, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000}}}, 0x0, 0x0, 0x0, 0x0}) [ 718.400641][T14508] EXT4-fs (loop4): mount failed 19:05:08 executing program 3: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)={0x0, 0x100000001}) 19:05:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:f']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:09 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000040)="66b8808b5ecb0f23d80f21f86635800000b00f23f80f01c5260f380020bad004ed660fc775030f01c465f20f2db79b3ce42236f3aeb8fd000f00d8", 0x3b}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x88003}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb, 0x0, 0x0, 0x0, 0x100000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 719.328429][T14543] overlayfs: overlapping lowerdir path [ 719.372378][T14544] overlayfs: failed to resolve './file1': -2 19:05:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_MSG_GETRULE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) [ 719.531123][T14550] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #4: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 719.560497][T14550] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 4 [ 719.580307][T14550] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 719.601759][T14550] EXT4-fs (loop4): mount failed [ 719.678058][T14558] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 19:05:10 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x16e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 19:05:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:f']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x20000000000000d8) [ 720.406219][T14576] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #4: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 720.620648][T14576] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 4 [ 720.681598][T14587] overlayfs: overlapping lowerdir path 19:05:11 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) [ 720.913531][T14576] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 721.104763][T14576] EXT4-fs (loop4): mount failed 19:05:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x1}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 19:05:11 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:11 executing program 5: getpid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 721.950340][T14609] overlayfs: failed to resolve './file1': -2 [ 721.978586][T14613] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #4: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 722.003789][T14613] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 4 [ 722.015923][T14613] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 722.039762][T14613] EXT4-fs (loop4): mount failed [ 722.050175][T14608] overlayfs: overlapping lowerdir path 19:05:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:f']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:12 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 723.057915][T14634] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #4: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 723.271517][T14634] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 4 [ 723.272149][T14640] overlayfs: failed to resolve 'f': -2 [ 723.309429][T14634] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 723.496221][T14644] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 723.546524][T14634] EXT4-fs (loop4): mount failed 19:05:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xf60d4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x6, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) time(0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f0000000200)=0x1, 0x4) write$P9_RFLUSH(r2, &(0x7f00000001c0)={0x7d6a591eedaef62b}, 0x11ffffff6) 19:05:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x1}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 19:05:14 executing program 5: clone(0x3a3dd4008500af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='4\xacXrcO\b\xc4ut/eve\x94\xa1m\x1e\x12\x8ai,\xbeTnt#\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="7f454c46000000d2000000000001000003003e0000001000000006000000001e40000000000000000000000000008b000000001000003800020000000000000003"], 0x44) fstat(r0, &(0x7f0000000140)) write$P9_RGETATTR(r0, &(0x7f0000000080)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0xa0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 19:05:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:fil']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:14 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x1}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 724.083429][T14651] ERROR: Domain ' /sbin/init /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.5 proc:/self/fd/3' not defined. 19:05:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc9, 0xc9, 0x4, [@func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "f5"}, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0xe8}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 724.264769][T14661] overlayfs: overlapping lowerdir path [ 724.793346][T14676] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #4: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 19:05:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:15 executing program 3: r0 = socket(0xa, 0x3, 0xff) sendmmsg$unix(r0, &(0x7f0000001980)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0}], 0x1, 0x0) [ 724.891739][T14676] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 4 [ 724.927328][T14681] overlayfs: failed to resolve 'fil': -2 [ 724.938693][T14676] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 724.969723][T14676] EXT4-fs (loop4): mount failed 19:05:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x50}}, 0x0) 19:05:15 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:15 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'vlan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) 19:05:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:fil']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:15 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10=\x8f\xa2\xc7\x8b\x96|?\x16\xbf\xa1$\xe2\xf4\xa6t#M\xe0l\x0e<\x89\x8df\xa0m\x00\a\xbb\x84\xc2V\xff\xb0j\x06\x00\xba\x1a\xe7@\xab\xe2v\x8a\x97\x88\xd3\xa5\xeePb\x10\xf5\'\xc1\x01\xfew\xdfgCM>\xba\xc6\xe5\xa6\xac\xfa\xed\xdf;') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0xc0242, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x141202, 0x0) write$FUSE_INIT(r3, &(0x7f0000000140)={0x50}, 0xfaf741a0) fallocate(r1, 0x10, 0x0, 0xdbfd) signalfd4(r2, 0x0, 0x0, 0x0) [ 725.832190][T14696] overlayfs: overlapping lowerdir path 19:05:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 726.171071][T14701] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #4: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 726.428115][T14701] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 4 19:05:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 726.469573][T14708] overlayfs: failed to resolve 'fil': -2 19:05:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@broadcast, @in6=@private2={0xfc, 0x2, [], 0x1}, 0x4e20, 0x3ff, 0x4e22, 0x8, 0xa, 0x80, 0x40, 0x67, 0x0, r2}, {0xfffffffffffffff7, 0x6, 0x2, 0x9c7, 0x8, 0x8, 0x4, 0x1}, {0x706, 0x5aa, 0x2, 0x4}, 0x5, 0x0, 0x3, 0x1, 0x1, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d5, 0x1}, 0x0, @in6=@empty, 0x3505, 0x3, 0x0, 0xc, 0x4, 0x2, 0x8001}}, 0xe8) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="39000000130009006900000000000000ab008000200000004600010707000014190001001000000800005068000000000000ef38bf461e59d7", 0x39}], 0x1) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x52930, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa12d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 726.617453][T14701] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 726.688261][T14701] EXT4-fs (loop4): mount failed 19:05:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:fil']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:17 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000640)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86\x06\x00\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\x02j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x02\x00\x00\x00\x00\x00\x00\x00_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2\x03\x00\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU=.\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D\x00\x00\x00\x00H\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% ', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) timer_create(0x0, &(0x7f0000000240)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)) timer_settime(0x0, 0x0, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() execveat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x400) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 19:05:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:17 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 727.261597][T14725] overlayfs: overlapping lowerdir path 19:05:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 727.445221][T14724] bridge0: port 2(bridge_slave_1) entered disabled state [ 727.846348][T14738] overlayfs: failed to resolve 'fil': -2 [ 727.922399][T14737] ERROR: Domain ' /sbin/init /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.2 proc:/self/fd/3' not defined. [ 728.129110][T14736] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #4: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 19:05:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 728.451616][T14736] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 4 [ 728.478575][T14736] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 728.498251][T14736] EXT4-fs (loop4): mount failed 19:05:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 729.039551][T14750] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:05:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 729.462059][T14764] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #4: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 729.792567][T14764] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 4 [ 729.828659][T14773] overlayfs: failed to resolve 'file': -2 19:05:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 730.037598][T14764] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 730.102364][T14764] EXT4-fs (loop4): mount failed [ 730.374946][T14778] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:05:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:21 executing program 2: r0 = timerfd_create(0x0, 0x0) readv(r0, &(0x7f0000000080), 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849878266, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141043, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r1, 0x0) pkey_mprotect(&(0x7f0000fec000/0x12000)=nil, 0x12000, 0x0, 0xffffffffffffffff) 19:05:21 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 731.214019][T14787] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 4 19:05:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) accept4(r0, 0x0, 0x0, 0x0) [ 731.319942][T14787] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 731.451384][T14787] EXT4-fs (loop4): mount failed [ 731.791987][T14802] overlayfs: failed to resolve 'file': -2 19:05:22 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) 19:05:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 732.502761][T14808] overlayfs: overlapping lowerdir path 19:05:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 732.830043][T14812] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 4 [ 732.993732][T14812] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 733.087214][T14812] EXT4-fs (loop4): mount failed 19:05:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) 19:05:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 733.931673][T14830] overlayfs: failed to resolve 'file': -2 [ 734.350201][T14835] overlayfs: overlapping lowerdir path 19:05:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4}]}, 0x2c}}, 0x0) 19:05:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:25 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) 19:05:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 735.486044][T14854] overlayfs: overlapping lowerdir path [ 735.549157][T14847] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 4 [ 735.681174][T14847] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=1, err=-116). Please run e2fsck to fix. [ 735.702370][T14847] EXT4-fs (loop4): mount failed 19:05:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) 19:05:26 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:26 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) creat(&(0x7f0000000140)='./file0\x00', 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 19:05:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 736.899582][T14870] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 736.992079][T14870] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 19:05:27 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) [ 737.126166][T14870] EXT4-fs (loop4): mount failed 19:05:27 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) unlink(&(0x7f0000000080)='./file0\x00') clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) creat(&(0x7f0000000140)='./file0\x00', 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 19:05:27 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:28 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) [ 738.246622][T14900] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 738.528721][T14900] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 738.549159][T14900] EXT4-fs (loop4): mount failed 19:05:29 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 738.933445][T14908] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:05:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:29 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) 19:05:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000300)) 19:05:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 739.555966][T14920] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 739.571905][T14920] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 739.608847][T14920] EXT4-fs (loop4): mount failed 19:05:30 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:30 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) 19:05:30 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000280)={{0x110, 0x0, 0x0, 0xfd7f, 0x0, 0x0, 0x0, 0x0, 0x8}, "", [[]]}, 0x120) [ 740.452157][T14940] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 740.969113][T14953] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 19:05:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) [ 741.131604][T14953] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 741.227817][T14961] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:05:31 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0x4000000000dc) [ 741.543205][T14953] EXT4-fs (loop4): mount failed 19:05:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x0, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:32 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000005c0)=0x5, 0x4) listen(r0, 0x0) 19:05:32 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) [ 742.691328][T14973] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 742.708010][T14973] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 742.733131][T14973] EXT4-fs (loop4): mount failed 19:05:33 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 743.480725][T14990] overlayfs: overlapping lowerdir path [ 743.575418][T14997] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 19:05:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) [ 743.844787][T14997] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 19:05:34 executing program 2: 19:05:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x0, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 743.988578][T14997] EXT4-fs (loop4): mount failed 19:05:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x0, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:34 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:34 executing program 2: 19:05:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) [ 744.816308][T15015] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 744.957037][T15015] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 19:05:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:35 executing program 2: [ 745.497907][T15023] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 745.558719][T15015] EXT4-fs (loop4): mount failed 19:05:36 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x0, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) 19:05:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x0, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:36 executing program 2: 19:05:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) [ 746.816006][T15043] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 19:05:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 746.949671][T15043] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 746.989060][T15043] EXT4-fs (loop4): mount failed 19:05:37 executing program 2: 19:05:37 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:37 executing program 2: [ 747.645236][T15062] overlayfs: unrecognized mount option "./file1" or missing value 19:05:38 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) [ 748.293576][T15068] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 748.324817][T15068] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 748.362629][T15068] EXT4-fs (loop4): mount failed [ 748.401790][T15063] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:05:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x0, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x0, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:38 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:40 executing program 2: [ 750.112776][T15085] overlayfs: overlapping lowerdir path [ 750.190051][T15083] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 750.364850][T15083] EXT4-fs (loop4): mount failed 19:05:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) 19:05:40 executing program 2: 19:05:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x0, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:41 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x0, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 751.175621][T15106] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 19:05:41 executing program 2: 19:05:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 751.367172][T15106] EXT4-fs (loop4): mount failed 19:05:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:41 executing program 2: 19:05:41 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 752.478323][T15126] overlayfs: overlapping lowerdir path [ 752.567854][T15130] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 752.587112][T15130] EXT4-fs (loop4): mount failed [ 752.679745][T15128] overlayfs: overlapping lowerdir path 19:05:42 executing program 2: 19:05:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:43 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x0, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x0, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 19:05:43 executing program 2: 19:05:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 753.657665][T15147] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 19:05:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) [ 753.889030][T15147] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 753.927683][T15147] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 754.077276][T15147] EXT4-fs (loop4): mount failed 19:05:44 executing program 2: 19:05:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) 19:05:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 754.543448][T15164] overlayfs: overlapping lowerdir path 19:05:45 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 755.023034][T15168] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:05:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x0, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) 19:05:45 executing program 2: 19:05:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 755.732839][T15180] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 755.842955][T15180] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 755.932459][T15180] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 756.086511][T15180] EXT4-fs (loop4): mount failed 19:05:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4", 0xc) [ 756.232349][T15188] overlayfs: overlapping lowerdir path 19:05:46 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:46 executing program 2: [ 756.647605][T15197] overlayfs: overlapping lowerdir path 19:05:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x28, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}]}}, 0x28) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 757.091638][T15206] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 19:05:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4", 0xc) 19:05:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 757.264695][T15206] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 757.350083][T15206] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 757.391102][T15206] EXT4-fs (loop4): mount failed 19:05:47 executing program 2: 19:05:48 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 757.901822][T15217] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 758.210238][T15230] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 758.232173][T15230] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 19:05:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4", 0xc) 19:05:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140), 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:48 executing program 2: [ 758.416732][T15230] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 19:05:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x28, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}]}}, 0x28) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 758.566289][T15230] EXT4-fs (loop4): mount failed 19:05:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:49 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233", 0x12) 19:05:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:49 executing program 2: [ 759.594123][T15249] overlayfs: overlapping lowerdir path 19:05:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233", 0x12) [ 759.874146][T15256] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 760.051540][T15260] overlayfs: overlapping lowerdir path 19:05:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233", 0x12) [ 760.349002][T15256] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 760.453109][T15256] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 19:05:50 executing program 2: 19:05:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 760.586573][T15256] EXT4-fs (loop4): mount failed 19:05:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x28, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}]}}, 0x28) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:51 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af3010004000000000000000000", 0x36, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f6", 0x15) 19:05:51 executing program 2: 19:05:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4", 0xc) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 761.547424][T15285] overlayfs: overlapping lowerdir path [ 761.716845][T15287] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 761.901680][T15297] overlayfs: overlapping lowerdir path [ 762.140111][T15287] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 19:05:52 executing program 2: [ 762.248607][T15287] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 19:05:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f6", 0x15) 19:05:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 762.446734][T15287] EXT4-fs (loop4): mount failed 19:05:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x0, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233", 0x12) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:53 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 763.191527][T15314] overlayfs: failed to resolve './file1': -2 [ 763.199748][T15312] overlayfs: overlapping lowerdir path 19:05:53 executing program 2: 19:05:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f6", 0x15) 19:05:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:54 executing program 2: 19:05:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac1", 0x17) [ 763.979105][T15328] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 19:05:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233", 0x12) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 764.158038][T15328] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 764.169934][T15328] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 764.244540][T15337] overlayfs: overlapping lowerdir path [ 764.272832][T15338] overlayfs: failed to resolve './file1': -2 [ 764.327389][T15328] EXT4-fs (loop4): mount failed 19:05:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x0, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:54 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:55 executing program 2: 19:05:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233", 0x12) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 765.221130][T15352] overlayfs: overlapping lowerdir path 19:05:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac1", 0x17) [ 765.503917][T15360] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 765.701265][T15364] overlayfs: overlapping lowerdir path [ 765.968930][T15360] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 19:05:56 executing program 2: 19:05:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 766.081815][T15360] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 19:05:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f6", 0x15) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 766.170018][T15360] EXT4-fs (loop4): mount failed 19:05:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x0, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac1", 0x17) 19:05:56 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200", 0x3a, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 766.886129][T15383] overlayfs: overlapping lowerdir path 19:05:57 executing program 2: [ 767.217590][T15386] overlayfs: overlapping lowerdir path 19:05:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f6", 0x15) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:57 executing program 3: [ 767.615743][T15396] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 19:05:58 executing program 2: 19:05:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x0, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 767.843761][T15396] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 767.934926][T15396] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 768.038018][T15396] EXT4-fs (loop4): mount failed 19:05:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f6", 0x15) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 768.293641][T15407] overlayfs: overlapping lowerdir path 19:05:58 executing program 3: 19:05:58 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:05:58 executing program 2: 19:05:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:05:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac1", 0x17) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:05:59 executing program 3: [ 769.289768][T15425] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 19:05:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x0, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 769.444802][T15425] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 769.538993][T15425] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 769.595179][T15425] EXT4-fs (loop4): mount failed [ 769.707852][T15434] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:06:00 executing program 2: 19:06:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac1", 0x17) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:06:00 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 770.424065][T15450] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 770.478679][T15450] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 19:06:00 executing program 3: [ 770.610266][T15450] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 19:06:00 executing program 2: [ 770.692279][T15450] EXT4-fs (loop4): mount failed 19:06:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x0, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac1", 0x17) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:06:01 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002000000", 0x3c, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:01 executing program 3: [ 771.370599][T15464] overlayfs: overlapping lowerdir path 19:06:01 executing program 2: [ 771.710563][T15475] overlayfs: overlapping lowerdir path [ 771.947382][T15478] EXT4-fs error (device loop4): ext4_ext_check_inode:459: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 19:06:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 772.028033][T15478] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 19:06:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 772.171143][T15478] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 772.256590][T15478] EXT4-fs (loop4): mount failed 19:06:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:02 executing program 2: 19:06:02 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:02 executing program 3: 19:06:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 773.016262][T15497] overlayfs: overlapping lowerdir path 19:06:03 executing program 2: 19:06:03 executing program 3: [ 773.314097][T15505] overlayfs: overlapping lowerdir path [ 773.352021][T15506] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 19:06:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 773.558981][T15506] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 773.579614][T15506] EXT4-fs (loop4): mount failed 19:06:04 executing program 3: 19:06:04 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:04 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:04 executing program 2: 19:06:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) [ 774.484108][T15525] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 774.543043][T15525] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 19:06:04 executing program 2: [ 774.602044][T15525] EXT4-fs (loop4): mount failed 19:06:05 executing program 3: [ 774.821112][T15532] overlayfs: overlapping lowerdir path 19:06:05 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 775.618941][T15533] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:06:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:06:06 executing program 2: 19:06:06 executing program 3: 19:06:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 776.112867][T15547] EXT4-fs error (device loop4): ext4_quota_enable:6125: comm syz-executor.4: Bad quota inode # 3 [ 776.147484][T15553] overlayfs: overlapping lowerdir path [ 776.307722][T15547] EXT4-fs warning (device loop4): ext4_enable_quotas:6165: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 776.394548][T15547] EXT4-fs (loop4): mount failed 19:06:07 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:07 executing program 3: 19:06:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 19:06:07 executing program 2: 19:06:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 777.664053][T15569] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 19:06:08 executing program 3: [ 777.843646][T15569] EXT4-fs (loop4): get root inode failed [ 777.849394][T15569] EXT4-fs (loop4): mount failed [ 777.989562][T15564] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:06:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, 0x0, 0x0) 19:06:08 executing program 2: 19:06:08 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 778.399500][T15582] overlayfs: overlapping lowerdir path 19:06:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x0, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, 0x0, 0x0) 19:06:09 executing program 3: 19:06:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:09 executing program 2: [ 779.098845][T15595] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 19:06:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, 0x0, 0x0) [ 779.257224][T15595] EXT4-fs (loop4): get root inode failed [ 779.263067][T15595] EXT4-fs (loop4): mount failed [ 779.478551][T15602] overlayfs: overlapping lowerdir path 19:06:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 19:06:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x0, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:10 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:10 executing program 3: 19:06:10 executing program 2: [ 780.143237][T15612] overlayfs: overlapping lowerdir path [ 780.399000][T15623] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 19:06:10 executing program 2: [ 780.520870][T15623] EXT4-fs (loop4): get root inode failed [ 780.527005][T15623] EXT4-fs (loop4): mount failed 19:06:10 executing program 3: 19:06:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 19:06:11 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 781.035967][T15629] overlayfs: overlapping lowerdir path 19:06:11 executing program 3: 19:06:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 19:06:11 executing program 2: 19:06:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x0, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 781.786327][T15642] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated [ 781.870000][T15651] overlayfs: overlapping lowerdir path [ 781.934266][T15642] EXT4-fs (loop4): get root inode failed [ 781.940006][T15642] EXT4-fs (loop4): mount failed 19:06:12 executing program 3: 19:06:12 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, 0x0, 0x0) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:12 executing program 2: 19:06:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 782.713644][T15661] overlayfs: overlapping lowerdir path [ 783.080691][T15669] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 19:06:13 executing program 3: 19:06:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x0, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 783.199095][T15669] EXT4-fs (loop4): get root inode failed [ 783.205558][T15669] EXT4-fs (loop4): mount failed 19:06:13 executing program 2: 19:06:13 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 784.844791][T15688] overlayfs: overlapping lowerdir path 19:06:15 executing program 3: 19:06:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b98ddc3c61ccc99a30a7d3b4731ab23a2233cfd3f66ac163", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 785.185721][T15693] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 19:06:15 executing program 2: [ 785.396835][T15693] EXT4-fs (loop4): get root inode failed [ 785.402711][T15693] EXT4-fs (loop4): mount failed 19:06:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x0, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x0, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:16 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:16 executing program 3: 19:06:16 executing program 5: 19:06:16 executing program 2: [ 786.596686][T15712] overlayfs: overlapping lowerdir path [ 786.684571][T15715] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated [ 786.879359][T15715] EXT4-fs (loop4): get root inode failed [ 786.885373][T15715] EXT4-fs (loop4): mount failed 19:06:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x0, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:17 executing program 5: 19:06:17 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:18 executing program 3: 19:06:18 executing program 2: 19:06:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x0, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 788.384945][T15741] overlayfs: overlapping lowerdir path 19:06:18 executing program 5: [ 788.440257][T15740] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 19:06:18 executing program 3: 19:06:18 executing program 2: [ 788.674802][T15740] EXT4-fs (loop4): get root inode failed [ 788.680676][T15740] EXT4-fs (loop4): mount failed 19:06:19 executing program 5: 19:06:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600), 0x0, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x0, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:19 executing program 5: [ 789.468365][T15757] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:06:19 executing program 3: 19:06:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x2e, 0x29, 0x2, {0x10000, [{{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x2e) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:20 executing program 2: [ 790.046763][T15765] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated [ 790.047059][T15766] overlayfs: overlapping lowerdir path [ 790.098858][T15765] EXT4-fs (loop4): get root inode failed [ 790.105215][T15765] EXT4-fs (loop4): mount failed 19:06:20 executing program 5: 19:06:20 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x0, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:20 executing program 3: [ 790.747689][T15778] overlayfs: overlapping lowerdir path 19:06:21 executing program 2: 19:06:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x2e, 0x29, 0x2, {0x10000, [{{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x2e) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:21 executing program 5: [ 791.381596][T15786] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 19:06:21 executing program 2: [ 791.531942][T15786] EXT4-fs (loop4): get root inode failed [ 791.538004][T15786] EXT4-fs (loop4): mount failed 19:06:21 executing program 3: [ 791.844653][T15792] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:06:22 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x0, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:22 executing program 2: [ 792.505452][T15800] overlayfs: overlapping lowerdir path 19:06:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x1f}, 0x21) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c9120cab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fb38", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x4, 0x0, 0x0, 0xffffffe0}, 0xd000000}], 0x1, 0x4000000) 19:06:23 executing program 3: clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:06:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x2e, 0x29, 0x2, {0x10000, [{{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x2e) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 793.012284][T15808] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 19:06:23 executing program 3: socket$inet6(0xa, 0x80003, 0x6b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x5000000}}], 0xc6, 0x0) [ 793.196409][T15808] EXT4-fs (loop4): get root inode failed [ 793.202914][T15808] EXT4-fs (loop4): mount failed 19:06:23 executing program 2: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{0x0}], 0x1, 0x0, 0x0, 0x2000}}], 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0, 0x0) 19:06:23 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x0, 0x0) 19:06:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x0, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:23 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f465", 0xf, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 794.248795][T15834] overlayfs: overlapping lowerdir path 19:06:24 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8a, &(0x7f0000000140)="5cf249b9740c8684445afd26b76af2f3c921bf3c0f339e57f4f21016a5b60a00088024c30e478947d190ad000000000000000000000064bfa6186165224897ba4ecb40aa071d905814c90761600032a3b88a1f000000970e85a63c9a4b0d8b9aad010000000000000002a7bef7fdffff9f8b01647a0200169c864e1d5f8179cba2e43112cfb22f021d3c"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 794.938725][T15852] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 19:06:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x0, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 795.171423][T15852] EXT4-fs (loop4): get root inode failed [ 795.177395][T15852] EXT4-fs (loop4): mount failed 19:06:25 executing program 2: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000033c0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{0x0}], 0x1, 0x0, 0x0, 0x2000}}], 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) preadv(r1, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0, 0x0) [ 795.276861][T15855] overlayfs: overlapping lowerdir path 19:06:25 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x28, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}]}}, 0x28) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0xb, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x8ec0, 0x0) write$P9_RREAD(r2, 0x0, 0xb) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r3 = gettid() tkill(r3, 0x16) [ 796.470561][T15874] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 796.549948][T15878] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 19:06:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) [ 796.741696][T15878] EXT4-fs (loop4): get root inode failed [ 796.748885][T15878] EXT4-fs (loop4): mount failed [ 796.905451][T15886] overlayfs: overlapping lowerdir path 19:06:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x0, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0xb1}, {0x6}]}, 0x10) 19:06:27 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x28, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}]}}, 0x28) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:27 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020fe1f00200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000400000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000400)="0100000000000000001e0017f5f44fc605f9fb09140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000300)=ANY=[]) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) [ 798.127855][T15907] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated [ 798.418410][T15907] EXT4-fs (loop4): get root inode failed [ 798.424329][T15907] EXT4-fs (loop4): mount failed 19:06:29 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)="57595a4b414c4c45522020085ac19f69b8f2b2b1ea1b8a0ac9135eed1df1d1001cc2de850f1fffb2aed768634ef7e75effac2ac4c15e29fb3c18fafff8d198e312475fc22da2be3e05004fad25822a17b17f463e104179c19c2ad2fbddc0777df2ec4f62826086704ddf95b43fcba468b720660208bb69031e12558284228bf73e037e2880b514a6b8a57f41fb86c26defeaf7e7230987f8ec610694e89ad37c804b9e46226ca6b9956a74a7d9ecf9be8f7ffba2f21b2dd0702c79aba3fe3cdcd747912d1368b60fdc07018080439951cb3790e1138c4ca2f0547030d616de", 0xdf, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0xe5ffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 19:06:29 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x66, &(0x7f0000000140)="5cf249b9740c8684445afd26b76af2f3c921bf3c0f339e57f4f21016a5b60a00088024c30e478947d190ad000000000000000000000064bfa6186165224897ba4ecb40aa071d905814c90761600032a3b88a1f000000970e85a63c9a4b0d8b9aad0100000000"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 19:06:29 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f0000", 0x16, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x0, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 798.948769][T15919] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:06:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000500000006040000000000000000", 0x39}], 0x1) 19:06:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x28, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}]}}, 0x28) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 799.628465][T15932] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated [ 799.642153][T15932] EXT4-fs (loop4): get root inode failed [ 799.648108][T15932] EXT4-fs (loop4): mount failed [ 799.798952][T15933] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:06:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x0, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 800.053492][T15948] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 19:06:30 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x86, &(0x7f0000000140)="5cf249b9740c8684445afd26b76af2f3c921bf3c0f339e57f4f21016a5b60a00088024c30e478947d190ad000000000000000000000064bfa6186165224897ba4ecb40aa071d905814c90761600032a3b88a1f000000970e85a63c9a4b0d8b9aad010000000000000002a7bef7fdffff9f8b01647a0200169c864e1d5f8179cba2e43112cfb2"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 800.606302][T15956] overlayfs: overlapping lowerdir path [ 800.957133][T15959] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated [ 800.978004][T15959] EXT4-fs (loop4): get root inode failed [ 800.984062][T15959] EXT4-fs (loop4): mount failed 19:06:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x0, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 801.264179][T15949] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 801.284190][T15961] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 19:06:31 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 801.759704][T15980] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated [ 801.796010][T15980] EXT4-fs (loop4): get root inode failed [ 801.797365][T15977] overlayfs: overlapping lowerdir path [ 801.801893][T15980] EXT4-fs (loop4): mount failed 19:06:32 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0xb, [@fwd, @enum={0x0, 0x8, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}]}, @var]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x8b}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:06:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x0, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 803.007557][T15995] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated 19:06:33 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040000000000000000", 0x39}], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000500000006040000000000000000", 0x39}], 0x1) 19:06:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x0, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 803.283886][T15995] EXT4-fs (loop4): get root inode failed [ 803.290217][T15995] EXT4-fs (loop4): mount failed 19:06:33 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 803.684545][T16000] overlayfs: overlapping lowerdir path 19:06:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) write$cgroup_subtree(r0, 0x0, 0xda00) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) [ 804.011829][T16010] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 804.067679][T16010] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 19:06:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x0, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 804.172548][T16013] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 804.179482][T16013] EXT4-fs (loop4): mount failed 19:06:34 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xda, &(0x7f0000000140)="5cf249b9740c8684445afd26b76af2f3c921bf3c0f339e57f4f21016a5b60a00088024c30e478947d190ad000000000000000000000064bfa6186165224897ba4ecb40aa071d905814c90761600032a3b88a1f000000970e85a63c9a4b0d8b9aad010000000000000002a7bef7fdffff9f8b01647a0200169c864e1d5f8179cba2e43112cfb22f021d3c34e36cc9509795b0e053c9d31e145c97aa793dd8ceb8281f3b812e14d71b59b83e4bc3b529f3ca0900000096e2c2a4fdca75813f78964c6fe77e39d125650da9ab14624d751e10f063962be791ca6756"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 804.551606][T16022] overlayfs: overlapping lowerdir path 19:06:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000006f40)=[{{&(0x7f0000001500)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0xbb8) 19:06:34 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0, 0x89}, 0x20) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) openat$full(0xffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') open(&(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 804.992685][T16031] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 804.999611][T16031] EXT4-fs (loop4): mount failed 19:06:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x0, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 805.441482][T16043] overlayfs: overlapping lowerdir path 19:06:36 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x12f) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000200)=@get={0x1, &(0x7f0000000340)=""/185, 0xfffffffffffff360}) rename(&(0x7f0000000400)='./file0\x00', 0x0) syz_emit_ethernet(0x4a, 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000140)) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x55}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) 19:06:36 executing program 2: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000200)={0x9, 0x20000000001, '['}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x42, 0x0) ioctl$FITRIM(r2, 0x40047211, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x35}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@cgroup, r4, 0x11}, 0x10) r5 = fcntl$dupfd(r3, 0x0, r4) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r6, 0x200, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4048000) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r6, 0x30, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x1c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x90, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21008}, [@IFLA_LINKINFO={0x60, 0x12, 0x0, 0x1, @ipip={{0x9, 0x1, 'ipip\x00'}, {0x50, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x34}}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x89}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x89}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x36}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x40}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x6}, @IFLA_IPTUN_TTL={0x5, 0x4, 0x9}, @IFLA_IPTUN_TTL={0x5, 0x4, 0x81}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x90}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=@newqdisc={0x330, 0x24, 0x4, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x8, 0xffff}, {0xffff, 0xb}, {0x3, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x6}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x1fc00}, @qdisc_kind_options=@q_bfifo={{0xa, 0x1, 'bfifo\x00'}, {0x8, 0x2, 0x4}}, @TCA_STAB={0x16c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x20, 0x4, 0x5, 0x2, 0x7, 0x800, 0x7}}, {0x12, 0x2, [0xff, 0x1, 0x200, 0x8001, 0x2, 0x5, 0x3]}}, {{0x1c, 0x1, {0x1, 0x5, 0x3, 0x5, 0x2, 0x7, 0x10000, 0xa}}, {0x18, 0x2, [0xfff, 0xfd6, 0xfe01, 0x84, 0x6, 0x4be5, 0x319f, 0x8, 0x3ff, 0x7]}}, {{0x1c, 0x1, {0x20, 0x40, 0x2, 0xc853, 0x2, 0xcd, 0x6, 0x5}}, {0xe, 0x2, [0x9, 0x3f, 0x3, 0x8000, 0x2]}}, {{0x1c, 0x1, {0x81, 0x80, 0x2, 0x3ff, 0x2, 0x80000001, 0x8, 0x6}}, {0x10, 0x2, [0xff, 0x80, 0x8001, 0x0, 0x1ff, 0x100]}}, {{0x1c, 0x1, {0xc1, 0x47, 0x5, 0x9, 0x0, 0x10000, 0x9, 0x4}}, {0xc, 0x2, [0x3, 0x7, 0x6, 0x6]}}, {{0x1c, 0x1, {0x3f, 0x5, 0x6, 0x42f, 0x1, 0x3f, 0x6, 0x6}}, {0x10, 0x2, [0x8, 0x3ff, 0x2, 0x7f, 0x800, 0x1]}}, {{0x1c, 0x1, {0x3f, 0x9, 0x6, 0x1, 0x2, 0x40, 0x129, 0x8}}, {0x14, 0x2, [0x4923, 0x2, 0x5, 0x3c86, 0x5, 0xff, 0x0, 0xb99e]}}, {{0x1c, 0x1, {0x4, 0x7, 0x4, 0x4, 0x2, 0x10001, 0x9, 0x3}}, {0xa, 0x2, [0x8, 0x86, 0xffff]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xd42}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x3f}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}, @TCA_RATE={0x6, 0x5, {0xee, 0x5}}, @TCA_STAB={0x15c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x3, 0x8001, 0x7f, 0x0, 0x0, 0x800, 0x7}}, {0x12, 0x2, [0xffff, 0x4, 0x3, 0x8, 0x7f, 0x2, 0x400]}}, {{0x1c, 0x1, {0x20, 0x5, 0x8, 0x6, 0x1, 0xa2, 0xee5, 0x3}}, {0xa, 0x2, [0x20, 0x9, 0x6]}}, {{0x1c, 0x1, {0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}}, {0xa, 0x2, [0xfffd, 0x4, 0x5]}}, {{0x1c, 0x1, {0x26, 0x81, 0x0, 0x9, 0x1, 0x800, 0xff, 0x2}}, {0x8, 0x2, [0x59d, 0x101]}}, {{0x1c, 0x1, {0xf7, 0x9, 0x2, 0x1, 0x2, 0x48, 0x71, 0x8}}, {0x14, 0x2, [0x6ceb, 0x7f, 0x3ff, 0x3, 0x1f, 0x2da8, 0x4, 0x0]}}, {{0x1c, 0x1, {0x9, 0x81, 0x1000, 0x0, 0x0, 0x3, 0x3f, 0x8}}, {0x14, 0x2, [0xfff9, 0xfff, 0x20, 0x6, 0x400, 0x8000, 0x0, 0x2]}}, {{0x1c, 0x1, {0x6, 0x6, 0x3, 0x2, 0x2, 0x4, 0x6, 0x4}}, {0xc, 0x2, [0x3ff, 0x8, 0x3, 0x1]}}, {{0x1c, 0x1, {0x9, 0x0, 0x1, 0x80000001, 0x0, 0x1, 0x3, 0x5}}, {0xe, 0x2, [0x0, 0x4, 0x5, 0x401, 0x8]}}]}]}, 0x330}, 0x1, 0x0, 0x0, 0x8000}, 0x4) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x24, r6, 0x4, 0x70bd2c, 0x25dfdbfb, {{}, {}, {0x8, 0x2, 0x8}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x4) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r6, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4040) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') getdents64(r7, &(0x7f0000000100)=""/236, 0x20000103) 19:06:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 806.286512][T16058] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 806.293269][T16058] EXT4-fs (loop4): mount failed [ 806.455770][T16063] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 806.533782][T16063] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 806.653465][T16060] overlayfs: overlapping lowerdir path [ 806.739038][T16072] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 806.876036][ T27] audit: type=1804 audit(1601406397.125:58): pid=16068 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/" dev="sda1" ino=91 res=1 errno=0 [ 807.509858][T16068] syz-executor.2 (16068) used greatest stack depth: 4248 bytes left 19:06:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x12f) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000200)=@get={0x1, &(0x7f0000000340)=""/185, 0xfffffffffffff360}) rename(&(0x7f0000000400)='./file0\x00', 0x0) syz_emit_ethernet(0x4a, 0x0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000140)) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x55}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) 19:06:38 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 19:06:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f0000000280)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) creat(&(0x7f0000000180)='./file0\x00', 0x0) 19:06:38 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x0, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 808.662681][T16090] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 19:06:39 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x201) io_setup(0x20, &(0x7f00000001c0)=0x0) io_pgetevents(r1, 0x3, 0x3, &(0x7f0000000440)=[{}, {}, {}], 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSKBENT(r2, 0x4b47, &(0x7f0000000280)={0x9, 0x80, 0x35}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000000)=""/3, &(0x7f0000000040)=0x3) [ 809.006951][ T27] audit: type=1800 audit(1601406399.245:59): pid=16101 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=15795 res=0 errno=0 [ 809.102794][T16097] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 809.136927][ T27] audit: type=1804 audit(1601406399.375:60): pid=16102 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir505311162/syzkaller.Uo6pU0/237/file0/file0" dev="sda1" ino=15795 res=1 errno=0 19:06:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 809.315963][T16103] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated [ 809.486633][T16103] EXT4-fs (loop4): get root inode failed [ 809.492368][T16103] EXT4-fs (loop4): mount failed 19:06:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 19:06:40 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 809.912012][T16116] overlayfs: overlapping lowerdir path [ 810.205014][T16118] overlayfs: overlapping lowerdir path 19:06:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x0, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 811.064435][T16133] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 811.114848][T16136] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated [ 811.189806][T16136] EXT4-fs (loop4): get root inode failed [ 811.196618][T16136] EXT4-fs (loop4): mount failed 19:06:41 executing program 5: r0 = memfd_create(&(0x7f0000000180)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d\x17\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94\x00\x96h\xef~Ms\"\x00\x00hu\x9c\xccC\x9c\xab\xb4!\xe6\xd9\x13\xca9\x03L\xa6\xa3\xe1\xb4\x16\xca\x81=\x8c\xcb\xbf\x90~]\x8ff\xaa\xe0\xf2\x91w\xda\x91\x12g\x8c\xf78\x8dj\x97]\xd9\'\xdf\x9fy\xf7_\x14\x80\xc3ggM\x7f}\x86\xb0\xe9\x98V\xc2\x93\x02j\x1e\x82\x02[I\xd8\x16c\xac\x9f\x116|\x91\xf9\t\x88\xfe\xe2\xdf\xf9\x04O=x\xc5\xe3\xfd\xb4\x97,\xf1\x97\x88\xf7\xc8w<\x9a\x15\x11\x1a\xe7OjR\xdd\x92p\xcc\xdd\xee\xd6\x0e\xe5\xa0Jot\x84\"\x9e\xa3\xf2\xb3\v&C(fi\xb1w\x84G\x14O\xc3_\xaa\xd5l/\x86qdA|T\xd82k\xe4\x84\x9a\'\xadg\xcc\x83\x18\xa4\xb85\x8f\xbdH8v\x8a\\\xf4\xdbr@\\\xaf\x9b+\xe0\a%\x9b\xde&\xfd\xd8\xdd\xbb\xd6N\x8f,\v\x87\x9f+w\xeb\xa5\xeb\xa7\xac\xaf\xc7\x16#\x947\'\xc2`\x86@v\xf6\x17\xba\x82\x8f\xb2\xeb\x03\x94\x12\x92', 0x0) write$eventfd(r0, &(0x7f0000000100)=0x20000100000094, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x264, &(0x7f0000000000)=[{}]}, 0x10) [ 811.275994][T16137] Quota error (device loop2): dq_insert_tree: Quota tree root isn't allocated! [ 811.290897][T16137] Quota error (device loop2): qtree_write_dquot: Error -5 occurred while creating quota 19:06:41 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:41 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001580)) pipe(&(0x7f0000000080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 19:06:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4000) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000080)={0x7ff, 0x8, [0x0, 0x0, 0x8, 0x0, 0x80]}) lchown(&(0x7f0000000040)='./file0\x00', r2, 0x0) [ 811.930291][T12192] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 19:06:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000080)={0x82, 0x0, 0x0, 0xff}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xc5e]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 812.198059][T16151] overlayfs: overlapping lowerdir path [ 812.286068][T12192] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 812.768917][T16160] EXT4-fs error (device loop4): ext4_fill_super:4709: inode #2: comm syz-executor.4: iget: root inode unallocated [ 813.300333][T16160] EXT4-fs (loop4): get root inode failed [ 813.306733][T16160] EXT4-fs (loop4): mount failed [ 813.327403][T16166] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 813.481539][T16159] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:06:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x0, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:06:44 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000002c0)=0x10001) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000240)={@ipv4={[], [], @loopback}, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7], 0x1, 0x0}, 0x100000, 0x0, 0x0, 0x800, 0x1000000, 0x20c200a2, r7}) fstat(r6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="700000001900000126bd7000ffdbdf25802014b983540f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="080004", @ANYRES32=r7, @ANYBLOB='\b\x00\v', @ANYRES32=r8, @ANYBLOB="08000b00290300040038bec50a4c6c2e3bd47642c6e8851eb96263f3e4c76195c47910ec10b8d2ab1b66c3129b729576c16eb0425fb5c0", @ANYRES64, @ANYBLOB="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"], 0x70}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@private1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000180)=0xe4) setresuid(r8, r9, 0xee01) socket$nl_audit(0x10, 0x3, 0x9) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@ipv4={[], [], @loopback}, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x800, 0x0, 0x20c200a2, r10}) [ 813.872018][T12192] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 19:06:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 19:06:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x0, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 814.591166][T16189] overlayfs: overlapping lowerdir path [ 814.611185][T16186] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 814.621526][T16186] EXT4-fs (loop4): group descriptors corrupted! [ 814.774712][T12192] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 19:06:45 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000000000)="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", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x100}}}, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./file0/file0\x00', 0x0, 0x0) read$char_raw(r2, &(0x7f0000006c00)={""/38509}, 0x5f442c) [ 815.542960][T16204] overlayfs: overlapping lowerdir path [ 815.828868][T12192] tipc: TX() has been purged, node left! 19:06:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 815.980271][T16218] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 815.990524][T16218] EXT4-fs (loop4): group descriptors corrupted! 19:06:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0x8, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'veth1_to_batadv\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a01093060024003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55fe800000000080fe5ba514d40808efa000801610002fd08d49a47eff71bc4131fe4c1f99bf00a900090008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4021, 0x0, 0x23f) [ 817.372004][T16232] overlayfs: overlapping lowerdir path [ 820.817315][T12192] device hsr_slave_0 left promiscuous mode [ 820.875542][T12192] device hsr_slave_1 left promiscuous mode [ 820.900590][T12192] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 820.912411][T12192] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 821.006310][T12192] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 821.018105][T12192] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 821.118022][T12192] device bridge_slave_1 left promiscuous mode [ 821.125492][T12192] bridge0: port 2(bridge_slave_1) entered disabled state [ 821.233051][T12192] device bridge_slave_0 left promiscuous mode [ 821.240198][T12192] bridge0: port 1(bridge_slave_0) entered disabled state 19:06:51 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:06:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000002c0)=0x10001) getpeername$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={@ipv4={[], [], @loopback}, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x8, 0x0, 0x0, 0x8], 0x1, 0x0}, 0x100000, 0x0, 0x0, 0x800, 0x1000000, 0x20c200a2, r6}) fstat(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="700000001900000126bd7000ffdbdf25802014b983540f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB, @ANYRES32=r2, @ANYBLOB="080004", @ANYRES32=r6, @ANYBLOB='\b\x00\v', @ANYRES32=r7, @ANYBLOB="08000b00290300040038bec50a4c6c2e3bd47642c6e8851eb96263f3e4c76195c47910ec10b8d2ab1b66c3129b729576c16eb0425fb5c0", @ANYRES64, @ANYBLOB="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"], 0x70}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@private1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000180)=0xe4) setresuid(r7, r8, 0xee01) socket$nl_audit(0x10, 0x3, 0x9) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@ipv4={[], [], @loopback}, @ipv4={[0x0, 0x0, 0x8], [], @loopback}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x800, 0x0, 0x20c200a2, r9}) [ 821.395665][T12192] device veth1_macvtap left promiscuous mode [ 821.403278][T12192] device veth0_macvtap left promiscuous mode [ 821.410469][T12192] device veth1_vlan left promiscuous mode [ 821.416819][T12192] device veth0_vlan left promiscuous mode [ 821.929467][T16256] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 821.944158][T16256] EXT4-fs (loop4): group descriptors corrupted! [ 827.964725][ T26] Bluetooth: hci5: command 0x0409 tx timeout [ 830.053922][T16123] Bluetooth: hci5: command 0x041b tx timeout [ 832.124387][ T8426] Bluetooth: hci5: command 0x040f tx timeout [ 834.204519][T16123] Bluetooth: hci5: command 0x0419 tx timeout [ 838.960785][T12192] team0 (unregistering): Port device team_slave_1 removed [ 838.999706][T12192] team0 (unregistering): Port device team_slave_0 removed [ 839.086621][T12192] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 839.155779][T12192] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 839.607185][T12192] bond0 (unregistering): Released all slaves [ 839.820402][T16266] IPVS: ftp: loaded support on port[0] = 21 [ 841.974214][T16266] chnl_net:caif_netlink_parms(): no params data found [ 842.578603][T16266] bridge0: port 1(bridge_slave_0) entered blocking state [ 842.589856][T16266] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.603572][T16266] device bridge_slave_0 entered promiscuous mode [ 842.680337][T16266] bridge0: port 2(bridge_slave_1) entered blocking state [ 842.690447][T16266] bridge0: port 2(bridge_slave_1) entered disabled state [ 842.704337][T16266] device bridge_slave_1 entered promiscuous mode [ 843.000558][T16266] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 843.127388][T16266] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 843.397331][T16266] team0: Port device team_slave_0 added [ 843.491285][T16266] team0: Port device team_slave_1 added [ 843.722905][T16266] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 843.733079][T16266] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 843.766290][T16266] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 843.894379][T16266] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 843.902499][T16266] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 843.935205][T16266] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 844.267178][T16266] device hsr_slave_0 entered promiscuous mode [ 844.317988][T16266] device hsr_slave_1 entered promiscuous mode [ 844.366932][T16266] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 844.380932][T16266] Cannot create hsr debugfs directory [ 845.766153][T16266] 8021q: adding VLAN 0 to HW filter on device bond0 [ 845.882737][T16123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 845.898578][T16123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 845.940724][T16266] 8021q: adding VLAN 0 to HW filter on device team0 [ 846.055884][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 846.067841][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 846.078277][ T9578] bridge0: port 1(bridge_slave_0) entered blocking state [ 846.086094][ T9578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 846.187631][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 846.198987][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 846.216597][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 846.228782][ T9578] bridge0: port 2(bridge_slave_1) entered blocking state [ 846.236803][ T9578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 846.247778][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 846.260458][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 846.356917][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 846.371037][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 846.385102][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 846.399673][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 846.520634][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 846.532264][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 846.544642][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 846.555977][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 846.569715][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 846.594425][T16266] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 846.839641][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 846.848042][ T9109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 846.909745][T16266] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 847.530303][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 847.545317][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 847.691013][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 847.701726][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 847.736208][T16266] device veth0_vlan entered promiscuous mode [ 847.752348][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 847.762881][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 847.812139][T16266] device veth1_vlan entered promiscuous mode [ 848.019252][T16123] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 848.029968][T16123] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 848.040259][T16123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 848.050791][T16123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 848.092507][T16266] device veth0_macvtap entered promiscuous mode [ 848.118989][T16266] device veth1_macvtap entered promiscuous mode [ 848.238513][T16266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 848.249328][T16266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 848.264493][T16266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 848.275061][T16266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 848.285152][T16266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 848.295933][T16266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 848.306978][T16266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 848.317897][T16266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 848.327905][T16266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 848.338702][T16266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 848.354303][T16266] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 848.369945][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 848.380513][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 848.390848][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 848.401633][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 848.579214][T16266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 848.590149][T16266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 848.600638][T16266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 848.613072][T16266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 848.623290][T16266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 848.634040][T16266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 848.644052][T16266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 848.654926][T16266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 848.665430][T16266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 848.677356][T16266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 848.692791][T16266] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 848.705472][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 848.716876][ T9578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 849.260139][T12243] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 849.270750][T12243] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 849.291025][T16123] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 849.437632][ T810] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 849.447309][ T810] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 849.457349][T16123] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 19:07:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002e40)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b5eed4af01db22b7c134010000007a15", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read$alg(r1, &(0x7f0000000500)=""/215, 0xd7) sendmmsg$alg(r1, &(0x7f0000003900)=[{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000002c0)="5af1ba30d68fc73a7a665a3aacd1f92f28f32028e935cb7129611316b891906e2263a4ac71174eb405a7dd1716dc0347", 0x30}], 0x1}], 0x1, 0x0) sendmsg$alg(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000840)="e6", 0x1}], 0x1, &(0x7f0000000b40)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) 19:07:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xc63b9e35) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ppoll(0x0, 0x6000000000000000, 0x0, 0x0, 0xa000000) 19:07:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x0, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:21 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx2\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="8eb0c51c14b809a9b53d8040fa5b233fc5daa36cacde37d695f8", 0x1a}, {&(0x7f0000000100)="7bd2b74d9bdb70b65affa863e2f89c3859e40c1c8beaf327a88d2c8417435db1dec2", 0x22}, {&(0x7f0000000300)='=?_m', 0x4}], 0x3}, 0x0) [ 851.231602][T16568] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 851.243835][T16568] EXT4-fs (loop4): group descriptors corrupted! [ 851.349943][T16567] overlayfs: overlapping lowerdir path 19:07:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r2, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0xfffffffffffffe7e) shutdown(r2, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 852.078463][T16559] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:07:22 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth0_macvtap\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 19:07:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x0, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 853.009891][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 853.027685][T16604] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 853.041059][T16604] EXT4-fs (loop4): group descriptors corrupted! 19:07:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 853.630409][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 19:07:24 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 19:07:24 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 854.141318][T16624] overlayfs: overlapping lowerdir path [ 854.431082][T16633] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 854.475015][T16631] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 854.559431][T16641] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 854.569915][T16641] EXT4-fs (loop4): group descriptors corrupted! [ 854.627301][T16639] Quota error (device loop5): dq_insert_tree: Quota tree root isn't allocated! [ 854.636933][T16639] Quota error (device loop5): qtree_write_dquot: Error -5 occurred while creating quota 19:07:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth0_macvtap\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 19:07:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x0, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x0, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:25 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth0_macvtap\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 19:07:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x2}, 0x10) [ 856.162406][T16655] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 856.175503][T16662] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 856.185964][T16662] EXT4-fs (loop4): group descriptors corrupted! 19:07:26 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000140), &(0x7f0000000180)=0x8) 19:07:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x0, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:27 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:27 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x23, &(0x7f0000000100)=ANY=[@ANYBLOB="001c16d3edcbaa4711"], 0x104) 19:07:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket(0x2, 0x10000001, 0x84) dup2(r0, r1) 19:07:27 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f00000000c0), &(0x7f0000000100)=0x8) [ 857.873954][T16690] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 857.885924][T16690] EXT4-fs (loop4): group descriptors corrupted! 19:07:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x0, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 858.107135][T16699] overlayfs: overlapping lowerdir path 19:07:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x0, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x8) 19:07:28 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f00000005c0)={r3}, &(0x7f0000000600)=0x8) 19:07:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000080)={0x0, @in, 0x6, 0x0, 0x1e4fe55aa7f23706}, 0xa0) [ 859.161127][T16721] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 859.171976][T16721] EXT4-fs (loop4): group descriptors corrupted! 19:07:29 executing program 3: r0 = socket(0x2, 0x10000001, 0x84) sendmsg(r0, &(0x7f0000000040)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000004c0), 0x10) 19:07:29 executing program 2: r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000040), &(0x7f0000000200)=0x4) 19:07:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x0, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:30 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 860.119555][T16736] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:07:30 executing program 5: r0 = socket(0x2, 0x10000001, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180), &(0x7f0000000240)=0xa0) 19:07:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(0xffffffffffffffff, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:30 executing program 3: r0 = socket(0x2, 0x10000001, 0x84) sendmsg(r0, &(0x7f0000000040)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000000), &(0x7f0000000080)=0x8) [ 860.696977][T16749] overlayfs: overlapping lowerdir path [ 860.723428][T16753] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 860.732752][T16753] EXT4-fs (loop4): group descriptors corrupted! 19:07:31 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)={0x3c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_NAT_SRC={0x4}]}, 0x3c}}, 0x0) 19:07:31 executing program 2: socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$unix(r1, &(0x7f0000004e00)=[{0x0, 0x36b, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x18, 0x1, 0x1, [r0, r0]}}], 0x18}], 0x4924924924926de, 0x0) 19:07:31 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000100)=@in={0x2, 0x4e20}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x22, 0x0) creat(0x0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:07:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x0, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:31 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 19:07:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x80001, 0x84) sendmmsg$inet_sctp(r2, &(0x7f0000005000)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000003c0)="d9", 0x1}], 0x1, &(0x7f0000000140)=[@prinfo={0x18}], 0x18}], 0x1, 0x0) [ 861.777101][T16776] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:07:32 executing program 2: sched_setscheduler(0x0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 861.909331][T16783] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 861.918862][T16783] EXT4-fs (loop4): group descriptors corrupted! 19:07:32 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:32 executing program 3: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000001c0)={{0x1}}) [ 862.225725][T16786] overlayfs: overlapping lowerdir path 19:07:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(0xffffffffffffffff, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 862.657768][T16806] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 862.668287][T16806] EXT4-fs (loop4): group descriptors corrupted! 19:07:33 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 19:07:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x0, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:33 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {0x0}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011100)="ed4100000004000029c4645f29c4645f29c4645f00000000000002000200000000000000030000", 0x27, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000012c00)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x200) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) 19:07:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)='./file0\x00', r2, 0x0) 19:07:33 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 863.465098][T16815] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 863.528617][T16829] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 863.538210][T16829] EXT4-fs (loop4): group descriptors corrupted! [ 863.736032][T16823] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 19:07:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(0xffffffffffffffff, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 863.920878][T16836] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 19:07:34 executing program 5: socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cdg\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 864.162059][T16839] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:07:34 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:34 executing program 2: write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x3ba}, 0x7) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x222000, 0x1000}, 0x18) 19:07:34 executing program 3: 19:07:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x0, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 864.727771][T16851] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 864.742371][T16851] EXT4-fs (loop4): group descriptors corrupted! 19:07:35 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 865.199527][T16861] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:07:35 executing program 3: [ 865.730495][T16867] overlayfs: overlapping lowerdir path 19:07:36 executing program 2: 19:07:36 executing program 5: 19:07:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 866.011937][T16876] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 866.021393][T16876] EXT4-fs (loop4): group descriptors corrupted! 19:07:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x2e, 0x29, 0x2, {0x10000, [{{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x2e) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:36 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000, 0x0, 0x0, 0x1000000}]) 19:07:36 executing program 2: r0 = socket(0x200040000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2717, 0x0, &(0x7f0000000040)) 19:07:36 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:36 executing program 5: [ 866.931781][T16892] overlayfs: overlapping lowerdir path [ 867.144316][T16896] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 867.154186][T16896] EXT4-fs (loop4): group descriptors corrupted! 19:07:37 executing program 2: 19:07:37 executing program 5: 19:07:37 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x2e, 0x29, 0x2, {0x10000, [{{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x2e) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:38 executing program 2: [ 868.230469][T16913] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 868.240076][T16913] EXT4-fs (loop4): group descriptors corrupted! 19:07:38 executing program 5: 19:07:38 executing program 3: 19:07:38 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:39 executing program 3: 19:07:39 executing program 2: 19:07:39 executing program 5: [ 869.078570][T16927] overlayfs: overlapping lowerdir path [ 869.195568][T16926] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 869.800174][T16939] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 869.810958][T16939] EXT4-fs (loop4): group descriptors corrupted! 19:07:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x2e, 0x29, 0x2, {0x10000, [{{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x2e) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:40 executing program 5: 19:07:40 executing program 2: 19:07:40 executing program 3: 19:07:40 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:40 executing program 5: 19:07:40 executing program 2: 19:07:40 executing program 3: [ 870.923201][T16952] overlayfs: overlapping lowerdir path [ 870.970203][T16953] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 870.979820][T16953] EXT4-fs (loop4): group descriptors corrupted! 19:07:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:41 executing program 5: 19:07:41 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x0, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:42 executing program 2: 19:07:42 executing program 3: 19:07:42 executing program 5: [ 871.967895][T16973] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 871.977453][T16973] EXT4-fs (loop4): group descriptors corrupted! 19:07:42 executing program 3: 19:07:42 executing program 2: [ 872.629496][T16987] overlayfs: overlapping lowerdir path 19:07:43 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:43 executing program 2: 19:07:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:43 executing program 5: 19:07:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x0, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 873.436563][T16995] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 873.447367][T16995] EXT4-fs (loop4): group descriptors corrupted! 19:07:43 executing program 2: 19:07:43 executing program 3: 19:07:44 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 874.308886][T17001] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:07:44 executing program 2: 19:07:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x0, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:44 executing program 5: 19:07:44 executing program 3: [ 874.826602][T17014] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 874.836244][T17014] EXT4-fs (loop4): group descriptors corrupted! 19:07:45 executing program 2: [ 875.472365][T17025] overlayfs: overlapping lowerdir path 19:07:45 executing program 3: 19:07:45 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:45 executing program 5: 19:07:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x0, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:46 executing program 2: [ 876.061817][T17038] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 876.071551][T17038] EXT4-fs (loop4): group descriptors corrupted! 19:07:46 executing program 5: 19:07:46 executing program 3: 19:07:46 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:47 executing program 2: [ 876.888358][T17053] overlayfs: overlapping lowerdir path 19:07:47 executing program 3: 19:07:47 executing program 5: [ 877.210424][T17058] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 877.220101][T17058] EXT4-fs (loop4): group descriptors corrupted! 19:07:47 executing program 5: 19:07:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x0, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:48 executing program 5: [ 877.706471][T17069] overlayfs: unrecognized mount option "./file1" or missing value 19:07:48 executing program 2: 19:07:48 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:48 executing program 3: 19:07:48 executing program 5: 19:07:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:48 executing program 2: [ 878.514300][T17081] overlayfs: overlapping lowerdir path 19:07:49 executing program 2: [ 878.821278][T17083] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 878.832935][T17083] EXT4-fs (loop4): group descriptors corrupted! 19:07:49 executing program 3: 19:07:49 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:49 executing program 5: 19:07:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x0, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:49 executing program 3: 19:07:49 executing program 2: 19:07:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 880.044294][T17102] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 880.054993][T17102] EXT4-fs (loop4): group descriptors corrupted! 19:07:50 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89a1, &(0x7f0000000000)) 19:07:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x18, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x4, 0x5}]}, 0x18}}, 0x0) 19:07:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getpeername$packet(r0, 0x0, &(0x7f0000000080)) [ 880.520544][T17116] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 880.524497][T17110] overlayfs: overlapping lowerdir path 19:07:50 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 880.722526][T17114] overlayfs: missing 'lowerdir' 19:07:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:07:51 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 19:07:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:51 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003a80)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x24048884) sendmmsg$inet6(r0, &(0x7f00000019c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000340)="bd6ce4127c3d9fd8387b7c0401f2ff7f5e2f77706769632589b167706a764d12db658d665fa39299b668e4705cb076697a6af89c44d445993e8eeb3a2dabac25177a99cca1738680a6a275e5d73957e9e24171e8f66a59f262b7a44aaed003f7801c83ecb5e125fb3903c12d60c2b984b0c78c1769504725a5bd63605569287c767a115a205270c2a3f0b789b38cfc740415e1278b1f25254fc3a8ce3237cf516c159390d2eee62b4bf2a22a149faedbce0dc46398c6", 0xb6}, {&(0x7f0000000680)="ec4a061382be137148d49cbe02ee6f63e487b87f74bafc976b9950943eeec5b07c88711552a094e1b3e033b61c83736cb59e1b50cc3442ba05109bc8c40c928d7eb63a4e6053b71b54b1eb1117c1866022cf32847d159515a610126678a0084f3ee34cfe5e0082b764a1fd4a03f137596df98e91783b5ba5082a2d6206565e0da2ad98c7a1e0f13eeb6f381c6b", 0x8d}], 0x2}}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000740)="117e35eb4ea0bb76f986529e7951ad051082bdae8b160bcd50d9d78a538697a314284f7fc58f93307230ae6b423fe52dd7373e9b579fcca6949be885cec7862765c51f7d8b72479255e1a9e555607d9eb28960c8a9e1fca35748e3c78abec7b6fdafd5252fa1e0e64cf06b7412a08d3243a6e2c738c0c117a45c322cd0838a60551e684ee0cdf63d18c8d32576a0871d49b66529b77f7a4ff834afb13d7b718462a245", 0xa3}, {&(0x7f0000000b80)="ea968155c121602fbe4fa6647af37d57b4ce33125e49b47d52fd4f7ca5bcd772be78af231ab9f28dd25831510104779802b8acf675028e8398a672e909f006fbfa94526c9c0e66e9c184736ceab4995f7d2bb484f1f278f65b79c23d3b75da1a1bd19950ff3fe0b8bb7b1a82e59f4f74296dde69f1c8ec8c2d139376e2604025cd73b1c0358801bd00029cb06d23c45ece221bad5d5917685660c6a4d8b122d7456f1c7a7322dcb8a9c8984ebb89d77dd4fe", 0xb2}, {&(0x7f0000000c40)="7ae84ce19a229e3f41eea51bff6485a9a5810e6e8f421418256c54479d4aad46d59d8f1608439dc73538fb63b1cf2d10bf294588a0417daa8773061dbae6e6fa0bf5c80d9db0da89530fe2ca6df122494f6019497f49c53a0b62913fd7e1876843df73a1072343237ce1ecbb9955eb91d204b015be96a011e3aa9d223b0120386d5a866f85", 0x85}, {&(0x7f0000000d00)="d03d9db60eb2cdfc9889784b8dbbfc621e0516355e7e027620bfa0fae7086e080e0b018ad4a3b415e26a5ab4e54f5d3f63", 0x31}], 0x4}}, {{0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001000)="064841a7de2f53e8888662f7ce5bc121fee03b771b7e5494c5f19da2686f2b203555d99d07289e667a070627bfbe109236508d8fcd2891ef9d2c33e815c344de432c366d0219a1fc8f133c19490f5c3ab53df9c85b97f306793ca42e864c9641d31ea7592a3aa4b2d215ae786d2a7f1297b9bb0d", 0x74}, {&(0x7f00000010c0)="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", 0xfe}, {&(0x7f00000011c0)="fca56403fbfbd25770de375bf6b988ce1172b6fa5a77cce1ac4d969150c57643afbbcbf4606b4f2e5822cbaa61a9724bc7a2a7577c2371e8aa6736de424fbe42f0b35d9df241ab5ff328687a1e768e50ce09d3955d6827ea4100aa66657bd4b4ab7dc8cff3d4a828a83821d1f86fe8f2ecc915d29ddf32945a46627d7be417d90e8188a3004879cd9f18882cbdb60b6367ce7cff691a08b69eb5724dd76054215ba2eb9aba67390ab7c9d177b41332857a75eadeb880a99d01a9a2aa296386948029b92d711f354ad43e4f0a2ac001c015384d61f4d2557f264d789239b5a6", 0xdf}], 0x3}}], 0x3, 0x8000) sendmmsg$inet6(r0, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="2a5582f37d18f5fabad94391ef5890896d1f5290e2f70b06f404057dd3ee46868be48213c82980c081b403ce2fa31c5d4f27e8520222d899f6dc3d6ff34a8cb5d9e632805b3fb70a8e8638a6a8a21caa252056e2f6287f938a10aa3a061e2dc40d6d6e0b4b5d69a5e9e5366bb054916cd756eec46b334113ce6e09cdad3baeb0073a71bfa87c30e08caa58b27d3932e559b1dd42545e3ce1cc243b67fb7027dfefdd7fe0c15064a48b924925f6956a5d9064e2ab36b793b37b83f20346bc267a3f8f90941bbaac7b36ee32a16fa472f6e902634851f27eee087aa3295725863d997a4b763b6b9201ccc1260a4e2220a92bf3c65ae2dee670ca", 0xf9}, {&(0x7f0000000500)="d2fd23faa2db546f0c77e77dc9a749a3f19cfd880cde91af7bf6d14293e92854f61d298b4d7daa011f8a215f4b1bd306cc1c1016921da520586a0e5b17cf6b662c15df35afef2997d6e35abc23164802892e868b40c92f04aa10a5a3e6f2446dac55b3d762f193c36004f67c7786b3d8acc53ca71c525e45b1587ddde741289f9a0f54818a7a214d6700ecb6", 0x8c}, {&(0x7f00000005c0)="02c7c4d2f90074cb0f7dc25454201da6b356f097c64034121988def81eef2a085531751bfa063d780c4673188cb318b4a437da9807b42040349932fdc011f6da405e5890fda39880f8e96a46d6beb70d17366aa24b292984083e0112b85b1850446c80103438718ae5f5f7bef8cbf72c60378a51ccf1409d7ab8da818e3ec9a27c0086d9ea9082", 0x87}], 0x3}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000000800)="b832a47d1337030730e46c8b6252dc39b1d0b8006a1f1612b5b5888d927db3043e8c695eb7d3365424fb321c04ba493dbd1b3e1eeb92d2eb75348f727238a3eee39f49a57e7a50efc72c9fa1b5a1ffdccb56075483d0a3d609dee532c0bd917c8e30cefe513c6e21ec1c93d209a307cbfcbdf9da4c72a8d2e0bb760e379f38f4d7b3d51fc66fa5094afdae7a5a770d3885e90ae17112d4b107567cc5b9fb1ce78d00439b", 0xa4}, {&(0x7f0000000440)="4d49d1ea7ff04cad54915245b61d8b4c4e05090c0324d4ebc86f6bf027cabf7be82f902f0f20f5b75f99d10ae6ecb1c0d18e663d8ac597bf4de64f633fba53fd8ea89c02720885072f0c9ff3ec712b41ca24a4b1fa190122e90354908bee90ec91a534aa1d4406fbc85d134af5c180b7133c69", 0x73}, {&(0x7f00000008c0)="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", 0x287}], 0x3}}], 0x2, 0x8000) sendmmsg$inet6(r0, &(0x7f0000001f80)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)='@', 0x1}, {&(0x7f00000000c0)="44b4", 0x2}], 0x2}}], 0x1, 0x0) [ 881.321546][T17127] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 881.332632][T17127] EXT4-fs (loop4): group descriptors corrupted! 19:07:51 executing program 2: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x107, 0x11, 0x0, 0x0) 19:07:51 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001400e107000000009a049bcdc1"], 0x28}}, 0x0) 19:07:52 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 881.884968][T17145] overlayfs: overlapping lowerdir path [ 882.083272][T17143] overlayfs: missing 'lowerdir' 19:07:52 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/time\x00') ioctl$BTRFS_IOC_START_SYNC(r0, 0xb701, 0x0) 19:07:52 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3d}}, @generic={0x0, "ef20b4ce24e57ac6fc1f18057203"}, @l2tp={0x2, 0x0, @remote}}) 19:07:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:52 executing program 5: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_bt_hci(r0, 0x541b, &(0x7f0000000080)) 19:07:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 882.628740][T17156] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:52 executing program 2: r0 = socket(0x11, 0x3, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f0000002480)=[{&(0x7f00000000c0)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "f8aeedc791c04f254347e8b85217f812069bea3da16aa0db1bacaf0958f7bc44f78d4b0b240d0e31f9005b9e81fedea474de522a02baeb26603d24cbdd298a"}, 0x60, &(0x7f0000001880)=[{&(0x7f0000000140)="75ead539db0d4d3600bb55450a72", 0xe}], 0x1, &(0x7f0000001940)=ANY=[@ANYBLOB="a8"], 0xa8}], 0x1, 0x0) 19:07:53 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) write$input_event(r1, 0x0, 0x803e) 19:07:53 executing program 5: set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x4) socket$inet6_sctp(0xa, 0x0, 0x84) [ 883.164139][T17173] overlayfs: overlapping lowerdir path 19:07:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r0, 0x11, 0x64, 0x0, 0x300) 19:07:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 884.546677][T17185] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:55 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x1) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000000)) fchown(r0, 0xee01, 0xee01) pipe(&(0x7f0000000180)={0xffffffffffffffff}) dup(r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000003c0)=ANY=[@ANYRES16, @ANYBLOB="17090000000000000000010000600500070000000000080009000000000014001f000000000000000000000000000000000008000a000000000006000200020000001400200000000000000000000000ffffac1414"], 0x5c}}, 0x0) r4 = socket$inet(0x2, 0x3, 0x5) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x2c8, 0x3, 0x278, 0x0, 0x240, 0x240, 0x108, 0x0, 0x1e0, 0x328, 0x328, 0x1e0, 0x328, 0x3, 0x0, {[{{@ip={@multicast2, @empty, 0x0, 0x0, 'veth0\x00', 'team_slave_0\x00'}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x1000, 0x761, 0x0, 0x0, 0x0, 0xa9}}, @common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x21}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ip={@broadcast, @dev, 0x0, 0x0, 'netpci0\x00', 'macsec0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) [ 884.763434][T17197] overlayfs: overlapping lowerdir path 19:07:55 executing program 5: set_mempolicy(0x2, &(0x7f0000000300)=0x29, 0x2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') 19:07:55 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 885.159653][T17191] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 885.170593][T17202] overlayfs: missing 'lowerdir' 19:07:55 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 885.584398][T17210] batman_adv: batadv0: Adding interface: ipvlan2 [ 885.591230][T17210] batman_adv: batadv0: The MTU of interface ipvlan2 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 885.618096][T17210] batman_adv: batadv0: Not using interface ipvlan2 (retrying later): interface not active 19:07:56 executing program 2: r0 = socket(0x2, 0x3, 0x5) recvmmsg(r0, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000007a80)=[{{&(0x7f0000000200)={0x2, 0x0, @local}, 0x10, 0x0}}], 0x1, 0x0) [ 885.689809][T17215] batman_adv: batadv0: Adding interface: ipvlan3 [ 885.696452][T17215] batman_adv: batadv0: The MTU of interface ipvlan3 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 885.722206][T17215] batman_adv: batadv0: Not using interface ipvlan3 (retrying later): interface not active 19:07:56 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 886.064844][T17226] overlayfs: overlapping lowerdir path [ 886.276531][T17226] overlayfs: missing 'lowerdir' 19:07:56 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 886.396217][T17227] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:56 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000000)={0x2, 'vlan0\x00'}) 19:07:57 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x53) 19:07:57 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 886.913411][T17246] batman_adv: batadv0: Adding interface: ipvlan4 [ 886.919918][T17246] batman_adv: batadv0: The MTU of interface ipvlan4 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 886.949628][T17246] batman_adv: batadv0: Not using interface ipvlan4 (retrying later): interface not active 19:07:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x0, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:57 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r1, 0xc0, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2}, 0x78) [ 887.342341][T17256] overlayfs: overlapping lowerdir path 19:07:57 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 887.481879][T17256] overlayfs: missing 'lowerdir' 19:07:57 executing program 5: mmap$snddsp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 887.528286][T17257] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:07:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:07:58 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:58 executing program 2: r0 = socket(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8953, 0x0) [ 888.172550][T17274] batman_adv: batadv0: Adding interface: ipvlan5 [ 888.179244][T17274] batman_adv: batadv0: The MTU of interface ipvlan5 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 888.205803][T17274] batman_adv: batadv0: Not using interface ipvlan5 (retrying later): interface not active 19:07:58 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 888.326869][T17280] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:07:58 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x4) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x6, r1, 0x0, 0x0, 0x0) 19:07:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x0, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 888.817260][T17287] batman_adv: batadv0: Adding interface: ipvlan6 [ 888.823860][T17287] batman_adv: batadv0: The MTU of interface ipvlan6 is too small (1462) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 888.849661][T17287] batman_adv: batadv0: Not using interface ipvlan6 (retrying later): interface not active 19:07:59 executing program 2: r0 = socket(0x2b, 0x1, 0x0) bind$can_j1939(r0, &(0x7f0000000080)={0x2}, 0x18) [ 889.168219][T17291] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 889.263269][T17295] overlayfs: missing 'lowerdir' 19:07:59 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:07:59 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:07:59 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x40049409, 0x0) 19:07:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x84, 0x7d, &(0x7f0000000080)=ANY=[], 0x4) 19:08:00 executing program 5: r0 = socket(0x2, 0x5, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x5000) 19:08:00 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 890.166243][T17315] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x0, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:00 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x5452, 0x0) 19:08:00 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 890.741502][T17326] overlayfs: overlapping lowerdir path 19:08:01 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) [ 890.849369][T17329] overlayfs: missing 'lowerdir' 19:08:01 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 891.179649][T17335] overlayfs: overlapping lowerdir path 19:08:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:01 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x7, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) [ 891.492064][T17340] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:01 executing program 2: mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000180)='9p\x00', 0x1010010, 0x0) 19:08:01 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind(r0, &(0x7f0000001dc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80) 19:08:02 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:02 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x0, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:02 executing program 2: r0 = socket(0xa, 0x6, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x9, 0x0, &(0x7f0000000240)) [ 892.334396][T17362] overlayfs: overlapping lowerdir path 19:08:02 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x0, 0xfffffffe}) [ 892.689336][T17360] overlayfs: missing 'lowerdir' [ 892.962472][ T27] audit: type=1400 audit(1601406483.206:61): avc: denied { create } for pid=17370 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 19:08:03 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE(r0, &(0x7f0000000240)={0x0, {'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000180)=""/132, 0x84}}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) write$UHID_INPUT2(r0, 0x0, 0x6) openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) 19:08:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=.']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 893.182958][T17373] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:03 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r1, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) [ 893.563997][T17378] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:08:03 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 893.762399][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.770552][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.778551][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.786315][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.794030][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.801742][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.809901][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.822888][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.831685][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.839788][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.847520][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.855341][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.863006][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.870933][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.878665][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.886666][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.894339][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.901933][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.909676][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.917434][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.925153][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.933382][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.940971][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.948695][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.956441][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.964677][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.972290][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.980004][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.988416][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 893.996150][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.003866][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.011731][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.019470][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.027198][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.034962][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.042562][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.050281][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.058023][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.065795][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.073519][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.081115][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.088870][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.096603][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.104421][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.112284][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.120197][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.127983][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.135838][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.143512][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.151126][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.158889][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.166647][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.175067][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.182689][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.190912][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.198585][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.206284][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.214234][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.221851][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.229576][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.237267][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.244965][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.252578][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.260257][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.268031][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.275699][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.283373][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.290966][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.298639][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.306344][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.314089][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.321790][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.329470][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.337255][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.344952][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.353868][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.361496][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.369210][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.377340][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.385053][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.392695][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.400460][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.408149][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.415848][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.423546][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.431167][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.438867][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.446556][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.454249][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.461846][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.469568][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.477432][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.485099][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.492683][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.500352][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.508024][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.515701][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.523409][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.523526][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.523707][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.531105][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.539227][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.546140][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.546310][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.553839][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.561242][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.568735][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.576223][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.583891][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.591293][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.598785][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.606264][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.613749][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.621673][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.629192][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.636619][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.644110][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.652441][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.660585][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.669008][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.676495][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.684036][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.691723][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.699212][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.706702][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.714182][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.721681][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.729153][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.736743][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.745587][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.753030][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.760598][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.768003][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.775606][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.783029][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.790496][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.797913][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.805366][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.812800][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.820293][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.827786][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.835289][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.842712][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.850206][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.857884][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.865368][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.872784][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.880288][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.887754][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.895233][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.902650][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.910139][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.917853][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.925232][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.932636][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.940140][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.947611][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.955104][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.962537][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.970035][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.977622][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 894.985108][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 894.992536][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.000024][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 895.007518][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.014994][T16123] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 895.022418][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.052313][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.060020][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.067715][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.075448][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.083291][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.090904][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.100173][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.108057][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.115815][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.123613][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.131215][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.138970][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.146714][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.155248][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.162861][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.170681][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.178494][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.187176][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.194951][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.202568][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.210588][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 19:08:05 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="84010000100043"], 0x184}}, 0x0) [ 895.218541][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.226320][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.234095][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.241739][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.250232][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.258019][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.265829][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.273856][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.281480][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.289258][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.297143][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.305342][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.312960][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.320739][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.328522][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.336284][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.344051][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.351715][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.359531][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.367317][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.375088][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.382715][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.390598][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.398604][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.406547][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.414355][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.421990][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.429773][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.437568][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.445575][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.453590][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.461612][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.470262][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.478088][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.485890][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.493667][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.501279][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.509045][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.516813][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.524562][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.524643][T17402] overlayfs: missing 'lowerdir' [ 895.532162][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.544784][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.552398][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.560165][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.567900][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.575694][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.583502][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.591103][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.598929][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.606702][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.614552][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.622156][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.629919][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.637672][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.645411][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.653417][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.661062][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.668864][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.676630][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.684377][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.692081][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.699833][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.707624][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.715360][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.722950][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.730688][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.738415][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.746583][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.754336][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.761940][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.769673][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.777396][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.785210][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.792803][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.800573][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 895.808379][ T8749] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 19:08:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x0, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:06 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 896.300064][T17410] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 896.405911][T16123] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 19:08:06 executing program 2: r0 = socket(0x2, 0x3, 0x2) getsockopt$inet6_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) 19:08:07 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=.']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 897.149852][T17427] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 897.434806][T17433] overlayfs: overlapping lowerdir path [ 897.462154][T17434] overlayfs: missing 'lowerdir' [ 897.477099][ T8749] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 19:08:07 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@map=r0, 0xffffffffffffffff, 0x5}, 0x10) 19:08:07 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:07 executing program 2: setresuid(0x0, 0xee01, 0xffffffffffffffff) setresuid(0xee00, 0xee00, 0x0) 19:08:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=.']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:08 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:08 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:08 executing program 2: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)={0x14, r0, 0x1}, 0x14}}, 0x0) [ 898.315871][T17454] overlayfs: overlapping lowerdir path [ 898.446013][T17457] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x0, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:08 executing program 5: r0 = socket(0x2b, 0x1, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0xb, &(0x7f0000000180), 0x10) [ 898.821726][T17461] overlayfs: missing 'lowerdir' 19:08:09 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9c504c9f1f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sys_exit\x00', r0}, 0x10) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0) 19:08:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lower']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:09 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 19:08:09 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x803e000000000000, 0x0, &(0x7f0000000080)=@abs={0x1}, 0x6e) [ 899.521597][T17477] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 900.135376][T17494] overlayfs: unrecognized mount option "lower" or missing value 19:08:10 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:10 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 19:08:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(0xffffffffffffffff, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lower']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000280)={0x14, 0x1d, 0x1, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x1}, 0x0) 19:08:11 executing program 2: r0 = socket(0x22, 0x2, 0x2) accept4$llc(r0, 0x0, 0x0, 0x0) [ 901.465556][T17516] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:11 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 19:08:12 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) bind(r0, 0x0, 0x0) [ 901.802559][T17526] overlayfs: overlapping lowerdir path [ 901.837421][T17529] overlayfs: unrecognized mount option "lower" or missing value 19:08:12 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:08:12 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lower']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(0xffffffffffffffff, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:12 executing program 2: r0 = socket(0xa, 0x3, 0x7) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x29, 0x49, 0x0, 0x0) 19:08:13 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 19:08:13 executing program 5: r0 = socket(0x11, 0x3, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000a80)={&(0x7f0000000980), 0xc, &(0x7f0000000a40)={0x0}}, 0x0) [ 902.857985][T17547] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:13 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 903.537321][T17563] overlayfs: unrecognized mount option "lower" or missing value 19:08:13 executing program 2: socket(0x11, 0x3, 0x0) 19:08:14 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 19:08:14 executing program 5: r0 = socket(0x18, 0x0, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00'}) 19:08:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 904.334235][T17576] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(0xffffffffffffffff, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:14 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 19:08:14 executing program 2: clock_gettime(0x1, &(0x7f0000000540)) 19:08:15 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:15 executing program 5: r0 = shmat(0x0, &(0x7f0000cbc000/0x1000)=nil, 0x5000) shmdt(r0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x5000) r1 = shmget$private(0x0, 0x800000, 0x0, &(0x7f0000800000/0x800000)=nil) shmat(r1, &(0x7f0000802000/0x4000)=nil, 0x6800) [ 905.475600][T17595] overlayfs: overlapping upperdir path 19:08:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x4020940d, &(0x7f0000000040)={'ipvlan0\x00', @ifru_data=0x0}) 19:08:15 executing program 3: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 905.724639][T17604] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 905.793861][T17607] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:08:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:16 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000), 0x10) 19:08:16 executing program 3: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:16 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:17 executing program 2: r0 = socket(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000006140)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e24, 0x0, @remote}, 0x80, 0x0}}], 0x1, 0x2008850) 19:08:17 executing program 3: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:17 executing program 5: sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYRES16=0x0, @ANYRES16=0x0, @ANYBLOB="000048f6b01daa00f1286ad8a3637ff23d"], 0x3c}, 0x1, 0xa00}, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8916, &(0x7f0000000040)={'batadv_slave_1\x00'}) [ 907.341166][T17633] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:17 executing program 2: setresuid(0x0, 0xee01, 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x14, r0, 0x1}, 0x14}}, 0x0) [ 907.675082][T17637] overlayfs: overlapping upperdir path 19:08:18 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 908.129904][T17657] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:18 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:18 executing program 5: r0 = socket(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10, 0x0}}], 0x1, 0xff00) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="ea", 0x1}], 0x1}, 0x0) 19:08:18 executing program 2: r0 = socket(0x2a, 0x2, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:08:18 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 908.877557][T17673] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 909.020158][T17666] overlayfs: overlapping upperdir path 19:08:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:19 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./fil']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x84, 0x6, 0x0, 0x110) [ 909.490384][T17687] overlayfs: overlapping lowerdir path 19:08:20 executing program 2: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x894b, 0x0) 19:08:20 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 910.101378][T17698] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:20 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x14, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000006c0)={r0, &(0x7f0000000200), &(0x7f0000000680)=@tcp6=r1}, 0x20) 19:08:20 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCGIFCONF(r0, 0x5411, &(0x7f0000000680)) [ 910.564108][T17709] overlayfs: overlapping lowerdir path 19:08:20 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:21 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0xb, &(0x7f0000000040)={0x1}, 0x10) 19:08:21 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040), 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 910.986454][T17720] overlayfs: overlapping lowerdir path [ 911.006629][T17709] overlayfs: failed to resolve './fil': -2 19:08:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 911.373967][T17723] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./fil']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:21 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040), 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:21 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:21 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "4851545956627e4461f04edbc12ed3d5e7f519451d9f0ee06ea0c2fa80420c986d44c6083b143bc17a9e01a3de2901ec5a63bce78351682021307c096fed6f", 0x34}, 0x60) 19:08:22 executing program 5: r0 = socket(0xa, 0x6, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x18, 0x0, &(0x7f0000000240)) 19:08:22 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040), 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:22 executing program 2: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8930, 0x0) [ 912.681517][T17744] overlayfs: overlapping lowerdir path [ 912.783542][T17743] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 912.836919][T17746] overlayfs: failed to resolve './fil': -2 19:08:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000004f80)={0x0, 0x0, &(0x7f0000004f00)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="300000001400010100000000000000001e"], 0x30}], 0x1}, 0x0) 19:08:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./fil']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:23 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:23 executing program 2: socket$kcm(0x11, 0x200000000000002, 0x300) syz_genetlink_get_family_id$devlink(&(0x7f00000001c0)='devlink\x00') 19:08:23 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x0, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 914.000337][T17770] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:24 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000001c0), 0x2) write$bt_hci(r0, 0x0, 0x8) 19:08:24 executing program 5: r0 = socket(0xa, 0x2, 0x0) ioctl$sock_bt_hci(r0, 0x5411, 0x0) 19:08:24 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x0, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 914.356750][T17780] overlayfs: failed to resolve './fil': -2 19:08:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:24 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:25 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFMTU(r0, 0x5450, 0x0) 19:08:25 executing program 5: r0 = socket(0x1, 0x5, 0x0) bind$rose(r0, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @default}, 0x1c) 19:08:25 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x0, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 915.377440][T17809] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000040), &(0x7f00000001c0)=0x8) [ 915.772403][T17824] overlayfs: failed to resolve './file': -2 19:08:26 executing program 5: r0 = socket(0x2b, 0x1, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000003d40)={0x0, 0x0, &(0x7f0000003d00)={0x0}}, 0x200000c0) recvmmsg(r0, &(0x7f0000003b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 19:08:26 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:26 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 916.412842][T17836] overlayfs: overlapping lowerdir path 19:08:26 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:26 executing program 5: r0 = socket(0xa, 0x2, 0x0) ioctl$sock_bt_hci(r0, 0x890b, 0x0) [ 916.581325][T17849] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:26 executing program 2: select(0xfffffffffffffde9, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0) 19:08:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 917.047137][T17855] overlayfs: overlapping lowerdir path [ 917.061865][T17857] overlayfs: failed to resolve './file': -2 19:08:27 executing program 2: r0 = socket(0x2, 0x3, 0x2) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:08:27 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:27 executing program 5: r0 = socket(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x891b, &(0x7f0000005880)={'batadv0\x00'}) 19:08:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:27 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 917.661090][T17876] overlayfs: overlapping lowerdir path [ 917.872775][T17880] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x30}}, 0x0) 19:08:28 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 918.581303][T17894] overlayfs: failed to resolve './file': -2 19:08:28 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 19:08:28 executing program 2: r0 = socket(0x11, 0x3, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, 0x0, 0x0) 19:08:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(0x0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 919.187272][T17907] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:29 executing program 5: r0 = socket(0x2, 0x3, 0x2) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) 19:08:29 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 19:08:29 executing program 2: r0 = socket(0x23, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x113, 0x4, 0x0, 0x0) [ 919.773645][T17922] overlayfs: overlapping lowerdir path 19:08:30 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:30 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}}, 0x0) 19:08:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(0x0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 920.518744][T17942] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:30 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 19:08:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x4}, 0x0, 0x0, 0x0) 19:08:31 executing program 2: r0 = socket(0x25, 0x1, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x40) 19:08:31 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 921.605021][T17958] overlayfs: missing 'lowerdir' [ 921.730693][T17954] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:08:32 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 19:08:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(0x0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 922.077203][T17973] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:32 executing program 2: r0 = socket(0x2b, 0x1, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) 19:08:32 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:32 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) [ 922.726366][T17989] overlayfs: overlapping lowerdir path 19:08:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x5}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) [ 922.918668][T17989] overlayfs: missing 'lowerdir' [ 923.392895][T17994] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 19:08:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:33 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 923.641629][T18004] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:34 executing program 5: r0 = socket(0xa, 0x3, 0x4) connect$packet(r0, 0x0, 0x0) 19:08:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x0) 19:08:34 executing program 2: ioperm(0x0, 0x7, 0x100) pipe(&(0x7f0000000080)) 19:08:34 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 924.343384][T18020] overlayfs: overlapping lowerdir path 19:08:34 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 924.577415][T18019] overlayfs: missing 'lowerdir' [ 924.629172][T18027] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:35 executing program 2: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @empty}}}}) 19:08:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r0, 0xc1004110, &(0x7f00000000c0)={0x0, [0x7fffffff, 0x800, 0x3c9c]}) 19:08:35 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:35 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 925.572253][T18047] overlayfs: missing 'lowerdir' 19:08:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x0) [ 925.730644][T18053] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:36 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x18, 0x0, 0x0) 19:08:36 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x2, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, &(0x7f0000000080)) 19:08:36 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 926.435069][T18071] overlayfs: overlapping lowerdir path 19:08:36 executing program 2: r0 = socket(0x2, 0x3, 0x9) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000006640)={0x0, @generic={0x2, "9438f0379c63ae73b1ce19107ae4"}, @in={0x2, 0x0, @dev}, @xdp, 0x4}) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) [ 926.671336][T18075] overlayfs: missing 'lowerdir' 19:08:37 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:37 executing program 5: r0 = socket(0x2b, 0x1, 0x0) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20004000) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x14}, 0x14}}, 0x4044004) 19:08:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 926.962240][T18081] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x0) 19:08:37 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00') sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x14, r1, 0x5bea90fb5ffc0daf}, 0x14}}, 0x0) 19:08:37 executing program 5: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "63d7e0b9"}, 0x0, 0x0, @planes=0x0, 0x8}) 19:08:38 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 927.957207][T18099] overlayfs: overlapping lowerdir path [ 928.298325][T18104] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:08:38 executing program 2: r0 = syz_open_dev$hidraw(&(0x7f0000000000)='/dev/hidraw#\x00', 0x3, 0x601) write$hidraw(r0, &(0x7f00000001c0)='\x00', 0x200001c1) write$hidraw(r0, &(0x7f0000000040), 0x0) 19:08:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:38 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:38 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0x60, 0x0, &(0x7f0000000340)=[@acquire_done={0x40106309, 0x2}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 928.727064][T18115] overlayfs: overlapping lowerdir path 19:08:39 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 929.218072][ T27] audit: type=1400 audit(1601406519.466:62): avc: denied { set_context_mgr } for pid=18126 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=binder permissive=1 [ 929.374576][T18132] overlayfs: overlapping lowerdir path [ 929.501609][T18130] overlayfs: missing 'lowerdir' 19:08:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) [ 929.529311][T18137] EXT4-fs (loop4): unsupported descriptor size 0 19:08:39 executing program 2: r0 = socket(0x25, 0x5, 0x0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={0x0}}, 0x0) 19:08:39 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000000)={0x6, 'vlan0\x00', {0x40}}) 19:08:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:40 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:40 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001880)='/dev/autofs\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0xc0000645) 19:08:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_OPERSTATE={0x5, 0x10, 0x5}]}, 0x3c}}, 0x0) 19:08:40 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 930.454065][T18153] EXT4-fs (loop4): unsupported descriptor size 0 19:08:40 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 930.722651][T18157] overlayfs: missing 'lowerdir' 19:08:41 executing program 0: set_mempolicy(0x2, &(0x7f0000000300)=0x29, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) 19:08:41 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:41 executing program 2: socket(0x2b, 0x1, 0x0) select(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x8}, &(0x7f0000000200)) 19:08:41 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:41 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f0000000540)={0x7, 0x1, &(0x7f0000000440)=[0x0], &(0x7f0000000480), &(0x7f00000004c0), 0x0}) [ 931.551530][T18172] EXT4-fs (loop4): unsupported descriptor size 0 19:08:41 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="110300000000002c21b767"], 0x24}}, 0x0) 19:08:42 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 931.946683][T18184] overlayfs: overlapping lowerdir path 19:08:42 executing program 2: r0 = socket(0xa, 0x3, 0x7) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x29, 0x38, 0x0, 0x0) [ 932.113705][T18184] overlayfs: missing 'lowerdir' [ 932.170621][T18190] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:08:42 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x5421, 0x0) 19:08:42 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=.']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:42 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@size={'size', 0x3d, [0x30, 0x78]}}]}) [ 932.489041][T18193] EXT4-fs (loop4): unsupported descriptor size 0 19:08:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x2, 0x0, 0x0, 0x40}]}) 19:08:43 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 932.893921][T18206] tmpfs: Bad value for 'size' [ 932.903891][T18206] tmpfs: Bad value for 'size' 19:08:43 executing program 5: setresuid(0x0, 0xee00, 0x0) setresuid(0x0, 0x0, 0xee01) 19:08:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9c504c9f1f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sys_exit\x00', r0}, 0x10) r1 = openat$audio1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r1, 0x5001, 0x0) 19:08:43 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 933.161442][T18208] overlayfs: missing 'lowerdir' 19:08:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=.']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 933.432247][T18215] EXT4-fs (loop4): unsupported descriptor size 0 19:08:44 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:44 executing program 2: syz_io_uring_setup(0x36cf, &(0x7f0000000080), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ee7000/0x3000)=nil, 0x0, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ocfs2_control\x00', 0x0, 0x0) socket(0x2b, 0x1, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) select(0x40, &(0x7f0000000200)={0x48}, &(0x7f0000000240)={0x5}, 0x0, 0x0) 19:08:44 executing program 0: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2000) 19:08:44 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:44 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, 0x0, 0x0) [ 934.232583][T18229] EXT4-fs (loop4): unsupported descriptor size 0 [ 934.254717][T18228] overlayfs: missing 'lowerdir' 19:08:44 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=.']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:45 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x8, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) 19:08:45 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, 0x0) 19:08:45 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:45 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x80247008, &(0x7f0000000000)) [ 935.233980][T18253] EXT4-fs (loop4): unsupported descriptor size 0 19:08:45 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockname$tipc(r0, 0x0, &(0x7f0000000040)) 19:08:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000004f80)={0x0, 0x0, &(0x7f0000004f00)=[{&(0x7f0000000180)={0x114, 0x14, 0x1, 0x0, 0x0, "", [@nested={0x101, 0x0, 0x0, 0x1, [@generic="00000600"/13, @typed={0xed, 0x0, 0x0, 0x0, @binary="605c4325e251114fee6b9566a79895e3e8ccc2dec01d7f2a711c1c2445df182a7e4a71300892e396d4854d7165717aaa82fa2620e2298432e1c7afd9304e6a0573b0b253f3a35a1dd2ce806611131a9527956a4127c401b7eaa88688017c579eea22c8624370a2ac1d890d4779f751c9c3a61949a2a07a4c2dd791f4f732ea8cdb532fe4c7caadd25ab45d8c84f78dc3ba79e5fa5f3907a535c1fb787ec6ce719fdf0e94a0e54fc3d619086b09a7b1ddb789e95e44a1ff76b749e8c9899b4895ce234f46566f5812f141f431a26b33aa22c87a86f6629e6a05a11b8be66776a1c39e3042eaf373f6a0"}]}]}, 0x114}], 0x1}, 0x0) [ 935.646444][T18257] overlayfs: overlapping lowerdir path [ 935.689779][T18261] overlayfs: missing 'lowerdir' 19:08:46 executing program 5: r0 = io_uring_setup(0x1901, &(0x7f0000000180)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 19:08:46 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:46 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lower']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:46 executing program 2: r0 = socket(0x2, 0x5, 0x0) ioctl$SIOCSIFMTU(r0, 0x8916, &(0x7f0000000040)={'macsec0\x00'}) 19:08:46 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, 0x0) [ 936.306177][T18277] EXT4-fs (loop4): unsupported descriptor size 0 19:08:46 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:47 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:47 executing program 0: r0 = socket(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8993, &(0x7f0000005880)={'batadv0\x00'}) 19:08:47 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x10000) sendfile(r0, r1, 0x0, 0x10000) 19:08:47 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@getsadinfo={0x14, 0x23, 0x1}, 0x14}}, 0x0) [ 937.082474][T18302] overlayfs: unrecognized mount option "lower" or missing value 19:08:47 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x3, 0x0, 0x0) 19:08:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lower']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) [ 937.453267][ T27] audit: type=1804 audit(1601406527.696:63): pid=18309 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir010631065/syzkaller.3IliRc/83/file0" dev="sda1" ino=16383 res=1 errno=0 19:08:47 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, 0x0, 0x0) [ 937.621852][T18312] EXT4-fs (loop4): unsupported descriptor size 0 [ 937.720193][ T27] audit: type=1804 audit(1601406527.786:64): pid=18309 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir010631065/syzkaller.3IliRc/83/file0" dev="sda1" ino=16383 res=1 errno=0 19:08:48 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, 0x0, 0x0) 19:08:48 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b49", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 938.194225][ T27] audit: type=1800 audit(1601406528.446:65): pid=18309 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16383 res=0 errno=0 19:08:48 executing program 2: r0 = socket(0xa, 0x3, 0x7) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x29, 0x1a, 0x0, 0x0) [ 938.347546][ T27] audit: type=1800 audit(1601406528.466:66): pid=18311 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16383 res=0 errno=0 [ 938.588646][T18326] overlayfs: overlapping lowerdir path 19:08:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0xff00) [ 938.780493][T18331] overlayfs: unrecognized mount option "lower" or missing value 19:08:49 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, 0x0, 0x0) [ 938.900844][T18333] EXT4-fs (loop4): unsupported descriptor size 0 19:08:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000003010102"], 0x14}}, 0x0) 19:08:49 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000200)="649b9e8d9a80a536910246632a78158bdd5efffe49bdd60e33cb5ddc86d47f37294763fe89baec3f244691de7d3aa2dc19e9e1c8d76d130ecad9e22dd357455682890662681823af8f9d39438c3c5010d657c315a290f997dd778981b0ceb3d290a3427feca757b60299f1e1487f117edcf853d3f5b442d63d75279a52e8e5bef19b92418d6bda454856fb3dac89c16059b8ec3218b03cd2f699f973a47fd91b5ce26b86db1c9532b650e3950a8986c48b033a05991bf133a6ca3c271c2b74e27a4faff38d6dd5524e2e46c10d07badca141d0ff4e22b199df7487852dd08f621f6df751ccc5ea2301a2e278ecd32320d82211619ae7ab7f5d542c0417505c1143a542c3c0dcefb511b7d78c6d62a229a132d7a96d93fc8621ec2d2791211a59c0a914478699c4af0543ce24f73b2c973640c2702df3fa4b0c3cc1f3cc16a4744ea794321b0f7833158a4881b317b1be5e286f4bf54ebd2725ca5c5216e08b703f5c9944eae4cfe41747b00ad0011ee417ad2c6da2cfbc33256bb11004a40bca5ce8467626765de245091d5b77772cd4024a79ea9bbf4c5a12fff6074a7dba08a007b495201e6b75d899b7b8b8a15251762ae7e3d14ea0e3b7636cb3ce464f49b6985d3dc3374036e5a60ff6c3e5ad8d49b62e8c1958b1053e3574856c7ffba0ceda5f8669671fed49fd76e102f41ab6fa1e9189f28589f6c38379287b", 0x1fd, 0x3}]) 19:08:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lower']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:49 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b49", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:49 executing program 5: r0 = socket(0xa, 0x3, 0x7) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000000)={'nr0\x00', @ifru_map}) 19:08:50 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, 0x0, 0x0) [ 939.957816][ T4898] Dev loop2: unable to read RDB block 1 [ 939.964074][ T4898] loop2: unable to read partition table [ 940.032117][ T4898] loop2: partition table beyond EOD, truncated [ 940.040898][T18348] Dev loop2: unable to read RDB block 1 [ 940.046805][T18348] loop2: unable to read partition table [ 940.077305][T18348] loop2: partition table beyond EOD, truncated [ 940.084071][T18348] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 940.166986][T18352] overlayfs: overlapping lowerdir path [ 940.208249][T18353] overlayfs: unrecognized mount option "lower" or missing value [ 940.267648][T18355] EXT4-fs (loop4): unsupported descriptor size 0 19:08:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x83, &(0x7f0000000000)={r2}, 0x8) 19:08:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:50 executing program 0: socketpair$nbd(0x3, 0x1, 0x0, &(0x7f0000000080)) 19:08:50 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x6000, 0x0) 19:08:50 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b49", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:51 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 19:08:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000080)="a3", 0x1, 0x54000, 0x0, 0x0) [ 941.300887][T18376] EXT4-fs (loop4): unsupported descriptor size 0 19:08:51 executing program 0: r0 = socket(0x2b, 0x1, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x24000001) 19:08:51 executing program 5: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 19:08:52 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 19:08:52 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 942.111789][T18374] overlayfs: overlapping upperdir path 19:08:52 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e7, &(0x7f00000000c0)={0x3, @null}) 19:08:52 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x84, 0x21, 0x0, 0x0) 19:08:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:52 executing program 5: r0 = socket(0x15, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x40010023) 19:08:52 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 942.545312][T18394] EXT4-fs (loop4): unsupported descriptor size 0 19:08:53 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 19:08:53 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040)='fuse\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x30c3cea, 0x0) 19:08:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYRESOCT], 0x54}}, 0x0) 19:08:53 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) [ 943.587424][T18409] overlayfs: overlapping upperdir path [ 943.787945][T18419] EXT4-fs (loop4): unsupported descriptor size 0 19:08:54 executing program 2: r0 = socket(0xa, 0x6, 0x0) recvmmsg(r0, &(0x7f0000004340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010060, 0x0) 19:08:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:54 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:54 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 19:08:54 executing program 2: r0 = socket(0x11, 0x3, 0x0) bind$bt_hci(r0, 0x0, 0x0) 19:08:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffe, 0xfffffffffffffffb, 0x1) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r0) r1 = socket(0x11, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x401, 0x1, 0x8004, 0x1, 0xf2, 0x95, 0x7, 0x932, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000100)={r3, @in={{0x2, 0x4e20, @broadcast}}, 0xfff, 0x8}, &(0x7f00000001c0)=0x90) [ 944.793773][T18437] overlayfs: overlapping lowerdir path [ 944.828944][T18438] EXT4-fs (loop4): unsupported descriptor size 0 19:08:55 executing program 5: pkey_mprotect(&(0x7f0000fec000/0x11000)=nil, 0x11000, 0x3000003, 0xffffffffffffffff) 19:08:55 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:55 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) [ 945.418987][T18437] overlayfs: overlapping upperdir path 19:08:55 executing program 0: request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='/dev/ptp0\x00', 0xffffffffffffffff) 19:08:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./fil']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req={0x0, 0xc000}, 0x10) [ 945.927087][T18462] EXT4-fs (loop4): unsupported descriptor size 0 19:08:56 executing program 5: r0 = socket(0x28, 0x801, 0x0) connect$vsock_stream(r0, &(0x7f00000003c0), 0x10) syz_genetlink_get_family_id$l2tp(0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="0900000002"], 0x8) recvmmsg(r1, &(0x7f0000001900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000180), 0x8) 19:08:56 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:56 executing program 2: syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x40001) 19:08:56 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000040)) 19:08:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 19:08:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./fil']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:57 executing program 5: r0 = socket(0x23, 0x5, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 947.115466][T18489] EXT4-fs (loop4): unsupported descriptor size 0 19:08:57 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:08:57 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0xffff6768, 0x4) 19:08:58 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8982, &(0x7f0000002280)) 19:08:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xf}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) 19:08:58 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 947.897477][T18505] EXT4-fs (loop4): unsupported descriptor size 0 19:08:58 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_bt_hci(r0, 0x89a0, &(0x7f0000000200)="93a8") [ 948.517114][ T26] Bluetooth: hci5: command 0x0406 tx timeout [ 948.711551][T18507] overlayfs: failed to resolve './fil': -2 19:08:59 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:59 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) bind$rxrpc(r0, &(0x7f00000002c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x24) 19:08:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 19:08:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./fil']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:08:59 executing program 0: r0 = epoll_create(0x7) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 19:08:59 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x3c}}, 0x0) [ 949.247459][T18526] EXT4-fs (loop4): unsupported descriptor size 0 19:08:59 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:08:59 executing program 2: r0 = socket(0x25, 0x5, 0x0) sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x5) 19:08:59 executing program 5: syz_mount_image$jfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 19:09:00 executing program 0: r0 = socket(0x21, 0x2, 0x2) getsockopt$llc_int(r0, 0x110, 0x0, 0x0, 0x0) 19:09:00 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x3c}}, 0x0) [ 950.202485][T18549] EXT4-fs (loop4): unsupported descriptor size 0 [ 950.322025][T18552] overlayfs: failed to resolve './fil': -2 19:09:00 executing program 2: prctl$PR_MCE_KILL(0x4, 0x0, 0x0) 19:09:00 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:00 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x3c}}, 0x0) 19:09:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:09:01 executing program 5: pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x200000a, 0xffffffffffffffff) 19:09:01 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) clone3(&(0x7f0000000580)={0x210024100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) [ 951.288060][T18576] EXT4-fs (loop4): unsupported descriptor size 0 19:09:01 executing program 2: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$CAN_RAW_FILTER(r0, 0x10f, 0x1, 0x0, 0x0) 19:09:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x84, 0x25, &(0x7f0000000080)=ANY=[], 0x110) [ 951.559994][T18583] overlayfs: overlapping lowerdir path 19:09:01 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 19:09:02 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:02 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8901, &(0x7f0000002280)) 19:09:02 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getpeername$tipc(r0, 0x0, &(0x7f0000000080)) [ 952.299247][T18582] overlayfs: failed to resolve './file': -2 19:09:02 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 19:09:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = getpid() socket$nl_route(0x10, 0x3, 0x0) sendmsg$unix(r1, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r2}}}], 0x20}, 0x0) [ 952.546567][T18599] EXT4-fs (loop4): unsupported descriptor size 0 19:09:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:09:03 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:03 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x0, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 19:09:03 executing program 5: r0 = socket(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8905, 0x0) 19:09:03 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8}]}, 0x44}}, 0x0) 19:09:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x84, 0x7b, &(0x7f0000000080)=ANY=[], 0x110) [ 953.648792][T18625] EXT4-fs (loop4): unsupported descriptor size 0 19:09:04 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0xc0045878, 0x0) 19:09:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8919, &(0x7f0000000000)={'netdevsim0\x00', @ifru_ivalue}) 19:09:04 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f000000bc40)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) write$qrtrtun(r0, 0x0, 0x3fffff) 19:09:04 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:09:04 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 19:09:04 executing program 2: ioperm(0x0, 0x7, 0x100) r0 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x24) 19:09:04 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f000000bc40)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) write$qrtrtun(r0, &(0x7f000000bc80)='7', 0x1) [ 954.737464][T18644] EXT4-fs (loop4): unsupported descriptor size 0 19:09:05 executing program 0: r0 = socket(0x1e, 0x5, 0x0) ioctl$SIOCSIFMTU(r0, 0x8981, &(0x7f0000000000)={'lo\x00'}) 19:09:05 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x1) r1 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000000)) fchown(r0, 0xee01, 0xee01) pipe(&(0x7f0000000180)={0xffffffffffffffff}) dup(r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5c0000001e2a05566e7891e775431e2a907c42e9461236920c778c01e0ec65d881a72f1b979d0f9f", @ANYRES16=r4, @ANYBLOB="17090000000000000000010000600500070000000000080009000000000014001f000000000000000000000000000000000008000a0000000000060002000200000014002000"/79], 0x5c}}, 0x0) r5 = socket$inet(0x2, 0x3, 0x5) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x2c8, 0x3, 0x278, 0x0, 0x240, 0x240, 0x108, 0x0, 0x1e0, 0x328, 0x328, 0x1e0, 0x328, 0x3, 0x0, {[{{@ip={@multicast2, @empty, 0x0, 0x0, 'veth0\x00', 'team_slave_0\x00'}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x1000, 0x761, 0x0, 0x0, 0x0, 0xa9}}, @common=@inet=@ecn={{0x28, 'ecn\x00'}, {0x21}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@ip={@broadcast, @dev, 0x0, 0x0, 'netpci0\x00', 'macsec0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d8) 19:09:05 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 19:09:05 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 955.281593][T18654] overlayfs: failed to resolve './file': -2 19:09:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e000000100081087c0861b63574522b0a58b13705000000000000002503eae60d000200030200ff801005001201", 0x2e}], 0x122}, 0x0) 19:09:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(0x0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:09:06 executing program 0: socketpair(0x29, 0x0, 0x0, &(0x7f0000002400)) 19:09:06 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x3c}}, 0x0) 19:09:06 executing program 2: openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x1112c0, 0x0) [ 955.897900][T18671] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:06 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 956.509401][T18682] overlayfs: unrecognized mount option "./file1" or missing value 19:09:06 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x2) 19:09:07 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:09:07 executing program 2: r0 = getpid() rt_sigqueueinfo(r0, 0xfffffffd, &(0x7f0000000040)={0x0, 0x0, 0xffffff80}) 19:09:07 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) [ 957.146437][T18690] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:07 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x10, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x4800}}, 0x14}}, 0x0) 19:09:07 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(0x0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:09:07 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) 19:09:08 executing program 0: r0 = syz_io_uring_setup(0x36cf, &(0x7f0000000080), &(0x7f0000000000/0x3000)=nil, &(0x7f0000ee7000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000000000)) io_uring_enter(r0, 0x4a8f, 0x0, 0x0, &(0x7f0000000040)={[0x80000000]}, 0x8) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ocfs2_control\x00', 0x0, 0x0) socket(0x2b, 0x1, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) select(0x40, &(0x7f0000000200)={0x48}, &(0x7f0000000240)={0x5}, 0x0, 0x0) 19:09:08 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) 19:09:08 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb, 0x1, 'ipvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}}, 0x0) [ 958.065958][T18707] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:08 executing program 5: r0 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fspick(r1, &(0x7f00000000c0)='.\x00', 0x0) [ 958.667318][T18726] overlayfs: overlapping lowerdir path 19:09:09 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:09 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x30}}, 0x0) 19:09:09 executing program 2: r0 = socket(0x2a, 0x2, 0x0) getsockopt$nfc_llcp(r0, 0x118, 0x0, 0x0, 0x0) 19:09:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5f}, 0x48) bpf$BPF_LINK_CREATE(0x15, 0x0, 0x0) [ 959.461017][T18737] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x23, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}]}]}, 0x28}}, 0x0) 19:09:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(0x0, &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 19:09:10 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$FICLONERANGE(r0, 0xc0189436, &(0x7f0000000040)) 19:09:10 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:10 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x30}}, 0x0) 19:09:10 executing program 5: syz_mount_image$fuse(&(0x7f0000002040)='fuse\x00', &(0x7f0000002080)='./file0\x00', 0xa00, 0x0, 0x0, 0x710e0000, &(0x7f00000020c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 19:09:10 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af24, &(0x7f0000000040)) [ 960.596584][T18757] overlayfs: overlapping lowerdir path [ 960.803186][T18761] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:11 executing program 5: r0 = socket(0x2b, 0x1, 0x0) connect$can_j1939(r0, &(0x7f0000000040), 0x18) 19:09:11 executing program 3: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000280)) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x30}}, 0x0) 19:09:11 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x0) [ 961.754934][T18782] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:12 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000000)={0xa, 0x0, 0x0, 0x0, 'syz1\x00'}) 19:09:12 executing program 5: r0 = socket(0x15, 0x5, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x8940, &(0x7f0000000000)) 19:09:12 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x29, 0x2, 0x0, 0x0) 19:09:12 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:12 executing program 3: r0 = socket(0x2, 0x3, 0x2) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={0x0, 0x2c}}, 0x0) 19:09:12 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x40049409, &(0x7f0000002280)) 19:09:12 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 19:09:13 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) recvmmsg(r0, &(0x7f0000004440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 19:09:13 executing program 0: syz_mount_image$jfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000140), 0x20000164, 0x0) 19:09:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x0) 19:09:13 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x9}, 0x0) [ 963.352748][T18807] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:13 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x6e, 0xa}, [@ldst={0x2, 0x0, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 19:09:13 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:13 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89ea, &(0x7f00000000c0)={0x3, @null}) 19:09:14 executing program 2: r0 = socket(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000007640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 963.929359][T18821] overlayfs: overlapping lowerdir path 19:09:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002000)='/dev/fuse\x00', 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002040)='fuse\x00', &(0x7f0000002080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000020c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_mount_image$fuse(&(0x7f0000002040)='fuse\x00', &(0x7f0000002080)='./file0\x00', 0xa00, 0x0, 0x0, 0x20100000, &(0x7f00000020c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 964.355172][T18829] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:14 executing program 5: r0 = socket(0x2, 0x3, 0x5) sendmmsg$inet(r0, &(0x7f0000000b00)=[{{&(0x7f0000000040)={0x2, 0x0, @remote}, 0x10, 0x0}}, {{&(0x7f0000000400)={0x2, 0x0, @private}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@ip_ttl={{0x14, 0x0, 0x8}}], 0x18}}], 0x2, 0x0) 19:09:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x268, 0x10, 0x0, 0x0, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "edf27d8f88d12b49ea99fcf2341a6aebe3ac861ad6f1fb08113094b7069eb34a", "335d84894a456453bc6aa4189baa0b056f3905e7cadb36dda15dccdbbba2e8cd"}}}]}, 0x268}}, 0x0) 19:09:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}, {}]}, 0x34, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='devpts\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', 0x40, 0x3, &(0x7f0000000740)=[{&(0x7f0000000440)="aeed213521328edb30a144b047f126920efcac2eddb5efaf49e70708c1d746989305aabee8ecb619f735c975414eb7709a38ec9185691dcf33e2", 0x3a}, {0x0}, {0x0}], 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000005c0)={[], 0x0, 0x3, 0x5, 0x6e0, 0x0, 0xffffffffffffffff}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x4b, 0x29, 0x2, {0x10000, [{{0x20, 0x2, 0x4}, 0x3e, 0x8, 0x5, './bus'}, {{0x20, 0x3, 0x2}, 0x3ff, 0x5, 0xb, './bus/file0'}]}}, 0x4b) getdents(r0, &(0x7f00000004c0)=""/172, 0xac) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) setsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x0) 19:09:14 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 964.878138][T18843] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 19:09:15 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000001f80)={0x0, @in={0x2, 0x0, @multicast1}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, @xdp, 0x5}) [ 965.279323][T18850] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:15 executing program 3: r0 = socket(0x28, 0x801, 0x0) write$bt_hci(r0, 0x0, 0x0) [ 965.320088][T18853] overlayfs: overlapping lowerdir path 19:09:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x400b}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) 19:09:16 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:16 executing program 0: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000000500), 0x0, 0x0) syz_mount_image$bfs(0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0), 0x0, 0x0) 19:09:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x84, 0x13, &(0x7f0000000080)=ANY=[], 0x4) 19:09:16 executing program 1: r0 = socket(0x10, 0x3, 0x4) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00') sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000019c0)={0x50, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_WOL_MODES={0x10, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}]}, 0x50}}, 0x0) 19:09:16 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', 0x0, 0x0, 0x0) 19:09:16 executing program 2: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x4) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1d, r1, 0x0, 0x0, 0x0) [ 966.659638][T18869] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:17 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:17 executing program 5: request_key(&(0x7f0000000200)='logon\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='*\x00', 0x0) 19:09:17 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af00, &(0x7f0000000040)={0x0, r0}) 19:09:17 executing program 0: r0 = socket(0x2b, 0x1, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x31, &(0x7f0000000180)={0xfb}, 0x10) 19:09:17 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000240)={'syztnl2\x00', 0x0}) [ 967.334845][T18888] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:17 executing program 2: ioperm(0x0, 0x1ff, 0xfffffffffffffc68) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, 0x0) 19:09:17 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f465", 0x33, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:17 executing program 5: socket(0x23, 0x5, 0x0) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x0) select(0x40, &(0x7f0000000080), &(0x7f0000000100)={0x1f}, 0x0, 0x0) 19:09:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) r1 = dup(r0) write$input_event(r1, 0x0, 0x34000) 19:09:18 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x8981, &(0x7f0000000000)) 19:09:18 executing program 1: socket(0x2b, 0x1, 0x0) select(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000180)={0x8}, 0x0) 19:09:18 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:09:18 executing program 5: r0 = socket(0x10, 0x80002, 0xc) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001800)={0x0}}, 0x0) [ 968.208852][T18907] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:18 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', 0x0, 0x0) 19:09:18 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:18 executing program 0: socket(0x2, 0x3, 0xfb) 19:09:19 executing program 2: r0 = socket(0x2b, 0x1, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000810) recvfrom$rxrpc(r0, 0x0, 0x0, 0x100, 0x0, 0x0) 19:09:19 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x1) pwritev2(r0, &(0x7f0000001440)=[{&(0x7f0000000040)}, {&(0x7f0000000080)="ad9b8d4466bfb03295b077c0c48fa8a6474c3a21cc76c4599734e3afafa6be050688d024d51edab113ec7eb0c797a44db6f73db672864bc594676dfbea19219ee9de7da0b359d9ca2c36b04e4bdfd9bcd06bbf8927474926b834ea8181c2b22a2e723476ba49abdf1b36a17875439c8b29847b5467dc82c07161eaa44a8ef6ffc23c3d1e6fc19dfc36ef3d0b61de744693b86b0c4effa3f7fa68d815b8855a432aabbb9d5651b9ad846d0296d81cd40296405a1b0a8882f4525bf671408db6", 0xbf}, {&(0x7f0000000180)="a6dae1a0eb09a33fcd3b4b8883aa4a40e739e2623007ea6f2a86b9ef39502958a4370aaf08bff5107c345ce5e5278a8502b74f98ae56b73113d9e1d9de5a729a2146be0fc7b0b42c6787cc4447", 0x4d}, {0x0}], 0x4, 0x0, 0x2, 0x17) 19:09:19 executing program 1: r0 = socket(0x2b, 0x1, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x541b, &(0x7f0000000000)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) [ 969.059778][T18927] EXT4-fs (loop4): invalid first ino: 0 19:09:19 executing program 3: sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x890b, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) 19:09:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9c504c9f1f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sys_exit\x00', r0}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x2, &(0x7f0000000040)=[{0x0, 0x0, 0x7, 0x1}, {0x8001, 0x10, 0x5, 0x49e}]}, 0x10) 19:09:19 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x2, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) 19:09:19 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000001c0), 0x2) write$bt_hci(r0, &(0x7f0000000000)={0x1, @le_ltk_reply={{0x201a, 0x12}, {0x0, "504b4fac7077e4180a99dc24e4802bae"}}}, 0x16) 19:09:19 executing program 1: r0 = socket(0x2, 0x3, 0x5) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x1a, 0x0, &(0x7f0000000080)) [ 969.758965][T18942] EXT4-fs (loop4): invalid first ino: 0 19:09:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, 0x0) 19:09:20 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:20 executing program 1: r0 = socket(0x15, 0x5, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x89a1, &(0x7f0000000000)) 19:09:20 executing program 5: r0 = socket(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 19:09:20 executing program 2: r0 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x54, r0, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g='\xf4M\xa3g\xa8\x8e\xe6VO\x02\x02\x11Eg\'\b/\\\xeb\xee\x8b\x1b\xf5\xebs74\x1bE\x9b9\"'}]}]}]}, 0x54}}, 0x0) 19:09:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x2b, 0x26d, 0x20000000000001, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) 19:09:20 executing program 3: r0 = socket(0xa, 0x3, 0x7) fallocate(r0, 0x0, 0x0, 0x0) [ 970.576814][T18967] EXT4-fs (loop4): invalid first ino: 0 19:09:20 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x10000, 0xcf, 0x1120000}, 0x10) 19:09:21 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:21 executing program 3: r0 = socket(0x1, 0x3, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={0x0}}, 0x0) 19:09:21 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) 19:09:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacf27e32fe0231368b2264f9c504c9f1f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b5c093173d5661cfeec79c66c54c3"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='sys_exit\x00', r0}, 0x10) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) [ 971.307646][T18984] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:21 executing program 1: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x11, r0, 0x8000000) 19:09:21 executing program 3: syz_mount_image$jfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000140), 0x24, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{}, {0x2, 0x0, 0xee01}], {}, [{}]}, 0x3c, 0x0) 19:09:21 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:21 executing program 5: r0 = socket(0x2, 0x3, 0x2) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x2c}}, 0x0) 19:09:22 executing program 2: r0 = socket(0x15, 0x5, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000000)) [ 971.972846][ T8426] Bluetooth: hci0: command 0x201a tx timeout 19:09:22 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x6, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) 19:09:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$ENABLE_STATS(0x20, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)={0x98, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0x6c, 0xc, 0x0, 0x1, [{0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x809a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa3e6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x257}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf00e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9367}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4dd2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4564}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4e69}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe060}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8505}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x140}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x421a}]}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000001) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000540)=0x5, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="850000002f000000350000000000000085000000080000009500000000000000f4670880271e0300000000000000c037c5a142dfa8d7e81ae0b737126ea6f7dc39cd34d5aeed8d38e65cb6e22ff5dde53f04d25c79949c23e20615d755a22400a7c09cc28d7673294f42a5f0a8320e13822c45c0f8612c10b100000000b0d3712c7e93363af3c075ff1e23166a32d95433bb755a2dd576090c4867a7b6393e366c6386d5ec7209d031f40f3012e9576e51a7f57846c744ae6af3e4195cc037102124d85cec074c6949e1298901ebb39522f6649dd76d067a82f5fe47fe5f17f9ab800f4104dbaba46aa43a815b1e5c6d1d224b64be6c4d7f47ef21eb7e46f9aa4a9779f8555eaea768c1f2c221c110ef4b463d110000000076f593d928cf95846be600040000c5324812696a623cd8a4f8dc8dcba00b1b2d2747c45b0c52087b5efabf8496b9adf9ca4892cb570e5b8b9a36a951667d510ba0e37b56c0ebfb19a34268335648e1f844ce328c10752a42dca52fb98c1452b6518a6ef7297f7b2744419a2f238f173d0cd46dafc6ac5500f53e5309ec91d83cf4fbd775d9c07d8d591a4dac60ff000000b78863e629b3b200000000000000000000000000000000000000449c810d3174c87ee54586"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0xfffff000, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8dc}, 0x28) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x890b, &(0x7f0000000000)={'ip6tnl0\x00', 0x0}) [ 972.370607][T19006] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:22 executing program 3: r0 = socket(0xa, 0x6, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8918, 0x0) 19:09:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$getflags(r0, 0x1) 19:09:22 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE(r0, 0x0, 0x0) 19:09:23 executing program 2: syz_mount_image$jfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:09:23 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 972.955545][ T27] audit: type=1400 audit(1601406563.206:67): avc: denied { ioctl } for pid=19015 comm="syz-executor.3" path="socket:[47038]" dev="sockfs" ino=47038 ioctlcmd=0x8918 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 19:09:23 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_provisioning(&(0x7f0000000140)='fscrypt-provisioning\x00', &(0x7f0000001380)={'syz', 0x0}, &(0x7f00000013c0)={0x1, 0x0, "38e68bc6032c747af5a889eda4b63f87"}, 0x18, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0xa, r1, &(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) 19:09:23 executing program 5: r0 = socket(0xa, 0x3, 0x7) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x29, 0x3e, 0x0, 0x0) 19:09:23 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x5451, 0x0) [ 973.401308][T19027] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:23 executing program 1: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ocfs2_control\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x40010, r0, 0x8000000) 19:09:23 executing program 2: socket(0x15, 0x5, 0x7) 19:09:23 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000004f80)={0x0, 0x0, &(0x7f0000004f00)=[{&(0x7f0000000080)={0x3c, 0x14, 0x1, 0x0, 0x0, "", [@nested={0x2c, 0x0, 0x0, 0x1, [@generic="ddb7a5f7f70bcdbfe998d4aab7628eb478", @generic="c0ff9f82c47fc9d4df393e71d57fedcf91542f201aed33"]}]}, 0x3c}], 0x1}, 0x0) [ 974.043122][T10571] Bluetooth: hci0: command 0x201a tx timeout 19:09:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1a, 0x2, &(0x7f0000000780)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0xbb}], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 19:09:24 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') 19:09:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x38, r1, 0x11, 0x0, 0x0, {}, [{{@pci={{0x8, 0x97, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}}]}, 0x38}}, 0x0) 19:09:24 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) [ 974.398162][T19045] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:24 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:25 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@abs={0x1, 0x5c}, 0x6e) 19:09:25 executing program 1: r0 = socket(0x18, 0x0, 0x2) getpeername$llc(r0, 0x0, 0x0) 19:09:25 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000000)={'dummy0\x00', @ifru_flags}) 19:09:25 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000004c0)) 19:09:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89e0, &(0x7f0000000240)={'batadv_slave_1\x00'}) [ 975.512406][T19064] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:26 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:26 executing program 3: bpf$MAP_CREATE(0x22, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 19:09:26 executing program 1: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x3e, 0x0) write$nbd(r0, &(0x7f00000002c0)={0x6000000, 0x0, 0x0, 0x0, 0x4, "a309ff0c00005f563a5c12dfbfd3adff7f9d5e9a099cbab35a2fdbede5fbd0978b01ba590e94bb02f6b7807e5dadca47306a5bc6c5e7be780500000000ed8c341606462889000000000000000023d70b463b42ec0893c5b3"}, 0x68) 19:09:26 executing program 5: openat$autofs(0xffffffffffffff9c, 0x0, 0x410880, 0x0) 19:09:26 executing program 2: perf_event_open(&(0x7f00000003c0)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:09:26 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x8) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qrtr-tun\x00', 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)) [ 976.333831][T19081] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x13, 0x0, 0x4, 0x801, 0x0, 0x0, {}, [{{0x0, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', "3f7834011f57b42008b3ea02c84d7cc8bdce63ab5d7246d0b1b218fc274de1da", "217be0c6fa01df9f0253b332840e61bd9d1a9f040bf464f2313e72a91f562236"}}}]}, 0x14}}, 0x0) [ 976.484061][T19085] dlm: no local IP address has been set [ 976.490073][T19085] dlm: cannot start dlm lowcomms -107 19:09:26 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) [ 976.580848][T19088] dlm: no local IP address has been set [ 976.586790][T19088] dlm: cannot start dlm lowcomms -107 19:09:27 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) connect$rds(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) 19:09:27 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) fcntl$getown(r0, 0x40a) 19:09:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000004f80)={0x0, 0x0, &(0x7f0000004f00)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="3800000014000100000000d282d3554010"], 0x38}], 0x1}, 0x0) 19:09:27 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x4, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) 19:09:27 executing program 0: r0 = socket(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x890b, &(0x7f0000005880)={'batadv0\x00'}) [ 977.374397][T19101] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:27 executing program 1: r0 = socket(0x29, 0x5, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f0000006100)=[{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)="6b4a572938a739f22bb2902ad177cca1d6e6e7e83675655738ef01bc020482fd458a497853c2e0cc3b22d66f2a0836acef9f3ac93367e9557bc896f81ecad57440324d2f7f2f625c9355777727ee8a22cc2e3a7bbeed3a5633b766e7", 0x5c}, {&(0x7f00000003c0)="0180e81fba96aaebb3dd4bd47d4da092671194ceed730aa9e9fba02e53b761ba9cf58b8cad86d59af86ced190bf6df08d3a08df45fcb1c45aac1fdd02b082c65bdaf4c5e70e1cc071e84f26d1cee6965c748d595ba90cefa43717dd2f422a89af93dbd7561de88118bae2641376e72d11e0ee8e125325d598f3e08d060bce50904ec613455509870c2fa71626acb5e969d028e40d04e1512b3dc462d0bb4f11353bd0c1da033a275d0cd77776ae33e67c7cd8118c7035abbe35f5cc584e1fac4fa8f225b7c5ca2199709ce6048a47318fe8bd0a42ef318c521c35e802bcd8838d651eaaab39c5c9557af443d55", 0xed}, {&(0x7f00000000c0)="502c92483e3630e91143dc29fe5ddf943409d979f0f04f4fcce78279211e4171c3afa83f0324c762c1de8c27", 0x2c}, {&(0x7f0000000540)="fd8de80efc8871258c51904e581e3423d0fc3e224bf9bee0c998cedd897ac8d50581add648c70801f368bb8c2cb2ca91c1d52ad1bcce975908ec780f08efeb28b21a674d2d1d1aead875798c52da7259214c2854b9cd3e5e34eae04a5801ca50e26eee22b45a1e78f7abe0ed89209a74d9c27315ff0606a0669d7a596ae573917c1eddf453bf337c4a7869d7f17ed69e8ce73d6f6b60d687d519ccfb2c87ec6a3c888a8dc2b33a30864e6ec378ee75a40372b8b9522cf0b1482cbb7f9127b9db940308e8b371ebfa07e54111245a9035fd46e61e92e54f5c1f339e3a54e6a9b974979b83bb80e66f2214c3d407fb752a816a1a", 0xf3}, {&(0x7f0000000740)="6555a687bbe93f7b26a13eb74df92193c504949ee3b5fb5243b19fec2d23d730ef5b7b0719264677e80998102f8c51cb29213d5ded4655b16952f7d2afe85106b4425827202174d06fb89342bd498c5379830ce6384c8c55907d8fc4ae353aa127c3d4d315a8df093b2cf517d7b4023fa3d856a0d7fa554ee0d22382fce2817f776322b9a8b019914c0031890ed285e1d20ebfea90e775584ed858c4f373afe48d2dc0bcf63bcb13267097caa4b3d149", 0xb0}, {&(0x7f0000000a80)="83400e329bfabd884b716cb3f41193bfc5563e2435d47ea9f0d3ec0ea2c56173439e1eea5d854f78969248b80186feaee42b6e1cd94ba489ba5203bfc588c42dedaa15a5382410804219b34abfdba15381718858e8f53a24108c756d1d527eedb0551b31e3ef3e9fca87f12714ac8b2658fc63e0c9db7c87f1d6d7d7738c84b22b4c567c248f145ac4a377cb88fb1232803a1745b291fd8601ab29d84256030e3fa999429312e07b43eafd4cb01bdb44eb725f8806498d0b78d2abbdabc7b41564226ec7142d0c29333923aec1206d70257d60751d24e553d05845aa89806accde46d463e3230ed55c5acba11d3adbfb37f998d7608101f2c0112091c9ce65a33a4849163d6c48bdc01f5e810fa81cd2f3cd980ffcebdd2c776d25c7d16c093ea0b2df5fbfa9ae411d05d3f215432cffed9c08035def016e568be507ec7ed17617bb1decf377d88bc62abd64964d5ddefae8d79d91a260990bcfdb6785ef61efc145e977cd8df9addcc9dea25ece9baba82fe743eabf8442a8b23b62130fb370686921be71fed8c26d1069bd26d0acb85065a13d25dd03acf5485ef8b2f71e27f6544112bbdd1268a0f36cda3d97fd8bca28e91569345098c83c0b9012b5af7a28a16eb1ccb7e879389ca9dcad0642bc2e8b69e5b01dc61d58c08befd7e35dca5e6bd212de6f1cb703b9aa4c5eccd992ecffbaa5d29cb65092a5e61f1ba047c1338486ed67de10c5a1f54cc2b98ca339b8e22853526a615f9575229d24e8febda9ed23e6efce0f602959efa53e358fc3e751cb71acbfdb3750f08bb4c52302168fd41261523548c661c93ac995193f8d6d53863013640fa32f7afc074c7e60e01e091b72984f2aac0b7882d07819af2646006a1f4c4c36e981c9d88168c042df49c71945c83a381bd4f06b3de811bd979cd685fb0a1588931471cf2f45ebfe9a63660ad962355e45c5a8931ed3534ba0987ead2908f50223f516618a2cbc84ade0e55acd05a8d31a1fba641f3c9edb07768c81378d483eda5010731d6932b96e0985078d74c4778ac0d08b13ebe916de0575b185a3dcf61d622d91eca362db193c86424eb8b317f93a8ff2963af6e53234930c8c36f4e989984cb3f8896ea2075b26aa3d815e949598b823e4bd9159233a0a62410ad522e0b96f037926a9026d09bcb4af95bb9437911b91a8eea11f391028ab73e2532808d8825b0398fbbc79d6b669c49d5b21cfc28efb0baf695054aeb619175d757ca119313f543d81584fd9256029c9fa8d53ef54bcedc494bf2f7c52ca7634caa88ea6b9f857bcb988d552b9c37872e2a04ebed2d5667ca3caf8833a049b7bc3cf6a15a010180e35430ce682f67ab602a3deedd4b9bf59c8672dddc829458c89ea7ccd5b1c772fef0e4370984bf335660aaceab9cd9aee15ea0ad3aac32c6b78716dd21fc83d0b09100c3346886c62b6449710ce07ce84a0eda542259cab82084ce0364620054cea700ed3a245d8441f6e2225422861fecc2ad092c40b5a5b477bec5623a7fbc71b5cb78f0d1c41b1268c269963bb6245ff3bee6dc462874b4b0b27dd783bac49356352bd96151351f319c9fe244414903b34755bff09bb2fffbbb644e52b1ff4ae26fa42d29d08e66dd6a5fb09d67d89cc4540a0a5970ce8a531dd447a088211c6ab4f048eb41cac7c910a58e0838e71fb47f528d9ead7dc8286d0c9bbda22e4dc84e8029eac9ceba66fdae298718832bd5c890d50a142c6edeb24a8c55521809ba7b1f4f60ef180c4a4be6c38980589ed87ab1af6935508befa1f1ebae81385ecb04e70dd832562cabe3616653d9c9156a9a88be070916264d93aad7159348a094dce8b9cf2a15356236c9a9b655ca327f1e79b55d9d22083fabe32995f9193b83a34569a52801fd3d13bbde13792e4ddf9612d4093c01ea744ef532a505ec421187775af121a3b634546b7cf0f75a32f6897e6c9234c083b7db115b11cce823243909b063c8a19c394536f68c9e9b14dd16104a413a8de084d8f14ff82fc268b3a4efc55552cc77ddcc3f9d522f62330ffbb77b0019770d485698cb3e41b892e741dab929d8733fe51485ec4c78a8b3530339f1bb50a126748890b21ecae0a8a0d36af6d7a6b3c5441db7865b219b540cb2303bf6d42bc29534b78659055bf11c2d965de6e0638a90cb8f2f42164b64fe533887579ffe83134d3d7267e4bd2d563902b815b27930543c60e6731b2fcf2362b96b4e17f2a3dd2f1c7b713954cb26b6280e6480f382b2fe57800334da77ec20ede19c6bef89040a45a861f429cf5ea2ca8b5adf676633e55be5af9d4ffb2c65a9d115a952387437c8cd7d45b60143d3c392ba2686c765da3f33e131b9bad03d655a76097d194b0ea77176390040d05616e21e6c4ce6a2ee6f3d061c8fc627aa7135fdca178d3a4ba3c34826c2c8682bd528dc3538b899d838ed0c77456bea3d01cb44dcc86eeb5962d8ae4bb38b22f72053c249c77e80c4392e29f767a4fcaaddb477a62106e31855580e7c3df608fcfb2b7dc1abf4d33ab2cfbf402500606ebb24fb54b88be79d674cd1606413b38e7d1351164a5570c176b48aeb0082f5e70e0ccc422147f29ec8b6388b24da4a32b21a5a66243cffc3f2a60bd9c82d35d8558143b51cd324b4e9f6014b93a57cc33eb623f2988b6c7560a9723b198469e750c18470f5b4f9decc7178f84dd4d8052f78fb2aeeb47f3de17f233778251fcd89112fdc2eb6634903d53d0a7d3d5e15970a7277f6aa2d06dccaeaa486efe6e32a202e1046b135a8211432f25e915d9f057257a1804be1a5b894baa269b951e688776d9cb8e083bb335ab9f4aa79a4f3fd6593e678f1b4224fef77495090a13341718e402a4c578214214dec602b59ec703317442e0ed322a5b78770af3df1c0680b44e4cee45b7bf5e10167d30c424b17d50d7e949da07d89b3b57a23b726ed702874023cbeee0183858f6b93b16650ede5a380076565aa2513e7d3df218c7a6eb8fe7628b961b74a5bab57dad44acc263c71a73fadaeb3d42c1c5ca091f8b55a86562275bbd899f7c88e3f586fbd6c9f76740da159f16ac53f9c98b7614781706d90fddecbe38bb962b877f29eeb37cbeda2136ee1b4bac9170a1772596e4c07336661f0fab462af3ecf0463d592a16e84ff85868aa6818dd0a182ed8b06f7701b1bb9d9f483ba6325ea70a3ad9d1579429de4541ecac2ff248c73af7aa70a4e636f00ffc3f06b93b618779a20e6b8255fedcb36cd3ab6bf2a4dddb287d5db126dfd2ed1584a76e5edde4a491769d6f934407d9d68cc8469026856d3cd4954166cb1c5dd8fe7034637ff68f546be473142623b80cd83273fad8cf710905c4415558bd486fa8dbb02338015d9e81e87a5ec7a9a7b0bf42477099bc0684b3305f121912a33274b05f0a58c7070641065d8ab9ca077f67d4f5e82b39ec24e56cb696bb8a545a3f8ba20fdcab172f1a409abcad3b52ade8fd621c53c7095387730c91fa2cef683969eb0da529dbcff2c9d023b260eed5d70151c2169d898cdccf372f2f5f53a80597302f6c8ff67b58036706b460a6e49327529966d62a5b37b1636a91eccaac767de983c2ef9b10d903e04c0eb55bb2ccadd268e5a9f67711400e84370348c7c655bdaf22cac7f0026db4d7a0f8d7ab2fe031ba09048039b0df24e56d0f96e21240fdf230702c078b136b9aa432ac791a236e2cd715ff99679ffc8cf828c87d84fa7588d99fd227a7ccc772c99a9e35a2d237289a43f53cba88682ead1498ed687fa0578717edcba865adb0e9035c7e394d4b9a61fa0279741808e4cadd95f6607f0d4edfe474028af44b11cebc00abb4e1dde08d199d30f7c12b29a410c7e9c85da31dd2d0744e004ad7d3ac6e27c95476abacd37032fa5a47713585dabbac5f767ed9a60c238562a6c69f6f0974f2beb1eb29f9f7050bf470094016924c651d4ebd7e21e600180fb4703e8cc8dae5f8230e5a253a1431f4997717b22dc506f9f7a0bf582ce750a228285e7d8f6bf32fdf32c7c850a27760796f66923e9720e6d6139061133f590a08734dc4b351838e423245b96a68d67830faa28ab42fec7fd45fd0b451b80d05eaf5fa68ac959c29f0ec1965b4c8508558f3a745b7b022dc1031140d3fd56bd9291bac3686eb25b5ae10c6dcf453c160e9cb78cd47db5bee6eb1cb91f14f6d5de72d2f0882e96e28d379e61e50ed7ac6cb49a3cf172ca886640415e1eab81f18721ff3d34cc1862b0fcd3cdad855287e605cf1e54fa09b79b4810373da767401b8d22bff8d592281545ea913923009f1193c8229c464b47e60c1c7d41127204b8e2db77c693f34637f6a11452a39878b1b456a6a7b31134ee331b384000a07fac4bd2977a1039d074abab75ce2b8c31fd95758bdd038718a600f9f57beccfb7ac78023c639222b4839707a668b6f760a6d72053a8e5fc80078c5f535547b41da587c0858e666fc99523c4579aac8ca4e136e2cfdb1735cf2e69f0ee32da4cbbd3930939f1d62e0030ecb3a198d78864bfe0f89bccc69fd65b2a0403708fcdfd5cc8370ab79c0f67e5d9a89e1918ab60d5a732558d1006e689d5b5285f07895478d3e133e6d4cce7bbd8d9f59d62772a781a0cc076b392905cc675453c7a4fd8e2b1045f442cdd9e9c54f", 0xce8}], 0x6}], 0x1, 0x0) sendmsg$nfc_llcp(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)='^', 0x1}], 0x1}, 0x0) 19:09:27 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x3, 0x8, 0x3}, 0x14}}, 0x0) 19:09:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1f, 0x0, 0x7}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x1f}, 0x20) 19:09:28 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCGIFCONF(r0, 0x541b, &(0x7f0000000680)) 19:09:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x7b, &(0x7f0000000000)={r1, 0x2}, 0x8) [ 978.275171][T19121] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:28 executing program 1: r0 = socket(0x29, 0x5, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f0000006100)=[{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)="6b4a572938a739f22bb2902ad177cca1d6e6e7e83675655738ef01bc020482fd458a497853c2e0cc3b22d66f2a0836acef9f3ac93367e9557bc896f81ecad57440324d2f7f2f625c9355777727ee8a22cc2e3a7bbeed3a5633b766e7", 0x5c}, {&(0x7f00000003c0)="0180e81fba96aaebb3dd4bd47d4da092671194ceed730aa9e9fba02e53b761ba9cf58b8cad86d59af86ced190bf6df08d3a08df45fcb1c45aac1fdd02b082c65bdaf4c5e70e1cc071e84f26d1cee6965c748d595ba90cefa43717dd2f422a89af93dbd7561de88118bae2641376e72d11e0ee8e125325d598f3e08d060bce50904ec613455509870c2fa71626acb5e969d028e40d04e1512b3dc462d0bb4f11353bd0c1da033a275d0cd77776ae33e67c7cd8118c7035abbe35f5cc584e1fac4fa8f225b7c5ca2199709ce6048a47318fe8bd0a42ef318c521c35e802bcd8838d651eaaab39c5c9557af443d55", 0xed}, {&(0x7f00000000c0)="502c92483e3630e91143dc29fe5ddf943409d979f0f04f4fcce78279211e4171c3afa83f0324c762c1de8c27", 0x2c}, {&(0x7f0000000540)="fd8de80efc8871258c51904e581e3423d0fc3e224bf9bee0c998cedd897ac8d50581add648c70801f368bb8c2cb2ca91c1d52ad1bcce975908ec780f08efeb28b21a674d2d1d1aead875798c52da7259214c2854b9cd3e5e34eae04a5801ca50e26eee22b45a1e78f7abe0ed89209a74d9c27315ff0606a0669d7a596ae573917c1eddf453bf337c4a7869d7f17ed69e8ce73d6f6b60d687d519ccfb2c87ec6a3c888a8dc2b33a30864e6ec378ee75a40372b8b9522cf0b1482cbb7f9127b9db940308e8b371ebfa07e54111245a9035fd46e61e92e54f5c1f339e3a54e6a9b974979b83bb80e66f2214c3d407fb752a816a1a", 0xf3}, {&(0x7f0000000740)="6555a687bbe93f7b26a13eb74df92193c504949ee3b5fb5243b19fec2d23d730ef5b7b0719264677e80998102f8c51cb29213d5ded4655b16952f7d2afe85106b4425827202174d06fb89342bd498c5379830ce6384c8c55907d8fc4ae353aa127c3d4d315a8df093b2cf517d7b4023fa3d856a0d7fa554ee0d22382fce2817f776322b9a8b019914c0031890ed285e1d20ebfea90e775584ed858c4f373afe48d2dc0bcf63bcb13267097caa4b3d149", 0xb0}, {&(0x7f0000000a80)="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", 0xce8}], 0x6}], 0x1, 0x0) sendmsg$nfc_llcp(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)='^', 0x1}], 0x1}, 0x0) 19:09:28 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:28 executing program 2: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card1/oss_mixer\x00', 0x40, 0x0) 19:09:29 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x80108906, 0x0) 19:09:29 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000000c0)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "1cefef", "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"}}, 0x110) 19:09:29 executing program 1: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, &(0x7f00000004c0)) [ 979.143276][T19138] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:29 executing program 2: prctl$PR_MCE_KILL(0x59616d61, 0x95b1488264eeb466, 0x0) 19:09:29 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x80047453, 0x0) 19:09:29 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_ifreq(r0, 0x8917, &(0x7f0000000040)={'ipvlan0\x00', @ifru_data=0x0}) 19:09:30 executing program 3: r0 = socket(0x23, 0x2, 0x0) bind$rxrpc(r0, &(0x7f00000001c0)=@in4={0x23, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) 19:09:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$netlink(r0, &(0x7f0000004f80)={0x0, 0x0, &(0x7f0000004f00)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="4c000000130001ba"], 0x4c}], 0x1}, 0x0) 19:09:30 executing program 2: r0 = getpid() ioprio_get$pid(0x3, r0) [ 980.111341][T19160] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:30 executing program 0: r0 = socket(0xa, 0x3, 0x6) recvfrom$llc(r0, 0x0, 0x0, 0x40000042, 0x0, 0x0) 19:09:30 executing program 5: r0 = socket(0x23, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x113, 0x19, 0x0, 0x0) 19:09:30 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:30 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x10, 0x0) 19:09:30 executing program 1: r0 = syz_init_net_socket$x25(0x6, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5411, &(0x7f0000001e00)={'batadv_slave_1\x00'}) 19:09:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x2}, 0x8) 19:09:31 executing program 2: prctl$PR_MCE_KILL(0x18, 0x95b1488264eeb466, 0x0) 19:09:31 executing program 5: socket(0x3, 0x0, 0x1ff) [ 980.914680][T19175] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:31 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x80047437, 0x0) 19:09:31 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:31 executing program 1: ioperm(0x0, 0x4, 0xfffffffffffffe00) r0 = socket(0x15, 0x5, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x8940, &(0x7f0000000000)) 19:09:31 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getpeername$packet(r0, 0x0, 0x0) 19:09:31 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0xc03e000000000000, 0x0, &(0x7f0000000080)=@abs={0x1}, 0x6e) 19:09:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x84, 0x10, &(0x7f0000000080)=ANY=[], 0x110) [ 981.761801][T19192] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 19:09:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:09:32 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:32 executing program 1: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)={[{@resize='resize'}]}) 19:09:32 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getpeername$packet(r0, 0x0, 0x0) 19:09:32 executing program 2: r0 = socket(0x15, 0x5, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 19:09:32 executing program 5: r0 = inotify_init() ioperm(0x0, 0x1ff, 0xfffffffffffffc68) inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) [ 982.559410][T19211] JFS: Cannot determine volume size 19:09:32 executing program 3: prctl$PR_MCE_KILL(0x8, 0x0, 0x0) [ 982.640743][T19213] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 982.662108][T19211] JFS: Cannot determine volume size 19:09:33 executing program 3: ioperm(0x0, 0x7, 0x100) r0 = socket(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)={0x14, r1, 0x1}, 0x14}}, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) 19:09:33 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getpeername$packet(r0, 0x0, 0x0) 19:09:33 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) connect$rds(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) 19:09:33 executing program 1: socket(0x3, 0x0, 0x10000) 19:09:33 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x4102}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) 19:09:33 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getpeername$packet(r0, 0x0, 0x0) 19:09:33 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000040)={'macvlan1\x00', @ifru_mtu}) [ 983.703378][T19240] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:34 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x1, 0x1, 0xa03}, 0x14}}, 0x0) sendmsg$NFT_MSG_GETSET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0xa, 0xa, 0x201}, 0x14}}, 0x0) 19:09:34 executing program 1: socketpair(0x1e, 0x0, 0x7ff, &(0x7f0000000000)) 19:09:34 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7c}]}) fcntl$getown(r0, 0xf) 19:09:34 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, &(0x7f0000014a00)) 19:09:34 executing program 0: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 19:09:34 executing program 3: r0 = socket(0x11, 0x3, 0x0) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0xf0ff7f}, 0x0) 19:09:34 executing program 1: r0 = socket(0x2, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x10, &(0x7f0000005880)={'batadv0\x00'}) [ 984.578855][T19259] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 19:09:34 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f00000006c0)={&(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10, 0x0, 0x0, 0x0, 0x40000}, 0x0) 19:09:35 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, 0x0) 19:09:35 executing program 2: prctl$PR_MCE_KILL(0x39, 0x95b1488264eeb466, 0x0) 19:09:35 executing program 0: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 19:09:35 executing program 1: add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) 19:09:35 executing program 3: openat2(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, 0xae34c1decca9ac03}, 0x18) 19:09:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x11, 0x0, 0x110) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) r1 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) fspick(r2, &(0x7f00000002c0)='.\x00', 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x8, 0xa, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x9, 0x0, 0x8b, 0x0, "90dce3cf"}, 0x0, 0x0, @userptr}) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r4, &(0x7f0000005c40)={0x2020}, 0x2020) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f0000000300)={0x2020}, 0x2020) 19:09:35 executing program 0: getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 19:09:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[], 0x4) 19:09:36 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, &(0x7f0000001580)={'batadv_slave_1\x00'}) 19:09:36 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, 0x0) 19:09:36 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x2}}, 0x10) 19:09:36 executing program 2: setresuid(0x0, 0xee00, 0xffffffffffffffff) setresuid(0x0, 0xee01, 0x0) 19:09:36 executing program 5: r0 = socket(0x2, 0x5, 0x0) ioctl$SIOCSIFMTU(r0, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) 19:09:36 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 19:09:36 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000000), 0x4) 19:09:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x89a1, &(0x7f0000000100)={0x0, @nl, @xdp, @generic={0x0, "0000c0fe00000000000000000100"}, 0x0, 0x0, 0x0, 0x2}) 19:09:37 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000fc8e0b4946704d25a0f18393550c433b010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000e1f4655fe1f4655fe1f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}, {&(0x7f0000013f00)="2719c0d901", 0x5, 0x40000}], 0x0, 0x0) [ 987.109685][T19313] device veth1_macvtap left promiscuous mode 19:09:37 executing program 2: r0 = socket(0x10, 0x3, 0x4) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080)='ethtool\x00') sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_WOL_MODES={0x38, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '}\x82@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x4c}}, 0x0) 19:09:37 executing program 0: syz_init_net_socket$rose(0xb, 0x5, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 19:09:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000001500)={0x14, r1, 0x813}, 0x14}}, 0x0) 19:09:38 executing program 3: bpf$MAP_LOOKUP_ELEM(0x1d, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000280), 0x0}, 0x20) [ 987.968662][T19323] ===================================================== [ 987.975749][T19323] BUG: KMSAN: uninit-value in inet_diag_cmd_exact+0x67e/0xb40 [ 987.983246][T19323] CPU: 1 PID: 19323 Comm: syz-executor.2 Not tainted 5.9.0-rc4-syzkaller #0 [ 987.992557][T19323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.002630][T19323] Call Trace: [ 988.006018][T19323] dump_stack+0x21c/0x280 [ 988.010463][T19323] kmsan_report+0xf7/0x1e0 [ 988.014919][T19323] __msan_warning+0x58/0xa0 [ 988.019456][T19323] inet_diag_cmd_exact+0x67e/0xb40 [ 988.024610][T19323] ? kmsan_get_metadata+0x116/0x180 [ 988.029917][T19323] ? local_bh_enable+0x36/0x40 [ 988.034715][T19323] ? __dev_queue_xmit+0x41a8/0x4470 [ 988.040045][T19323] inet_diag_handler_cmd+0x355/0x440 [ 988.045371][T19323] ? kmsan_get_metadata+0x116/0x180 [ 988.050599][T19323] ? inet_diag_rcv_msg_compat+0x6c0/0x6c0 [ 988.056453][T19323] sock_diag_rcv_msg+0x24f/0x620 [ 988.061498][T19323] netlink_rcv_skb+0x6d7/0x7e0 [ 988.066377][T19323] ? sock_diag_bind+0x180/0x180 [ 988.071287][T19323] sock_diag_rcv+0x63/0x80 [ 988.075994][T19323] netlink_unicast+0x11c8/0x1490 [ 988.080985][T19323] ? diag_net_exit+0x90/0x90 [ 988.085629][T19323] netlink_sendmsg+0x173a/0x1840 [ 988.090683][T19323] ____sys_sendmsg+0xc82/0x1240 [ 988.095590][T19323] ? netlink_getsockopt+0x17e0/0x17e0 [ 988.100998][T19323] __sys_sendmsg+0x6d1/0x820 [ 988.105644][T19323] ? kmsan_copy_to_user+0x81/0x90 [ 988.110705][T19323] ? kmsan_get_metadata+0x116/0x180 [ 988.115937][T19323] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 988.121766][T19323] ? kmsan_get_metadata+0x116/0x180 [ 988.127092][T19323] __se_compat_sys_sendmsg+0xa7/0xc0 [ 988.132424][T19323] __ia32_compat_sys_sendmsg+0x4a/0x70 [ 988.137937][T19323] __do_fast_syscall_32+0x129/0x180 [ 988.143173][T19323] do_fast_syscall_32+0x6a/0xc0 [ 988.148065][T19323] do_SYSENTER_32+0x73/0x90 [ 988.152676][T19323] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 988.159544][T19323] RIP: 0023:0xf7f1e549 [ 988.163720][T19323] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 988.183345][T19323] RSP: 002b:00000000f55180cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 988.191782][T19323] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000700 [ 988.199774][T19323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 988.207765][T19323] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 988.215749][T19323] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 988.224003][T19323] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 988.232002][T19323] [ 988.234335][T19323] Uninit was created at: [ 988.238602][T19323] kmsan_internal_poison_shadow+0x66/0xd0 [ 988.244344][T19323] kmsan_slab_alloc+0x8a/0xe0 [ 988.249147][T19323] __kmalloc_node_track_caller+0x9aa/0x12f0 [ 988.255184][T19323] __alloc_skb+0x35f/0xb30 [ 988.259647][T19323] netlink_sendmsg+0xdb9/0x1840 [ 988.265044][T19323] ____sys_sendmsg+0xc82/0x1240 [ 988.269908][T19323] __sys_sendmsg+0x6d1/0x820 [ 988.274525][T19323] __se_compat_sys_sendmsg+0xa7/0xc0 [ 988.279837][T19323] __ia32_compat_sys_sendmsg+0x4a/0x70 [ 988.285314][T19323] __do_fast_syscall_32+0x129/0x180 [ 988.290540][T19323] do_fast_syscall_32+0x6a/0xc0 [ 988.295420][T19323] do_SYSENTER_32+0x73/0x90 [ 988.299971][T19323] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 988.306299][T19323] ===================================================== [ 988.313236][T19323] Disabling lock debugging due to kernel taint [ 988.319405][T19323] Kernel panic - not syncing: panic_on_warn set ... [ 988.326018][T19323] CPU: 1 PID: 19323 Comm: syz-executor.2 Tainted: G B 5.9.0-rc4-syzkaller #0 [ 988.336088][T19323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.346153][T19323] Call Trace: [ 988.349473][T19323] dump_stack+0x21c/0x280 [ 988.353860][T19323] panic+0x4d7/0xef7 [ 988.357807][T19323] ? add_taint+0x17c/0x210 [ 988.362302][T19323] kmsan_report+0x1df/0x1e0 [ 988.366851][T19323] __msan_warning+0x58/0xa0 [ 988.371400][T19323] inet_diag_cmd_exact+0x67e/0xb40 [ 988.376561][T19323] ? kmsan_get_metadata+0x116/0x180 [ 988.381789][T19323] ? local_bh_enable+0x36/0x40 [ 988.386874][T19323] ? __dev_queue_xmit+0x41a8/0x4470 [ 988.392112][T19323] inet_diag_handler_cmd+0x355/0x440 [ 988.397435][T19323] ? kmsan_get_metadata+0x116/0x180 [ 988.402697][T19323] ? inet_diag_rcv_msg_compat+0x6c0/0x6c0 [ 988.408449][T19323] sock_diag_rcv_msg+0x24f/0x620 [ 988.413421][T19323] netlink_rcv_skb+0x6d7/0x7e0 [ 988.418209][T19323] ? sock_diag_bind+0x180/0x180 [ 988.423106][T19323] sock_diag_rcv+0x63/0x80 [ 988.427553][T19323] netlink_unicast+0x11c8/0x1490 [ 988.432616][T19323] ? diag_net_exit+0x90/0x90 [ 988.437333][T19323] netlink_sendmsg+0x173a/0x1840 [ 988.442325][T19323] ____sys_sendmsg+0xc82/0x1240 [ 988.447228][T19323] ? netlink_getsockopt+0x17e0/0x17e0 [ 988.452635][T19323] __sys_sendmsg+0x6d1/0x820 [ 988.457291][T19323] ? kmsan_copy_to_user+0x81/0x90 [ 988.462351][T19323] ? kmsan_get_metadata+0x116/0x180 [ 988.467568][T19323] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 988.473430][T19323] ? kmsan_get_metadata+0x116/0x180 [ 988.478666][T19323] __se_compat_sys_sendmsg+0xa7/0xc0 [ 988.484454][T19323] __ia32_compat_sys_sendmsg+0x4a/0x70 [ 988.489943][T19323] __do_fast_syscall_32+0x129/0x180 [ 988.495704][T19323] do_fast_syscall_32+0x6a/0xc0 [ 988.500582][T19323] do_SYSENTER_32+0x73/0x90 [ 988.505135][T19323] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 988.511505][T19323] RIP: 0023:0xf7f1e549 [ 988.515616][T19323] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 988.535242][T19323] RSP: 002b:00000000f55180cc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 988.543704][T19323] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000700 [ 988.551743][T19323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 988.559843][T19323] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 988.567841][T19323] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 988.575949][T19323] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 988.585318][T19323] Kernel Offset: disabled [ 988.589685][T19323] Rebooting in 86400 seconds..