x10}, @NFTA_QUEUE_FLAGS={0x6, 0x3, 0x1, 0x0, 0x2}]}}, @target={{0xb, 0x1, 'target\x00'}, @void}]}]}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x2}]}, 0x15cc}, 0x1, 0x0, 0x0, 0x4000090}, 0x8000) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r3, 0x0, 0x0}, 0x20) 10:18:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x42, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:09 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:09 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x46, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6c00, 0x0, 0x0, 0x82868, 0x0) [ 700.934405][T14102] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x48, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) socketpair(0x1d, 0x5, 0x3, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000440), &(0x7f0000000480)=0x4) unshare(0x2a000400) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r3, 0x0, 0x0}, 0x20) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f0000000040)=0x20) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x4ffe2, 0x0) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x56100) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r5, 0x40045730, &(0x7f00000000c0)=0x96cf) 10:18:10 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7a00, 0x0, 0x0, 0x82825, 0x0) 10:18:10 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x2, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x49, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) [ 701.182874][T14424] can: request_module (can-proto-3) failed. 10:18:10 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7400, 0x0, 0x0, 0x82868, 0x0) 10:18:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4a, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 701.273259][T14713] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:10 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x7b9, 0xffffffffffffffff, 0x1, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80, 0x0) connect$phonet_pipe(r2, &(0x7f0000000180)={0x23, 0x7, 0x1, 0xc1}, 0x10) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000040)={0x0, 'wg2\x00', {0x2}, 0x4}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000080)=0x9, &(0x7f0000000100)=0x4) 10:18:10 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x3, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:10 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x80000, 0x0, 0x0, 0x82825, 0x0) 10:18:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:10 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x795b02, 0x0) r2 = getpid() pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f00000001c0)=ANY=[], 0x0) r4 = fcntl$getown(r3, 0x9) rt_tgsigqueueinfo(r2, r4, 0x2, &(0x7f0000000100)={0x21, 0x8, 0x7fffffff}) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000000c0)) 10:18:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4c, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x4, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:10 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7a00, 0x0, 0x0, 0x82868, 0x0) [ 701.641696][T15070] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4d, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x7, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:10 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x82805, 0x0, 0x0, 0x82825, 0x0) 10:18:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4e, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:10 executing program 5: ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f00000000c0)={0x3a, 0x2, 0x4, 0x4, 0x8, {0x77359400}, {0x5, 0x0, 0x1, 0xf2, 0x2, 0x2, "cd2e9e8a"}, 0xffffff00, 0x5, @planes=&(0x7f0000000040)={0x6, 0x1000, @fd, 0x1}, 0x5, 0x0, 0xffffffffffffffff}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) unshare(0x2a000400) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x39, 0xe9, 0x801}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x64, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:11 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0xa, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:11 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x80000, 0x0, 0x0, 0x82868, 0x0) 10:18:11 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$char_usb(r2, &(0x7f00000000c0)="16ee23ad80df4cfa37bdf4f48ab201f72377eb819da185ba2510381aa2572172da722c40a16a499e6c385a59eb62e66783eaf51e9c9f936b179ce49f89d6cee562a2e4ea3c69e5522fb85bad329ffcc0cf5b29b3c3877778e6ae7f683c17223969dad328f8e9875c5845fa7b01639fcabffb9c8768d6b4fae6ed46355ed4ec283a774d8521172481c80ded6c2d01da9df3a777469e752e9dac6027fb7b41ac53a5896c9cbcfe069c3c055a4d025c97a6922683caebd49c96b1331a6fece5238223bfae849cd77377db242330", 0xcc) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={{r3, r4/1000+10000}, {0x0, 0x7530}}) [ 702.020073][T15594] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x2, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:11 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x10, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:11 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x400000, 0x0, 0x0, 0x82825, 0x0) 10:18:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x4, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:11 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x82848, 0x0, 0x0, 0x82868, 0x0) 10:18:11 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = dup2(r0, r1) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0, 0x1}, 0x20) 10:18:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x5, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:11 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0xf4, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 702.393289][T16022] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:11 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x400000, 0x0, 0x0, 0x82868, 0x0) 10:18:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x6, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:11 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x1000000, 0x0, 0x0, 0x82825, 0x0) 10:18:11 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0xfffffecc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x8, 0x28500) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000300)={0x677ac202064f8eda, 0xd4, "44510c87ed12015f8f7e3dec3eb23c324325db154f47db2f2872cacb5c9f854aa63487842c02326cad8a87fb87df1d4a6c49fab1931afb13fe75ea580f99792c8ad4faeb23fadb808e2d984f475707dfe509d20c741b17f543d740eb7cafb07f174c83e45b79112720eac548d33786c879ad0a3121b3819ceb70cf32c0efd031231da206776d84a85f5c6844f00534623345665698f349d733d983072137fd75f261bdc5f88f26a14cbc6466be40cfb7fabbfb5400fa38ff68d8e068934c73eb63b9d8c04dc0dd28927406971f1eb19b8e45b1d5"}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r1, 0x0, r4, 0x0, 0x4ffe2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000700)=ANY=[@ANYRES32=0x0, @ANYBLOB="b8000000b04ddd9c1ed582d0f0de424bdeeca1ff404a541741ad84dc5ab847f4db96393429b2bd030e17c13f2574b2e9dcb389ff28d94abee0bd5408206ff5f1f65041021ff4cb0400e4158ddd3a938bd3453409f32148be29718f697e61cf33ffb169f29aca09817eec07a608dc0ca73720e41f6477f54912c904f25c85af7693d59a248aa8cfde96a41d27e9e3b8f0473ccb10eb2720e90665050e6c3bc1beeea9156251f18cf95ac3c72c2858614aa20649864fc17f0e1f85d176179e1f70f8a04bf71c7f938254469af6b5e24786a9fcf7b9d3cc02070ad54733776cb59a39b9d30f87f9c35bc7613f019c8b60dc321ed31f403345bee8a626beee0c9a4020c30c99edaec62b7659cbfed24ffccdd6a72585dc78cebbdd75c5cdae46a2f50c48de0e77bc6276072c1fd11ba83d7c06cd466c80f859e69244b21643cd2ce099c3151849872eaf16ef3b067dc7cb3d4414544accda0e1fc59fff9fcc1b05a757d85326dc4bd916182b1c23c16d1c16fc7538836915e3446c7cde316b3fcf5dd25c0531"], &(0x7f0000000040)=0xc0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000000)=ANY=[], 0xfffffecc) sendmsg$TIPC_NL_NODE_GET(r9, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000ac0)={0x1b8, r8, 0x1, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}]}, @TIPC_NLA_NET={0x68, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40000000003}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xf60}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5248}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x20, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x93}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_PUBL={0x4}, @TIPC_NLA_BEARER={0xfc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x2, @rand_addr="8c0038944688c2169abc186de9c2ae5d", 0x1f}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x401, @ipv4={[], [], @rand_addr=0x72b}, 0x6}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'eth', 0x3a, 'veth0_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'eth', 0x3a, 'sit0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @rand_addr=0x8}}}}]}]}, 0x1b8}, 0x1, 0x0, 0x0, 0x48814}, 0x20000081) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r5, 0x20, 0x10}, 0xc) unshare(0x2a000400) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3f, 0xe9, 0x801, 0xc2}, 0x40) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000001c0)={{0xffffffffffffffff, 0x1, 0x2, 0x1, 0x7fff}}) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r10, 0x0, 0x0}, 0x20) getcwd(&(0x7f0000000280)=""/22, 0x16) 10:18:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x7, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:11 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x290, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:11 executing program 5: unshare(0x2a000400) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200000, 0x0) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x833, 0x121180) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x0, 0xffffffffffffffff, 0x7, [], 0x0, r1}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000100)=0x81) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 10:18:11 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x8, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:11 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x300, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 702.814285][T16597] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x9, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:12 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x1000000, 0x0, 0x0, 0x82868, 0x0) 10:18:12 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x360, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:12 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x2000000, 0x0, 0x0, 0x82825, 0x0) 10:18:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:12 executing program 5: unshare(0x2a000400) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x220}, 0x40) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x86100, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0, 0x2}, 0x20) 10:18:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0xa, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0xb, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) [ 703.142300][T16981] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:12 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x3e6, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:12 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x3000000, 0x0, 0x0, 0x82825, 0x0) 10:18:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0xc, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:12 executing program 5: unshare(0x3a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r3, 0x4010640d, &(0x7f00000010c0)={0x10}) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000000c0)="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") 10:18:12 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x2000000, 0x0, 0x0, 0x82868, 0x0) 10:18:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0xd, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:12 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x3fe, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 703.442441][T17342] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0xe, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:12 executing program 5: unshare(0x2a000400) nanosleep(&(0x7f0000000040), &(0x7f00000000c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000012c0)={0x0, @in={{0x2, 0x4e22, @empty}}, 0x9, 0xd1, 0x4, 0x1, 0x6}, &(0x7f0000001380)=0x98) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) prctl$PR_SET_TIMERSLACK(0x1d, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) rt_sigaction(0x1, &(0x7f0000001180)={&(0x7f0000001100)="c442b1b890998999992e41d7c4626dab4100c4017c50f43bf226440fc5d9f4c4210163bd0f000000f3400f98427b660f383885740000002e430f18d2", 0xc8000001, &(0x7f00000013c0)="c4e111dae8460ffff843d222c5c110c6e13df245a64777007801c4e21dacbaef000000660fdbed3e66400f3a08530000", {[0x100]}}, &(0x7f0000001240)={&(0x7f00000011c0)="f73d000000000ffca37538ed87660fd49e18290000420400426b1a00c15100f4c481f951a5000000003e430faeec3e660f3840dcc46205a647a1", 0x0, &(0x7f0000001200)="c40141f28136d2760e2666400f6233f041fe4c550d450f9c36c4c13171e346f2490faef78f4870ecff1fc4025997cbc442b19b9ba1000000c4827d18d0"}, 0x8, &(0x7f0000001280)) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000100)=""/4096) 10:18:12 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4000000, 0x0, 0x0, 0x82825, 0x0) 10:18:12 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x700, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x10, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:12 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x3000000, 0x0, 0x0, 0x82868, 0x0) [ 703.673221][T17725] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:12 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0xa00, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:12 executing program 5: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000001780)={@dev, @broadcast, 0x0}, &(0x7f00000017c0)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x39, 0xe9, 0x801, 0x100, 0xffffffffffffffff, 0x0, [], r0}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) socket$phonet(0x23, 0x2, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x2) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20002, 0x0) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f00000000c0)={r4, 0x0, 0x100000000}) 10:18:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:12 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5000000, 0x0, 0x0, 0x82825, 0x0) 10:18:12 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x11, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x0, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:13 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x3f00, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:13 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x12, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 703.987328][T18097] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:13 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f00000000c0)={'wg0\x00', 0x3}) unshare(0x2a000400) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:13 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5280800, 0x0, 0x0, 0x82825, 0x0) 10:18:13 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4000000, 0x0, 0x0, 0x82868, 0x0) 10:18:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x0, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:13 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x7fffffe, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:13 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x4000, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x0, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) [ 704.211479][T18300] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:13 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6000000, 0x0, 0x0, 0x82825, 0x0) 10:18:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept(r1, &(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x80) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)={0x1c, r4, 0xab9535e9a6578fc1, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x11a}]}, 0x1c}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000000)=ANY=[], 0xfffffecc) recvmsg(r5, &(0x7f0000001900)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000200)=""/182, 0xb6}, {&(0x7f00000002c0)=""/245, 0xf5}, {&(0x7f00000003c0)=""/102, 0x66}, {&(0x7f0000000440)=""/202, 0xca}, {&(0x7f0000000540)=""/219, 0xdb}, {&(0x7f0000000640)=""/19, 0x13}, {&(0x7f0000000680)=""/79, 0x4f}, {&(0x7f0000000700)}, {&(0x7f0000000740)=""/198, 0xc6}, {&(0x7f0000000840)=""/4096, 0x1000}], 0xa}, 0x40010022) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = msgget$private(0x0, 0x249) msgrcv(r9, &(0x7f0000001a80)={0x0, ""/226}, 0xea, 0x3, 0x1800) getsockname$packet(r8, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) sendmsg$NL80211_CMD_SET_MPATH(r2, &(0x7f0000001a40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001a00)={&(0x7f00000019c0)={0x24, r4, 0x338, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008084}, 0x20000000) unshare(0x2a000400) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r11, 0x0, 0x0}, 0x20) 10:18:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0x0, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) [ 704.391438][T18456] netlink: 'syz-executor.5': attribute type 282 has an invalid length. 10:18:13 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5000000, 0x0, 0x0, 0x82868, 0x0) 10:18:13 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x6003, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0x0, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:13 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe2, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) connect$tipc(r0, &(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x4e24, 0x1}}, 0x10) unshare(0x2a000400) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) write$9p(r0, &(0x7f00000000c0), 0x0) 10:18:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0x0, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) [ 704.614524][T18691] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:13 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7000000, 0x0, 0x0, 0x82825, 0x0) [ 704.884605][T19001] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:15 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x8000000, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:15 executing program 5: rt_sigtimedwait(&(0x7f0000000040)={[0x4b]}, &(0x7f00000000c0), &(0x7f0000000140)={0x77359400}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe2$9p(&(0x7f00000001c0), 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FBIOGETCMAP(r3, 0x4604, &(0x7f0000000300)={0x5, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0]}) ioctl$USBDEVFS_CLAIMINTERFACE(r1, 0x8004550f, &(0x7f0000000180)=0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r4, 0x0, 0x0}, 0x20) 10:18:15 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6000000, 0x0, 0x0, 0x82868, 0x0) 10:18:15 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x7f00, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:15 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x8000000, 0x0, 0x0, 0x82825, 0x0) 10:18:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x23) [ 706.889688][T19218] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:16 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x9002, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:16 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x9000000, 0x0, 0x0, 0x82825, 0x0) 10:18:16 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7000000, 0x0, 0x0, 0x82868, 0x0) [ 707.272449][T19515] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:17 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x290, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:17 executing program 5: unshare(0x2a000400) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000000)) 10:18:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) 10:18:17 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x8000000, 0x0, 0x0, 0x82868, 0x0) 10:18:17 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xa000000, 0x0, 0x0, 0x82825, 0x0) 10:18:17 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0xe603, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) 10:18:17 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:17 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x40a, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:17 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x9000000, 0x0, 0x0, 0x82868, 0x0) 10:18:17 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) setxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="041777221af8749cd9f1333e5cff704f0392"], 0x1, 0x1) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x101400, 0x0) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x4) [ 708.853393][T19897] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) 10:18:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x423, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:18 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xb000000, 0x0, 0x0, 0x82825, 0x0) 10:18:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 10:18:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x42b, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:18 executing program 5: unshare(0x2a020400) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x4, 0x0, 0xffffffffffffffff, 0x0, [], r0}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:18 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0xf400, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:18 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xa000000, 0x0, 0x0, 0x82868, 0x0) [ 709.160924][T20263] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 10:18:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x42d, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:18 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xc000000, 0x0, 0x0, 0x82825, 0x0) 10:18:18 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x35, 0xe9, 0x801}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 10:18:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x20000990, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:18 executing program 3: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7400, 0x0, 0x0, 0x82825, 0x0) [ 709.513018][T20512] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 709.526125][T20508] xt_hashlimit: overflow, try lower: 1125899906842624/4 10:18:18 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xb000000, 0x0, 0x0, 0x82868, 0x0) 10:18:18 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xd000000, 0x0, 0x0, 0x82825, 0x0) 10:18:18 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0xfe03, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:18 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x10) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000000)={@dev, r7}, 0x14) bind(r4, &(0x7f00000001c0)=@ll={0x11, 0x7, r7, 0x1, 0x5, 0x6, @dev={[], 0x3a}}, 0x80) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x49}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x6, 0x4, 0x202, 0x9, 0x3, 0x4, 0xbb, 0x7c9a, r8}, &(0x7f0000000140)=0x20) 10:18:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x2, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x3, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:18 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x4, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:18 executing program 3: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 709.874087][T20796] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:19 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xe000000, 0x0, 0x0, 0x82825, 0x0) 10:18:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x5, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:19 executing program 5: unshare(0x2a000400) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x20000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x200, 0x0, r0}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 10:18:19 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xc000000, 0x0, 0x0, 0x82868, 0x0) 10:18:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x6, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:19 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) 10:18:19 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x12000, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x7, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 710.162069][T21115] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:19 executing program 5: unshare(0x2a000400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) munlockall() ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x3}, 0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @local}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x83, &(0x7f0000000340)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000040)={r6, 0x2c482da8, 0x20}, &(0x7f0000000080)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x0, r1}, 0x40) 10:18:19 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) 10:18:19 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x10000000, 0x0, 0x0, 0x82825, 0x0) 10:18:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x8, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x9, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:19 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xd000000, 0x0, 0x0, 0x82868, 0x0) 10:18:19 executing program 3: unshare(0x2a000400) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) 10:18:19 executing program 5: r0 = getpid() r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/partitions\x00', 0x0, 0x0) perf_event_open(0x0, r0, 0x0, r1, 0x0) ptrace$setregset(0x4205, r0, 0x200, &(0x7f0000000040)={&(0x7f00000000c0)="152db1845c9f219505b097e6c021e80e8bc5f513c3148135d993340d2da8cd412b35ac27339211e70bf5e59e6cc456a3579963416ac9aabef2fb972b1bd7b7313a3eb5af1f41425bc3dceb167af0c09fbfa0bcaf93a051ea335f5d49d3198f779b06ea2c3d1e4c028a58f862a763febdde01ffb388385bbe425c23b34f952104c915c87d23098ebf8599971f88fa31b5fa1e4d5524d12ab5bdd7061129a1aca88464727bd86fdd8708c941dbfb892ce5b4df4333916b0cfc2ccfee9cf382c7e874b8", 0xc2}) unshare(0x2a000400) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 10:18:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0xa, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:19 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x11000000, 0x0, 0x0, 0x82825, 0x0) [ 710.454870][T21361] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 710.722766][T21624] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:19 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x3ffff, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0xb, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:19 executing program 3: unshare(0x2a000400) bind(0xffffffffffffffff, 0x0, 0x0) 10:18:19 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x10) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@dev, r3}, 0x14) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x4ffe2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000000)=ANY=[], 0xfffffecc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r6, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x4, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x8, 0x5}, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x6, 0x5, 0x5}, &(0x7f0000000240)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x8}}, 0x10) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x40000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xb, 0x2, &(0x7f0000000040)=@raw=[@generic={0x3, 0x5, 0xb, 0x7, 0xfffffffb}, @generic={0x5, 0x9, 0xe, 0x81, 0x80}], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x2, [], r3, 0x11, r4, 0x8, &(0x7f0000000100)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x7, 0x1, 0x81}, 0x10, r7, r8}, 0x78) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:19 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x12000000, 0x0, 0x0, 0x82825, 0x0) 10:18:19 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xe000000, 0x0, 0x0, 0x82868, 0x0) 10:18:19 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0xc, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:20 executing program 3: unshare(0x2a000400) bind(0xffffffffffffffff, 0x0, 0x0) 10:18:20 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0xd, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 710.971159][T21751] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:20 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x1f000000, 0x0, 0x0, 0x82825, 0x0) 10:18:20 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f00000000c0)) 10:18:20 executing program 3: unshare(0x2a000400) bind(0xffffffffffffffff, 0x0, 0x0) [ 711.232625][T21965] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:20 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x40000, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:20 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x10000000, 0x0, 0x0, 0x82868, 0x0) 10:18:20 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0xe, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:20 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) 10:18:20 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x20000000, 0x0, 0x0, 0x82825, 0x0) 10:18:20 executing program 5: unshare(0x2a000400) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) splice(r1, 0x0, r1, 0x0, 0x4ffe2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x39, 0xe9, 0x801, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x0, 0x3}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r4, 0x0, 0x0}, 0x20) 10:18:20 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) 10:18:20 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x10, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:20 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x11, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:20 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801, 0x408}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 10:18:20 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) [ 711.815338][T22228] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:21 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x12, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:21 executing program 3: unshare(0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) 10:18:21 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x25000000, 0x0, 0x0, 0x82825, 0x0) 10:18:21 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x100000, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:21 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x11000000, 0x0, 0x0, 0x82868, 0x0) 10:18:21 executing program 5: unshare(0x2a000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x39, 0xe9, 0x801}, 0x3c) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) pipe2(&(0x7f0000000140), 0x800) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) write$FUSE_LSEEK(r2, &(0x7f00000001c0)={0x18, 0x0, 0x1, {0x800}}, 0x18) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) 10:18:21 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x25, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:21 executing program 3: unshare(0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) 10:18:21 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x48, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 712.493102][T22573] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:21 executing program 5: unshare(0x2a000400) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x39, 0xe9, 0x801, 0x200, r5, 0x0, [], r2, r3}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r6, 0x0, 0x0}, 0x20) 10:18:21 executing program 3: unshare(0x0) r0 = socket$l2tp(0x2, 0x2, 0x73) bind(r0, 0x0, 0x0) 10:18:21 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x3f000000, 0x0, 0x0, 0x82825, 0x0) 10:18:21 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x4c, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:21 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x12000000, 0x0, 0x0, 0x82868, 0x0) 10:18:21 executing program 3: unshare(0x2a000400) socket$l2tp(0x2, 0x2, 0x73) bind(0xffffffffffffffff, 0x0, 0x0) [ 712.871795][T22885] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:23 executing program 5: mknod(&(0x7f0000000000)='./bus\x00', 0x1, 0x0) setresgid(0xffffffffffffffff, 0xee01, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) 10:18:23 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x60, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:23 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x1f000000, 0x0, 0x0, 0x82868, 0x0) 10:18:23 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x40000000, 0x0, 0x0, 0x82825, 0x0) 10:18:23 executing program 3: unshare(0x2a000400) socket$l2tp(0x2, 0x2, 0x73) bind(0xffffffffffffffff, 0x0, 0x0) 10:18:23 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x200100, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:23 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x68, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:23 executing program 3: unshare(0x2a000400) socket$l2tp(0x2, 0x2, 0x73) bind(0xffffffffffffffff, 0x0, 0x0) [ 714.360987][T23105] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:23 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x6c, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:23 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x48000000, 0x0, 0x0, 0x82825, 0x0) 10:18:23 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x20000000, 0x0, 0x0, 0x82868, 0x0) 10:18:23 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x74, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:23 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:18:23 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2b48000024000705d21b80788c63940d0424fc60100011400a2f0000051982c1375b3e37096b088000f01700d1bd", 0x33fe0}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000780)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x3f, 0x20d, 0x2, 0x0, 0x535c4d0c}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r5) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nvram\x00', 0x204500, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x9) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) [ 714.693569][T23324] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 714.713146][T23325] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000a80)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {0x0}], 0x2) 10:18:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x7a, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:26 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x28d000, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:26 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x25000000, 0x0, 0x0, 0x82868, 0x0) 10:18:26 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4c000000, 0x0, 0x0, 0x82825, 0x0) 10:18:26 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:18:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x172, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 717.516243][T23733] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:18:26 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:18:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 717.607583][T23800] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x278, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 717.686351][T23850] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:18:26 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5a100000, 0x0, 0x0, 0x82825, 0x0) 10:18:26 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x40000000, 0x0, 0x0, 0x82868, 0x0) 10:18:26 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:18:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x290, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 717.877495][T23957] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 717.924783][T23961] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 717.977700][T23963] xt_hashlimit: overflow, try lower: 1125899906842624/4 10:18:30 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0xd02800, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:30 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:18:30 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5c000000, 0x0, 0x0, 0x82825, 0x0) 10:18:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x300, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:30 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x48000000, 0x0, 0x0, 0x82868, 0x0) 10:18:30 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 10:18:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x360, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 721.426007][T24270] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:18:30 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:18:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x3e6, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 721.520812][T24280] xt_hashlimit: overflow, try lower: 1125899906842624/4 [ 721.538956][T24282] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:30 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x3fe, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 721.597098][T24288] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:18:30 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x68000000, 0x0, 0x0, 0x82825, 0x0) 10:18:30 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 721.763299][T24390] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 721.872359][T24395] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:18:46 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x1000000, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:46 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x48280800, 0x0, 0x0, 0x82868, 0x0) 10:18:46 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x500, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:46 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) dup(r1) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:18:46 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 10:18:46 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6c000000, 0x0, 0x0, 0x82825, 0x0) [ 737.859026][T24499] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:18:47 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) dup(r1) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:18:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x600, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:47 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) dup(r1) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 737.977431][T24511] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:18:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 10:18:47 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x700, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:18:47 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x4c000000, 0x0, 0x0, 0x82868, 0x0) [ 738.043232][T24604] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 738.063641][T24596] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:19:09 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x2000000, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:19:09 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:19:09 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x74000000, 0x0, 0x0, 0x82825, 0x0) 10:19:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x900, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:19:09 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 10:19:09 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5a100000, 0x0, 0x0, 0x82868, 0x0) [ 760.014835][T24833] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:19:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0xa00, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:19:09 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:19:09 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) 10:19:09 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x5c000000, 0x0, 0x0, 0x82868, 0x0) 10:19:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0xb00, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 760.177352][T24944] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 760.199930][T24945] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:19:09 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) 10:19:52 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x3000000, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:19:52 executing program 5: r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:19:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0xc00, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:19:52 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) 10:19:52 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7a000000, 0x0, 0x0, 0x82825, 0x0) 10:19:52 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x68000000, 0x0, 0x0, 0x82868, 0x0) 10:19:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 802.970821][T25162] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:19:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0xd00, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:19:52 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:19:52 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x6c000000, 0x0, 0x0, 0x82868, 0x0) 10:19:52 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 803.115450][T25274] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 803.141784][T25276] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:19:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0xe00, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:21:02 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x7000000, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:21:02 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:21:02 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x8cffffff, 0x0, 0x0, 0x82825, 0x0) 10:21:02 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 10:21:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x1100, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:21:02 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x74000000, 0x0, 0x0, 0x82868, 0x0) 10:21:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x1200, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 873.020680][T25492] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:21:02 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 10:21:02 executing program 5: r0 = socket(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 873.132359][T25505] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:21:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x2000, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:21:02 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x7a000000, 0x0, 0x0, 0x82868, 0x0) 10:21:02 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 873.498686][T25604] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 874.988567][ T231] tipc: TX() has been purged, node left! [ 875.744591][T25721] IPVS: ftp: loaded support on port[0] = 21 [ 876.019526][T25721] chnl_net:caif_netlink_parms(): no params data found [ 876.142597][T25721] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.154616][T25721] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.168326][T25721] device bridge_slave_0 entered promiscuous mode [ 876.280680][T25721] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.287874][T25721] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.309534][T25721] device bridge_slave_1 entered promiscuous mode [ 876.331043][T25721] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 876.343086][T25721] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 876.376129][T25721] team0: Port device team_slave_0 added [ 876.391002][T25721] team0: Port device team_slave_1 added [ 876.416219][T25721] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 876.423372][T25721] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 876.450108][T25721] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 876.463473][T25721] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 876.470830][T25721] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 876.501786][T25721] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 876.731245][T25721] device hsr_slave_0 entered promiscuous mode [ 876.768889][T25721] device hsr_slave_1 entered promiscuous mode [ 876.828632][T25721] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 876.847903][T25721] Cannot create hsr debugfs directory [ 877.178163][T25721] 8021q: adding VLAN 0 to HW filter on device bond0 [ 877.207151][T32563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 877.225031][T32563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 877.243096][T25721] 8021q: adding VLAN 0 to HW filter on device team0 [ 877.448914][ T3869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 877.457975][ T3869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 877.469303][ T3869] bridge0: port 1(bridge_slave_0) entered blocking state [ 877.476371][ T3869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 877.485338][ T3869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 877.494913][ T3869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 877.513637][ T3869] bridge0: port 2(bridge_slave_1) entered blocking state [ 877.521087][ T3869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 877.541610][ T3869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 877.554633][ T3869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 877.578661][ T3869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 877.589886][ T3869] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 877.599187][ T3869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 877.607584][ T3869] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 877.617267][ T3869] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 877.637568][T25721] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 877.662226][T25721] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 877.838193][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 877.854365][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 877.866268][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 877.886650][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 877.905384][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 877.940413][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 877.949051][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 877.969105][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 877.989267][T25721] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 878.266574][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 878.282880][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 878.315129][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 878.328203][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 878.344438][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 878.354220][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 878.526166][T25721] device veth0_vlan entered promiscuous mode [ 878.548000][T25721] device veth1_vlan entered promiscuous mode [ 878.592782][T32563] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 878.605647][T32563] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 878.616633][T32563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 878.633546][T32563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 878.655647][T25721] device veth0_macvtap entered promiscuous mode [ 878.692365][T25721] device veth1_macvtap entered promiscuous mode [ 878.724338][T25721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 878.745814][T25721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 878.764437][T25721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 878.777913][T25721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 878.799619][T25721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 878.815207][T25721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 878.827520][T25721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 878.846981][T25721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 878.858216][T25721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 878.876608][T25721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 878.887091][T25721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 878.905059][T25721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 878.917154][T25721] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 878.938035][ T231] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 878.954589][ T231] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 878.965205][ T231] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 878.980824][ T231] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 878.997441][ T231] device bridge_slave_1 left promiscuous mode [ 879.006738][ T231] bridge0: port 2(bridge_slave_1) entered disabled state [ 879.064394][ T231] device bridge_slave_0 left promiscuous mode [ 879.077662][ T231] bridge0: port 1(bridge_slave_0) entered disabled state [ 879.154502][ T231] device veth1_macvtap left promiscuous mode [ 879.168580][ T231] device veth0_macvtap left promiscuous mode [ 879.177527][ T231] device veth1_vlan left promiscuous mode [ 879.192278][ T231] device veth0_vlan left promiscuous mode [ 885.398705][ T231] device hsr_slave_0 left promiscuous mode [ 885.445270][ T231] device hsr_slave_1 left promiscuous mode [ 885.532730][ T231] team0 (unregistering): Port device team_slave_1 removed [ 885.553642][ T231] team0 (unregistering): Port device team_slave_0 removed [ 885.577133][ T231] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 885.639819][ T231] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 885.815005][ T231] bond0 (unregistering): Released all slaves [ 885.981978][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 885.999005][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 886.007026][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 886.019846][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 886.032469][T25721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 886.044447][T25721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 886.062511][T25721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 886.076872][T25721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 886.094255][T25721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 886.112449][T25721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 886.124514][T25721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 886.142378][T25721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 886.154752][T25721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 886.172216][T25721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 886.186524][T25721] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 886.208938][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 886.226032][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:23:52 executing program 2: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0xa000000, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:23:52 executing program 1: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0xebffffff, 0x0, 0x0, 0x82825, 0x0) 10:23:52 executing program 4: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) syz_mount_image$iso9660(0x0, &(0x7f0000000240)='./bus\x00', 0x8cffffff, 0x0, 0x0, 0x82868, 0x0) 10:23:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x2500, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:23:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000000)={0x7f9}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x59, &(0x7f0000000040)=[{&(0x7f0000000380)="24000000160007031dfffd946f610500070000040200000077000000421ba3a20400ff7e280000001100ffffba16a004000000000000000013000000000000eff24d8238c7a47e23f7efbf54", 0x4c}], 0x1}, 0x0) 10:23:52 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 1043.169198][ T231] tipc: TX() has been purged, node left! [ 1043.231340][T25748] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 10:23:52 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005340), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 10:23:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x3f00, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:23:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x4000, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:23:52 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005340), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 10:23:52 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x27) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x4800, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x4000000000000, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 10:23:52 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005340), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001140)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 1045.426140][T25969] IPVS: ftp: loaded support on port[0] = 21 [ 1045.674028][T25969] chnl_net:caif_netlink_parms(): no params data found [ 1045.753546][T25969] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.763144][T25969] bridge0: port 1(bridge_slave_0) entered disabled state [ 1045.772656][T25969] device bridge_slave_0 entered promiscuous mode [ 1045.782244][T25969] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.790105][T25969] bridge0: port 2(bridge_slave_1) entered disabled state [ 1045.799496][T25969] device bridge_slave_1 entered promiscuous mode [ 1045.823632][T25969] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1045.837730][T25969] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1045.864182][T25969] team0: Port device team_slave_0 added [ 1045.873245][T25969] team0: Port device team_slave_1 added [ 1045.891732][T25969] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1045.899666][T25969] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1045.926164][T25969] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1046.040028][T25969] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1046.047113][T25969] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1046.074958][T25969] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1046.145918][T25969] device hsr_slave_0 entered promiscuous mode [ 1046.199509][T25969] device hsr_slave_1 entered promiscuous mode [ 1046.239054][T25969] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1046.246659][T25969] Cannot create hsr debugfs directory [ 1046.485344][T25969] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.492784][T25969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1046.500282][T25969] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.507347][T25969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1046.564263][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 1046.579531][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 1046.612013][T25969] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1046.629365][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1046.637259][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1046.779967][T25969] 8021q: adding VLAN 0 to HW filter on device team0 [ 1046.803211][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1046.819741][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1046.828302][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 1046.835459][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1046.861630][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1046.870969][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1046.879901][ T2686] bridge0: port 2(bridge_slave_1) entered blocking state [ 1046.886977][ T2686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1046.896597][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1046.906303][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1046.924363][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1046.938124][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1046.947251][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1046.956903][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1046.977908][T25969] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1046.989132][T25969] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1047.002750][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1047.011772][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1047.020451][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1047.030577][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1047.039273][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1047.228514][T32563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1047.237223][T32563] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1047.253154][T32563] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1047.274577][T25969] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1047.437939][ T231] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1047.455943][ T231] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1047.465463][ T231] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1047.480800][ T231] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1047.497267][ T231] device bridge_slave_1 left promiscuous mode [ 1047.506552][ T231] bridge0: port 2(bridge_slave_1) entered disabled state [ 1047.570140][ T231] device bridge_slave_0 left promiscuous mode [ 1047.576422][ T231] bridge0: port 1(bridge_slave_0) entered disabled state [ 1047.646612][ T231] device veth1_macvtap left promiscuous mode [ 1047.653546][ T231] device veth0_macvtap left promiscuous mode [ 1047.667789][ T231] device veth1_vlan left promiscuous mode [ 1047.675413][ T231] device veth0_vlan left promiscuous mode [ 1053.619561][ T231] device hsr_slave_0 left promiscuous mode [ 1053.688694][ T231] device hsr_slave_1 left promiscuous mode [ 1053.756585][ T231] team0 (unregistering): Port device team_slave_1 removed [ 1053.782388][ T231] team0 (unregistering): Port device team_slave_0 removed [ 1053.803188][ T231] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1053.868028][ T231] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1054.054938][ T231] bond0 (unregistering): Released all slaves [ 1054.239308][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1054.248020][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1054.272973][T25969] device veth0_vlan entered promiscuous mode [ 1054.289654][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1054.307479][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1054.333511][T25969] device veth1_vlan entered promiscuous mode [ 1054.352862][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1054.365285][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1054.376738][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1054.412325][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1054.421051][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1054.429726][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1054.441828][T25969] device veth0_macvtap entered promiscuous mode [ 1054.454065][T25969] device veth1_macvtap entered promiscuous mode [ 1054.472148][T25969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1054.484523][T25969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1054.494576][T25969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1054.505754][T25969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1054.515793][T25969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1054.526799][T25969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1054.537319][T25969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1054.548729][T25969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1054.559260][T25969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1054.569953][T25969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1054.581616][T25969] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1054.590316][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1054.599810][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1054.607860][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1054.622176][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1054.633341][T25969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1054.644797][T25969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1054.662543][T25969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1054.676186][T25969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1054.693039][T25969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1054.705740][T25969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1054.723205][T25969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1054.735851][T25969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1054.753612][T25969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1054.766322][T25969] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1054.783067][T25969] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1054.807817][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1054.817543][ T2686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1211.518591][ T987] INFO: task kworker/u4:4:231 blocked for more than 143 seconds. [ 1211.526437][ T987] Not tainted 5.6.0-rc2-syzkaller #0 [ 1211.548433][ T987] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1211.557124][ T987] kworker/u4:4 D24848 231 2 0x80004000 [ 1211.588507][ T987] Workqueue: netns cleanup_net [ 1211.593269][ T987] Call Trace: [ 1211.596578][ T987] __schedule+0x87f/0xcd0 [ 1211.618471][ T987] schedule+0x188/0x210 [ 1211.622645][ T987] schedule_preempt_disabled+0x13/0x20 [ 1211.628095][ T987] __mutex_lock_common+0x11f1/0x2f30 [ 1211.648848][ T987] ? hashlimit_net_exit+0x40/0x210 [ 1211.654008][ T987] mutex_lock_nested+0x1b/0x30 [ 1211.659051][ T987] hashlimit_net_exit+0x40/0x210 [ 1211.663993][ T987] cleanup_net+0x6f8/0xb80 [ 1211.668695][ T987] process_one_work+0x7f5/0x10f0 [ 1211.673664][ T987] worker_thread+0xbbc/0x1630 [ 1211.678372][ T987] kthread+0x332/0x350 [ 1211.682709][ T987] ? rcu_lock_release+0x30/0x30 [ 1211.687556][ T987] ? kthread_blkcg+0xe0/0xe0 [ 1211.692515][ T987] ret_from_fork+0x24/0x30 [ 1211.697088][ T987] [ 1211.697088][ T987] Showing all locks held in the system: [ 1211.705084][ T987] 4 locks held by kworker/u4:4/231: [ 1211.710526][ T987] #0: ffff8880a9a7e128 ((wq_completion)netns){+.+.}, at: process_one_work+0x763/0x10f0 [ 1211.720565][ T987] #1: ffffc90001a47d78 (net_cleanup_work){+.+.}, at: process_one_work+0x7a5/0x10f0 [ 1211.730189][ T987] #2: ffffffff8958f068 (pernet_ops_rwsem){++++}, at: cleanup_net+0xa5/0xb80 [ 1211.739181][ T987] #3: ffffffff895addb0 (hashlimit_mutex){+.+.}, at: hashlimit_net_exit+0x40/0x210 [ 1211.748697][ T987] 1 lock held by khungtaskd/987: [ 1211.753621][ T987] #0: ffffffff892d9908 (rcu_read_lock){....}, at: rcu_lock_acquire+0x4/0x30 [ 1211.763242][ T987] 5 locks held by kworker/1:3/4060: [ 1211.778568][ T987] 1 lock held by udevd/4187: [ 1211.783162][ T987] 1 lock held by rsyslogd/8621: [ 1211.787994][ T987] #0: ffff8880a4108660 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x279/0x310 [ 1211.818460][ T987] 2 locks held by getty/8711: [ 1211.823160][ T987] #0: ffff888094578090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1211.848441][ T987] #1: ffffc9000174b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 1211.858012][ T987] 2 locks held by getty/8712: [ 1211.878441][ T987] #0: ffff8880938f5090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1211.887652][ T987] #1: ffffc900017cb2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 1211.928465][ T987] 2 locks held by getty/8713: [ 1211.933148][ T987] #0: ffff888092086090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1211.949115][ T987] #1: ffffc900017ab2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 1211.968489][ T987] 2 locks held by getty/8714: [ 1211.973167][ T987] #0: ffff88809fff8090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1212.004967][ T987] #1: ffffc900017db2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 1212.044110][ T987] 2 locks held by getty/8715: [ 1212.049062][ T987] #0: ffff888092085090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1212.058266][ T987] #1: ffffc9000177b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 1212.093940][ T987] 2 locks held by getty/8716: [ 1212.108502][ T987] #0: ffff8880a2ab9090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1212.117719][ T987] #1: ffffc900017eb2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 1212.148454][ T987] 2 locks held by getty/8717: [ 1212.153136][ T987] #0: ffff8880921cf090 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x25/0x70 [ 1212.178436][ T987] #1: ffffc9000172b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x22f/0x1bc0 [ 1212.188036][ T987] 1 lock held by syz-executor.2/25982: [ 1212.213921][ T987] [ 1212.216251][ T987] ============================================= [ 1212.216251][ T987] [ 1212.253976][ T987] NMI backtrace for cpu 1 [ 1212.258321][ T987] CPU: 1 PID: 987 Comm: khungtaskd Not tainted 5.6.0-rc2-syzkaller #0 [ 1212.266451][ T987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1212.276497][ T987] Call Trace: [ 1212.279810][ T987] dump_stack+0x1fb/0x318 [ 1212.284137][ T987] nmi_cpu_backtrace+0xaa/0x190 [ 1212.288975][ T987] ? nmi_trigger_cpumask_backtrace+0x168/0x290 [ 1212.295188][ T987] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 1212.301250][ T987] nmi_trigger_cpumask_backtrace+0x16f/0x290 [ 1212.307233][ T987] arch_trigger_cpumask_backtrace+0x10/0x20 [ 1212.313168][ T987] trigger_all_cpu_backtrace+0x17/0x20 [ 1212.318625][ T987] watchdog+0xd40/0xd60 [ 1212.322793][ T987] kthread+0x332/0x350 [ 1212.326852][ T987] ? hungtask_pm_notify+0x50/0x50 [ 1212.331866][ T987] ? kthread_blkcg+0xe0/0xe0 [ 1212.336462][ T987] ret_from_fork+0x24/0x30 [ 1212.341162][ T987] Sending NMI from CPU 1 to CPUs 0: [ 1212.346717][ C0] NMI backtrace for cpu 0 [ 1212.346722][ C0] CPU: 0 PID: 25982 Comm: syz-executor.2 Not tainted 5.6.0-rc2-syzkaller #0 [ 1212.346726][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1212.346729][ C0] RIP: 0010:trace_softirqs_off+0x75/0x3e0 [ 1212.346736][ C0] Code: 08 00 00 48 89 d8 48 c1 e8 03 42 8a 04 20 84 c0 0f 85 fe 01 00 00 83 3b 00 0f 85 30 01 00 00 48 c7 c0 20 01 44 8a 48 c1 e8 03 <42> 8a 04 20 84 c0 0f 85 04 02 00 00 83 3d 48 61 e8 08 00 75 3e 48 [ 1212.346739][ C0] RSP: 0018:ffffc900017e7968 EFLAGS: 00000806 [ 1212.346744][ C0] RAX: 1ffffffff1488024 RBX: ffff8880a94d8a14 RCX: 0000000000040000 [ 1212.346747][ C0] RDX: ffffc9000f0cf000 RSI: 0000000000000201 RDI: ffffffff86bd8a39 [ 1212.346751][ C0] RBP: ffffc900017e7990 R08: ffff8880a94d89d8 R09: fffffbfff1406539 [ 1212.346754][ C0] R10: fffffbfff1406539 R11: 0000000000000000 R12: dffffc0000000000 [ 1212.346757][ C0] R13: ffffc90019d25084 R14: ffffffff86bd8a39 R15: ffff8880a94d8180 [ 1212.346761][ C0] FS: 00007fcbe46e4700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 1212.346764][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1212.346767][ C0] CR2: ffffffffff600400 CR3: 000000005749d000 CR4: 00000000001406f0 [ 1212.346771][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1212.346774][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1212.346776][ C0] Call Trace: [ 1212.346778][ C0] ? htable_selective_cleanup+0x99/0x320 [ 1212.346781][ C0] __local_bh_disable_ip+0xb4/0x170 [ 1212.346783][ C0] ? htable_selective_cleanup+0x99/0x320 [ 1212.346786][ C0] _raw_spin_lock_bh+0x1b/0x50 [ 1212.346788][ C0] htable_selective_cleanup+0x99/0x320 [ 1212.346791][ C0] htable_put+0x213/0x2a0 [ 1212.346793][ C0] hashlimit_mt_destroy_v2+0x5b/0x70 [ 1212.346796][ C0] ? hashlimit_mt_check_v2+0x440/0x440 [ 1212.346798][ C0] translate_table+0x1b9a/0x22e0 [ 1212.346801][ C0] ? __kasan_check_write+0x14/0x20 [ 1212.346803][ C0] do_ip6t_set_ctl+0x2c3/0x550 [ 1212.346805][ C0] nf_setsockopt+0x27a/0x2a0 [ 1212.346808][ C0] ipv6_setsockopt+0x9a/0x160 [ 1212.346810][ C0] rawv6_setsockopt+0x2cc/0x490 [ 1212.346813][ C0] sock_common_setsockopt+0x99/0xb0 [ 1212.346815][ C0] ? sock_common_recvmsg+0x190/0x190 [ 1212.346817][ C0] __sys_setsockopt+0x582/0x720 [ 1212.346820][ C0] __x64_sys_setsockopt+0xbf/0xd0 [ 1212.346822][ C0] do_syscall_64+0xf7/0x1c0 [ 1212.346825][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1212.346827][ C0] RIP: 0033:0x45c6b9 [ 1212.346834][ C0] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1212.346836][ C0] RSP: 002b:00007fcbe46e3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1212.346842][ C0] RAX: ffffffffffffffda RBX: 00007fcbe46e46d4 RCX: 000000000045c6b9 [ 1212.346846][ C0] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 1212.346849][ C0] RBP: 000000000076bf20 R08: 0000000000000490 R09: 0000000000000000 [ 1212.346852][ C0] R10: 0000000020000500 R11: 0000000000000246 R12: 00000000ffffffff [ 1212.346856][ C0] R13: 0000000000000a09 R14: 00000000004d59b0 R15: 000000000076bf2c [ 1212.464421][ T987] Kernel panic - not syncing: hung_task: blocked tasks [ 1212.663418][ T987] CPU: 1 PID: 987 Comm: khungtaskd Not tainted 5.6.0-rc2-syzkaller #0 [ 1212.671553][ T987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1212.681601][ T987] Call Trace: [ 1212.684907][ T987] dump_stack+0x1fb/0x318 [ 1212.689250][ T987] panic+0x264/0x7a9 [ 1212.693141][ T987] ? nmi_trigger_cpumask_backtrace+0x218/0x290 [ 1212.699295][ T987] watchdog+0xd53/0xd60 [ 1212.703456][ T987] kthread+0x332/0x350 [ 1212.707510][ T987] ? hungtask_pm_notify+0x50/0x50 [ 1212.712523][ T987] ? kthread_blkcg+0xe0/0xe0 [ 1212.717118][ T987] ret_from_fork+0x24/0x30 [ 1212.722915][ T987] Kernel Offset: disabled [ 1212.727233][ T987] Rebooting in 86400 seconds..